task_id stringlengths 8 10 | docker_image stringlengths 17 19 | basedir stringclasses 157
values | target_functions listlengths 1 3 | crash_type stringclasses 85
values | project_name stringclasses 157
values | sanitizer stringclasses 3
values | sanitizer_output stringlengths 1.13k 6.5M | language stringclasses 2
values | vuln_commit stringlengths 40 40 | fix stringlengths 69 110 | vulnerability_description stringlengths 38 824 ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
arvo:8968 | n132/arvo:8968-vul | /src/freetype2 | [
{
"end_line": 229,
"function_name": "tt_face_load_cpal",
"start_line": 75,
"target_file": "/src/freetype2/src/sfnt/ttcpal.c"
}
] | Heap-buffer-overflow READ 1 | freetype2 | asan | INFO: Seed: 566716906
INFO: Loaded 1 modules (19031 inline 8-bit counters): 19031 [0xb43c60, 0xb486b7),
INFO: Loaded 1 PC tables (19031 PCs): 19031 [0x874c50,0x8bf1c0),
/out/ftfuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==7867==ERROR: ... | cpp | 7915fd51f123d0adbe6a0b9ad19eb941e1733c87 | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a6b77ba2b39e379cd9295a9376fedf574a6ba15f | A heap buffer overflow exists in the `tt_face_load_cpal` function in `src/sfnt/ttcpal.c` due to insufficient guarding of CPAL version 1 offsets. |
arvo:9070 | n132/arvo:9070-vul | /src/freetype2 | [
{
"end_line": 3393,
"function_name": "tt_face_vary_cvt",
"start_line": 3089,
"target_file": "/src/freetype2/src/truetype/ttgxvar.c"
}
] | Bad-free | freetype2 | asan | INFO: Seed: 3073846597
INFO: Loaded 1 modules (19072 inline 8-bit counters): 19072 [0xad0ed8, 0xad5958),
INFO: Loaded 1 PC tables (19072 PCs): 19072 [0x80d6b0,0x857eb0),
/out/ftfuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==7818==ERROR:... | cpp | a632fb547e23fe129a579fabf60a992fd7d98d02 | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=589d1f0899343b18c3181f35451550dc1b904bef | null |
arvo:9079 | n132/arvo:9079-vul | /src/freetype2 | [
{
"end_line": 3393,
"function_name": "tt_face_vary_cvt",
"start_line": 3089,
"target_file": "/src/freetype2/src/truetype/ttgxvar.c"
}
] | UNKNOWN READ | freetype2 | ubsan | INFO: Seed: 959164486
INFO: Loaded 1 modules (19295 inline 8-bit counters): 19295 [0x8a08b8, 0x8a5417),
INFO: Loaded 1 PC tables (19295 PCs): 19295 [0x5efc70,0x63b260),
/out/ftfuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitizer:DEADLYSIGNAL
==7854==ERROR: UndefinedBehaviorSanitizer... | cpp | a632fb547e23fe129a579fabf60a992fd7d98d02 | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=589d1f0899343b18c3181f35451550dc1b904bef | null |
arvo:9084 | n132/arvo:9084-vul | /src/freetype2 | [
{
"end_line": 3393,
"function_name": "tt_face_vary_cvt",
"start_line": 3089,
"target_file": "/src/freetype2/src/truetype/ttgxvar.c"
}
] | UNKNOWN READ | freetype2 | ubsan | INFO: Seed: 2421415247
INFO: Loaded 1 modules (19295 inline 8-bit counters): 19295 [0x8a08b8, 0x8a5417),
INFO: Loaded 1 PC tables (19295 PCs): 19295 [0x5efc70,0x63b260),
/out/ftfuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitizer:DEADLYSIGNAL
==7838==ERROR: UndefinedBehaviorSanitize... | cpp | a632fb547e23fe129a579fabf60a992fd7d98d02 | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=589d1f0899343b18c3181f35451550dc1b904bef | null |
arvo:9124 | n132/arvo:9124-vul | /src/aom | [
{
"end_line": 2773,
"function_name": "tile_worker_hook_init",
"start_line": 2731,
"target_file": "/src/aom/av1/decoder/decodeframe.c"
},
{
"end_line": 2810,
"function_name": "tile_worker_hook",
"start_line": 2775,
"target_file": "/src/aom/av1/decoder/decodeframe.c"
}
] | Index-out-of-bounds | aom | ubsan | INFO: Seed: 3414122278
INFO: Loaded 1 modules (72394 inline 8-bit counters): 72394 [0x1299380, 0x12aae4a),
INFO: Loaded 1 PC tables (72394 PCs): 72394 [0x12aae50,0x13c5af0),
/out/av1_dec_fuzzer_threaded: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
/src/aom/av1/common/txb_common.h:675:29: runtime error: index... | cpp | 6c5d07efa2b887fee25836e85a9f50f897c6c806 | https://aomedia.googlesource.com/aom/+/1f68feef03dd9d5b5a4cac0a8f69b9f4cb1da915%5E%21/ | null |
arvo:9180 | n132/arvo:9180-vul | /src/librawspeed | [
{
"end_line": 463,
"function_name": "ArwDecoder::GetWB",
"start_line": 402,
"target_file": "/src/librawspeed/src/librawspeed/decoders/ArwDecoder.cpp"
}
] | Use-of-uninitialized-value | librawspeed | msan | INFO: Seed: 787102424
INFO: Loaded 1 modules (12643 inline 8-bit counters): 12643 [0xca89f0, 0xcabb53),
INFO: Loaded 1 PC tables (12643 PCs): 12643 [0xcabb58,0xcdd188),
/out/TiffDecoderFuzzer-ArwDecoder: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==6593==WARNING: MemorySanitizer: use-of-uninitialized-value
... | cpp | 2c4bdfd42340ef006e330280f6d59000da6f2e8d | https://github.com/darktable-org/rawspeed/commit/77a1a1f0b7b7367b345afd484a22d5585ee410d6 | The vulnerability in ArwDecoder::GetWB() occurs because the encrypted area is not rounded down to a multiple of 4, which can lead to issues detected by memory sanitizers. |
arvo:9188 | n132/arvo:9188-vul | /src/aom | [
{
"end_line": 1516,
"function_name": "decode_partition",
"start_line": 1404,
"target_file": "/src/aom/av1/decoder/decodeframe.c"
},
{
"end_line": 2773,
"function_name": "tile_worker_hook_init",
"start_line": 2731,
"target_file": "/src/aom/av1/decoder/decodeframe.c"
},
{
"... | Index-out-of-bounds | aom | ubsan | INFO: Seed: 1996167617
INFO: Loaded 1 modules (72394 inline 8-bit counters): 72394 [0x1299380, 0x12aae4a),
INFO: Loaded 1 PC tables (72394 PCs): 72394 [0x12aae50,0x13c5af0),
/out/av1_dec_fuzzer_threaded: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
/src/aom/av1/common/blockd.h:921:25: runtime error: index 255... | cpp | 6c5d07efa2b887fee25836e85a9f50f897c6c806 | https://aomedia.googlesource.com/aom/+/1f68feef03dd9d5b5a4cac0a8f69b9f4cb1da915%5E%21/ | null |
arvo:9230 | n132/arvo:9230-vul | /src/wireshark | [
{
"end_line": 1332,
"function_name": "expand_dns_name",
"start_line": 1153,
"target_file": "/src/wireshark/epan/dissectors/packet-dns.c"
}
] | Heap-buffer-overflow WRITE 2 | wireshark | asan | oss-fuzzshark: disabling: ip
oss-fuzzshark: disabling: udp
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: bgp
oss-fuzzshark: disabling: json
oss-fuzzshark: disabling: snort
oss-fuzzshark: configured for dissector: bootp in table: udp.port
INFO: Seed: 2091284779
INFO: Loaded 1... | cpp | 6f665e36edb3c8d748682c2702b952656c6c273b | https://github.com/wireshark/wireshark/commit/5a560f3f6aa2cbfad957cf6223e50c3b61ef575b | A buffer overflow vulnerability exists in the DNS code due to an off-by-one error when writing to a buffer. The "maxname" variable represents the size of the buffer, including the "null label" (NUL byte), but the code writes past the end of the buffer. This can result in a write buffer overflow. |
arvo:9287 | n132/arvo:9287-vul | /src/openvswitch | [
{
"end_line": 689,
"function_name": "ipv6_sanity_check",
"start_line": 670,
"target_file": "/src/openvswitch/lib/flow.c"
}
] | Heap-buffer-overflow READ 1 | openvswitch | asan | INFO: Seed: 3983540721
INFO: Loaded 1 modules (37409 inline 8-bit counters): 37409 [0xe89370, 0xe92591),
INFO: Loaded 1 PC tables (37409 PCs): 37409 [0xa65e48,0xaf8058),
/out/flow_extract_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==2... | cpp | f5129153e3b12c0b9ca6b355f9062d91a67d2942 | https://github.com/openvswitch/ovs/commit/4fe08016068514be7a8751d86f6ad30bde344949 | null |
arvo:9294 | n132/arvo:9294-vul | /src/openvswitch | [
{
"end_line": 689,
"function_name": "ipv6_sanity_check",
"start_line": 670,
"target_file": "/src/openvswitch/lib/flow.c"
}
] | Heap-buffer-overflow READ 2 | openvswitch | asan | INFO: Seed: 4267508276
INFO: Loaded 1 modules (37421 inline 8-bit counters): 37421 [0xe8a3f0, 0xe9361d),
INFO: Loaded 1 PC tables (37421 PCs): 37421 [0xa66128,0xaf83f8),
/out/ofp_print_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==2757... | cpp | f5129153e3b12c0b9ca6b355f9062d91a67d2942 | https://github.com/openvswitch/ovs/commit/4fe08016068514be7a8751d86f6ad30bde344949 | null |
arvo:9808 | n132/arvo:9808-vul | /src/boringssl | [
{
"end_line": 512,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 236,
"target_file": "/src/boringssl/fuzz/ssl_ctx_api.cc"
}
] | Heap-buffer-overflow READ 1 | boringssl | asan | INFO: Seed: 3730282855
INFO: Loaded 1 modules (32124 inline 8-bit counters): 32124 [0xd59d68, 0xd61ae4),
INFO: Loaded 1 PC tables (32124 PCs): 32124 [0x9c86b0,0xa45e70),
/out/ssl_ctx_api: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==484==ERRO... | cpp | 17dc94e87466ac8928096c4f45954989d585cfe5 | https://boringssl.googlesource.com/boringssl/+/ddedf6d455e33d6a0b3bc40581700f3d252029d7%5E%21/ | The SSL_CTX_set1_sigalgs_list function in its current usage expects a NUL-terminated string, but may receive a non-NUL-terminated string if not handled properly, leading to potential security issues. The function should be provided with a NUL-terminated string, such as by using GetString, to avoid this vulnerability. |
arvo:9847 | n132/arvo:9847-vul | /src/file | [
{
"end_line": 243,
"function_name": "json_parse_object",
"start_line": 194,
"target_file": "/src/file/src/is_json.c"
}
] | Heap-buffer-overflow READ 1 | file | asan | INFO: Seed: 3335381564
INFO: Loaded 1 modules (4063 inline 8-bit counters): 4063 [0x923788, 0x924767),
INFO: Loaded 1 PC tables (4063 PCs): 4063 [0x924768,0x934558),
/out/magic_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==11002==ERROR... | cpp | 6382574724f99e4fd2e3b10580d83c9cb103ec5a | https://github.com/file/file/commit/473e039b48fd72660dd00f4b52a2880cc0dd5632 | null |
arvo:992 | n132/arvo:992-vul | /src/file | [
{
"end_line": 1056,
"function_name": "cdf_read_property_info",
"start_line": 909,
"target_file": "/src/file/src/cdf.c"
}
] | Use-of-uninitialized-value | file | msan | INFO: Seed: 2518427820
INFO: Loaded 1 modules (3759 guards): [0xa339e0, 0xa3749c),
/out/magic_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==10654==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x58bcb9 in cdf_file_property_info /src/file/src/readcdf.c:225:29
#1 0x588991 in cdf_file_sum... | cpp | 8a942980f3f705226300f43f4b49a557c0918660 | https://github.com/file/file/commit/fd42e11948eeeece5b17558706cd2426eb447644 | null |
arvo:9922 | n132/arvo:9922-vul | /src/file | [
{
"end_line": 167,
"function_name": "json_parse_string",
"start_line": 118,
"target_file": "/src/file/src/is_json.c"
}
] | Heap-buffer-overflow READ 1 | file | asan | INFO: Seed: 375800122
INFO: Loaded 1 modules (4064 inline 8-bit counters): 4064 [0x923788, 0x924768),
INFO: Loaded 1 PC tables (4064 PCs): 4064 [0x924768,0x934568),
/out/magic_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==11002==ERROR:... | cpp | 473e039b48fd72660dd00f4b52a2880cc0dd5632 | https://github.com/file/file/commit/87f27958cfbb05d262504976f66db70c24d5061f | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.