You need to agree to share your contact information to access this dataset

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this dataset content.

YAML Metadata Warning:empty or missing yaml metadata in repo card

Check out the documentation for more information.

SEGV in executorch-deep (id:000291,sig:11,src:000253+000273,time:6460005,execs:3199059,op:splice,rep:2)

Severity: medium CWE: CWE-119 Target: executorch-deep Generated: 2026-02-21

Summary

SEGV in executorch-deep (id:000291,sig:11,src:000253+000273,time:6460005,execs:3199059,op:splice,rep:2). See ASAN output below for details.

Reproduction

chmod +x reproduce.sh
./reproduce.sh

Or manually:

# Build target with ASAN
# Run: <target> poc.pte

PoC File

  • poc.pte (64 bytes)

ASAN Output

E 00:00:00.085684 executorch:memory_allocator.h:109] Memory allocation failed: 4B requested (adjusted for alignment), 0B available
E 00:00:00.085731 executorch:method.cpp:582] Failed parsing tensor at index 1: 0x21
AddressSanitizer:DEADLYSIGNAL
=================================================================
==2650215==ERROR: AddressSanitizer: SEGV on unknown address 0x5190001600ec (pc 0x609c4447d231 bp 0x7ffc0fbac800 sp 0x7ffc0fbac7d0 T0)
==2650215==The signal is caused by a READ memory access.
    #0 0x609c4447d231 in int flatbuffers::ReadScalar<int>(void const*) /home/lab/huntr/targets/executorch/third-party/flatbuffers/include/flatbuffers/base.h:428:23
    #1 0x609c4447d231 in flatbuffers::Table::GetVTable() const /home/lab/huntr/targets/executorch/third-party/flatbuffers/include/flatbuffers/table.h:30:20
    #2 0x609c4447d231 in flatbuffers::Table::GetOptionalFieldOffset(unsigned short) const /home/lab/huntr/targets/executorch/third-party/flatbuffers/include/flatbuffers/table.h:37:19
    #3 0x609c4447d231 in flatbuffers::String const* flatbuffers::Table::GetPointer<flatbuffers::String const*, unsigned int>(unsigned short) /home/lab/huntr/targets/executorch/third-party/flatbuffers/include/flatbuffers/table.h:52:25
    #4 0x609c4449ef66 in flatbuffers::String const* flatbuffers::Table::GetPointer<flatbuffers::String const*, unsigned int>(unsigned short) const /home/lab/huntr/targets/executorch/third-party/flatbuffers/include/flatbuffers/table.h:59:39
    #5 0x609c4449ef66 in executorch_flatbuffer::ExecutionPlan::name() const /home/lab/huntr/targets/executorch/cmake-out/schema/include/executorch/schema/program_generated.h:2387:12
    #6 0x609c4449ef66 in executorch::runtime::Program::get_method_name(unsigned long) const /home/lab/huntr/targets/executorch/runtime/executor/program.cpp:291:68
    #7 0x609c443f11c0 in main /home/lab/huntr/harnesses/executorch/fuzz_pte_method_load.cpp:58:36
    #8 0x7810a0e2a1c9 in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16
    #9 0x7810a0e2a28a in __libc_start_main csu/../csu/libc-start.c:360:3
    #10 0x609c443124a4 in _start (/home/lab/huntr/harnesses/executorch/fuzz_pte_method_load+0x844a4) (BuildId: 109100ce7539f4c6b730090333ef09e7b018569a)

AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/lab/huntr/targets/executorch/third-party/flatbuffers/include/flatbuffers/base.h:428:23 in int flatbuffers::ReadScalar<int>(void const*)
==2650215==ABORTING

Impact

Memory corruption vulnerability reachable by processing a malformed executorch-deep file. An attacker could craft a malicious file and distribute it to cause denial of service or potentially leak sensitive heap data.

Downloads last month
7