task_id
stringlengths
8
10
docker_image
stringlengths
17
19
basedir
stringclasses
157 values
target_functions
listlengths
1
3
crash_type
stringclasses
85 values
project_name
stringclasses
157 values
sanitizer
stringclasses
3 values
sanitizer_output
stringlengths
1.13k
6.5M
language
stringclasses
2 values
vuln_commit
stringlengths
40
40
fix
stringlengths
69
110
vulnerability_description
stringlengths
38
824
arvo:8968
n132/arvo:8968-vul
/src/freetype2
[ { "end_line": 229, "function_name": "tt_face_load_cpal", "start_line": 75, "target_file": "/src/freetype2/src/sfnt/ttcpal.c" } ]
Heap-buffer-overflow READ 1
freetype2
asan
INFO: Seed: 566716906 INFO: Loaded 1 modules (19031 inline 8-bit counters): 19031 [0xb43c60, 0xb486b7), INFO: Loaded 1 PC tables (19031 PCs): 19031 [0x874c50,0x8bf1c0), /out/ftfuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==7867==ERROR: ...
cpp
7915fd51f123d0adbe6a0b9ad19eb941e1733c87
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a6b77ba2b39e379cd9295a9376fedf574a6ba15f
A heap buffer overflow exists in the `tt_face_load_cpal` function in `src/sfnt/ttcpal.c` due to insufficient guarding of CPAL version 1 offsets.
arvo:9070
n132/arvo:9070-vul
/src/freetype2
[ { "end_line": 3393, "function_name": "tt_face_vary_cvt", "start_line": 3089, "target_file": "/src/freetype2/src/truetype/ttgxvar.c" } ]
Bad-free
freetype2
asan
INFO: Seed: 3073846597 INFO: Loaded 1 modules (19072 inline 8-bit counters): 19072 [0xad0ed8, 0xad5958), INFO: Loaded 1 PC tables (19072 PCs): 19072 [0x80d6b0,0x857eb0), /out/ftfuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==7818==ERROR:...
cpp
a632fb547e23fe129a579fabf60a992fd7d98d02
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=589d1f0899343b18c3181f35451550dc1b904bef
null
arvo:9079
n132/arvo:9079-vul
/src/freetype2
[ { "end_line": 3393, "function_name": "tt_face_vary_cvt", "start_line": 3089, "target_file": "/src/freetype2/src/truetype/ttgxvar.c" } ]
UNKNOWN READ
freetype2
ubsan
INFO: Seed: 959164486 INFO: Loaded 1 modules (19295 inline 8-bit counters): 19295 [0x8a08b8, 0x8a5417), INFO: Loaded 1 PC tables (19295 PCs): 19295 [0x5efc70,0x63b260), /out/ftfuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSanitizer:DEADLYSIGNAL ==7854==ERROR: UndefinedBehaviorSanitizer...
cpp
a632fb547e23fe129a579fabf60a992fd7d98d02
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=589d1f0899343b18c3181f35451550dc1b904bef
null
arvo:9084
n132/arvo:9084-vul
/src/freetype2
[ { "end_line": 3393, "function_name": "tt_face_vary_cvt", "start_line": 3089, "target_file": "/src/freetype2/src/truetype/ttgxvar.c" } ]
UNKNOWN READ
freetype2
ubsan
INFO: Seed: 2421415247 INFO: Loaded 1 modules (19295 inline 8-bit counters): 19295 [0x8a08b8, 0x8a5417), INFO: Loaded 1 PC tables (19295 PCs): 19295 [0x5efc70,0x63b260), /out/ftfuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSanitizer:DEADLYSIGNAL ==7838==ERROR: UndefinedBehaviorSanitize...
cpp
a632fb547e23fe129a579fabf60a992fd7d98d02
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=589d1f0899343b18c3181f35451550dc1b904bef
null
arvo:9124
n132/arvo:9124-vul
/src/aom
[ { "end_line": 2773, "function_name": "tile_worker_hook_init", "start_line": 2731, "target_file": "/src/aom/av1/decoder/decodeframe.c" }, { "end_line": 2810, "function_name": "tile_worker_hook", "start_line": 2775, "target_file": "/src/aom/av1/decoder/decodeframe.c" } ]
Index-out-of-bounds
aom
ubsan
INFO: Seed: 3414122278 INFO: Loaded 1 modules (72394 inline 8-bit counters): 72394 [0x1299380, 0x12aae4a), INFO: Loaded 1 PC tables (72394 PCs): 72394 [0x12aae50,0x13c5af0), /out/av1_dec_fuzzer_threaded: Running 1 inputs 1 time(s) each. Running: /tmp/poc /src/aom/av1/common/txb_common.h:675:29: runtime error: index...
cpp
6c5d07efa2b887fee25836e85a9f50f897c6c806
https://aomedia.googlesource.com/aom/+/1f68feef03dd9d5b5a4cac0a8f69b9f4cb1da915%5E%21/
null
arvo:9180
n132/arvo:9180-vul
/src/librawspeed
[ { "end_line": 463, "function_name": "ArwDecoder::GetWB", "start_line": 402, "target_file": "/src/librawspeed/src/librawspeed/decoders/ArwDecoder.cpp" } ]
Use-of-uninitialized-value
librawspeed
msan
INFO: Seed: 787102424 INFO: Loaded 1 modules (12643 inline 8-bit counters): 12643 [0xca89f0, 0xcabb53), INFO: Loaded 1 PC tables (12643 PCs): 12643 [0xcabb58,0xcdd188), /out/TiffDecoderFuzzer-ArwDecoder: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==6593==WARNING: MemorySanitizer: use-of-uninitialized-value ...
cpp
2c4bdfd42340ef006e330280f6d59000da6f2e8d
https://github.com/darktable-org/rawspeed/commit/77a1a1f0b7b7367b345afd484a22d5585ee410d6
The vulnerability in ArwDecoder::GetWB() occurs because the encrypted area is not rounded down to a multiple of 4, which can lead to issues detected by memory sanitizers.
arvo:9188
n132/arvo:9188-vul
/src/aom
[ { "end_line": 1516, "function_name": "decode_partition", "start_line": 1404, "target_file": "/src/aom/av1/decoder/decodeframe.c" }, { "end_line": 2773, "function_name": "tile_worker_hook_init", "start_line": 2731, "target_file": "/src/aom/av1/decoder/decodeframe.c" }, { "...
Index-out-of-bounds
aom
ubsan
INFO: Seed: 1996167617 INFO: Loaded 1 modules (72394 inline 8-bit counters): 72394 [0x1299380, 0x12aae4a), INFO: Loaded 1 PC tables (72394 PCs): 72394 [0x12aae50,0x13c5af0), /out/av1_dec_fuzzer_threaded: Running 1 inputs 1 time(s) each. Running: /tmp/poc /src/aom/av1/common/blockd.h:921:25: runtime error: index 255...
cpp
6c5d07efa2b887fee25836e85a9f50f897c6c806
https://aomedia.googlesource.com/aom/+/1f68feef03dd9d5b5a4cac0a8f69b9f4cb1da915%5E%21/
null
arvo:9230
n132/arvo:9230-vul
/src/wireshark
[ { "end_line": 1332, "function_name": "expand_dns_name", "start_line": 1153, "target_file": "/src/wireshark/epan/dissectors/packet-dns.c" } ]
Heap-buffer-overflow WRITE 2
wireshark
asan
oss-fuzzshark: disabling: ip oss-fuzzshark: disabling: udp oss-fuzzshark: disabling: udplite oss-fuzzshark: disabling: ospf oss-fuzzshark: disabling: bgp oss-fuzzshark: disabling: json oss-fuzzshark: disabling: snort oss-fuzzshark: configured for dissector: bootp in table: udp.port INFO: Seed: 2091284779 INFO: Loaded 1...
cpp
6f665e36edb3c8d748682c2702b952656c6c273b
https://github.com/wireshark/wireshark/commit/5a560f3f6aa2cbfad957cf6223e50c3b61ef575b
A buffer overflow vulnerability exists in the DNS code due to an off-by-one error when writing to a buffer. The "maxname" variable represents the size of the buffer, including the "null label" (NUL byte), but the code writes past the end of the buffer. This can result in a write buffer overflow.
arvo:9287
n132/arvo:9287-vul
/src/openvswitch
[ { "end_line": 689, "function_name": "ipv6_sanity_check", "start_line": 670, "target_file": "/src/openvswitch/lib/flow.c" } ]
Heap-buffer-overflow READ 1
openvswitch
asan
INFO: Seed: 3983540721 INFO: Loaded 1 modules (37409 inline 8-bit counters): 37409 [0xe89370, 0xe92591), INFO: Loaded 1 PC tables (37409 PCs): 37409 [0xa65e48,0xaf8058), /out/flow_extract_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==2...
cpp
f5129153e3b12c0b9ca6b355f9062d91a67d2942
https://github.com/openvswitch/ovs/commit/4fe08016068514be7a8751d86f6ad30bde344949
null
arvo:9294
n132/arvo:9294-vul
/src/openvswitch
[ { "end_line": 689, "function_name": "ipv6_sanity_check", "start_line": 670, "target_file": "/src/openvswitch/lib/flow.c" } ]
Heap-buffer-overflow READ 2
openvswitch
asan
INFO: Seed: 4267508276 INFO: Loaded 1 modules (37421 inline 8-bit counters): 37421 [0xe8a3f0, 0xe9361d), INFO: Loaded 1 PC tables (37421 PCs): 37421 [0xa66128,0xaf83f8), /out/ofp_print_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==2757...
cpp
f5129153e3b12c0b9ca6b355f9062d91a67d2942
https://github.com/openvswitch/ovs/commit/4fe08016068514be7a8751d86f6ad30bde344949
null
arvo:9808
n132/arvo:9808-vul
/src/boringssl
[ { "end_line": 512, "function_name": "LLVMFuzzerTestOneInput", "start_line": 236, "target_file": "/src/boringssl/fuzz/ssl_ctx_api.cc" } ]
Heap-buffer-overflow READ 1
boringssl
asan
INFO: Seed: 3730282855 INFO: Loaded 1 modules (32124 inline 8-bit counters): 32124 [0xd59d68, 0xd61ae4), INFO: Loaded 1 PC tables (32124 PCs): 32124 [0x9c86b0,0xa45e70), /out/ssl_ctx_api: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==484==ERRO...
cpp
17dc94e87466ac8928096c4f45954989d585cfe5
https://boringssl.googlesource.com/boringssl/+/ddedf6d455e33d6a0b3bc40581700f3d252029d7%5E%21/
The SSL_CTX_set1_sigalgs_list function in its current usage expects a NUL-terminated string, but may receive a non-NUL-terminated string if not handled properly, leading to potential security issues. The function should be provided with a NUL-terminated string, such as by using GetString, to avoid this vulnerability.
arvo:9847
n132/arvo:9847-vul
/src/file
[ { "end_line": 243, "function_name": "json_parse_object", "start_line": 194, "target_file": "/src/file/src/is_json.c" } ]
Heap-buffer-overflow READ 1
file
asan
INFO: Seed: 3335381564 INFO: Loaded 1 modules (4063 inline 8-bit counters): 4063 [0x923788, 0x924767), INFO: Loaded 1 PC tables (4063 PCs): 4063 [0x924768,0x934558), /out/magic_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==11002==ERROR...
cpp
6382574724f99e4fd2e3b10580d83c9cb103ec5a
https://github.com/file/file/commit/473e039b48fd72660dd00f4b52a2880cc0dd5632
null
arvo:992
n132/arvo:992-vul
/src/file
[ { "end_line": 1056, "function_name": "cdf_read_property_info", "start_line": 909, "target_file": "/src/file/src/cdf.c" } ]
Use-of-uninitialized-value
file
msan
INFO: Seed: 2518427820 INFO: Loaded 1 modules (3759 guards): [0xa339e0, 0xa3749c), /out/magic_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==10654==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x58bcb9 in cdf_file_property_info /src/file/src/readcdf.c:225:29 #1 0x588991 in cdf_file_sum...
cpp
8a942980f3f705226300f43f4b49a557c0918660
https://github.com/file/file/commit/fd42e11948eeeece5b17558706cd2426eb447644
null
arvo:9922
n132/arvo:9922-vul
/src/file
[ { "end_line": 167, "function_name": "json_parse_string", "start_line": 118, "target_file": "/src/file/src/is_json.c" } ]
Heap-buffer-overflow READ 1
file
asan
INFO: Seed: 375800122 INFO: Loaded 1 modules (4064 inline 8-bit counters): 4064 [0x923788, 0x924768), INFO: Loaded 1 PC tables (4064 PCs): 4064 [0x924768,0x934568), /out/magic_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==11002==ERROR:...
cpp
473e039b48fd72660dd00f4b52a2880cc0dd5632
https://github.com/file/file/commit/87f27958cfbb05d262504976f66db70c24d5061f
null