YAML Metadata Warning:empty or missing yaml metadata in repo card
Check out the documentation for more information.
SEGV in executorch-deep (id:000291,sig:11,src:000253+000273,time:6460005,execs:3199059,op:splice,rep:2)
Severity: medium CWE: CWE-119 Target: executorch-deep Generated: 2026-02-21
Summary
SEGV in executorch-deep (id:000291,sig:11,src:000253+000273,time:6460005,execs:3199059,op:splice,rep:2). See ASAN output below for details.
Reproduction
chmod +x reproduce.sh
./reproduce.sh
Or manually:
# Build target with ASAN
# Run: <target> poc.pte
PoC File
poc.pte(64 bytes)
ASAN Output
E 00:00:00.085684 executorch:memory_allocator.h:109] Memory allocation failed: 4B requested (adjusted for alignment), 0B available
E 00:00:00.085731 executorch:method.cpp:582] Failed parsing tensor at index 1: 0x21
AddressSanitizer:DEADLYSIGNAL
=================================================================
==2650215==ERROR: AddressSanitizer: SEGV on unknown address 0x5190001600ec (pc 0x609c4447d231 bp 0x7ffc0fbac800 sp 0x7ffc0fbac7d0 T0)
==2650215==The signal is caused by a READ memory access.
#0 0x609c4447d231 in int flatbuffers::ReadScalar<int>(void const*) /home/lab/huntr/targets/executorch/third-party/flatbuffers/include/flatbuffers/base.h:428:23
#1 0x609c4447d231 in flatbuffers::Table::GetVTable() const /home/lab/huntr/targets/executorch/third-party/flatbuffers/include/flatbuffers/table.h:30:20
#2 0x609c4447d231 in flatbuffers::Table::GetOptionalFieldOffset(unsigned short) const /home/lab/huntr/targets/executorch/third-party/flatbuffers/include/flatbuffers/table.h:37:19
#3 0x609c4447d231 in flatbuffers::String const* flatbuffers::Table::GetPointer<flatbuffers::String const*, unsigned int>(unsigned short) /home/lab/huntr/targets/executorch/third-party/flatbuffers/include/flatbuffers/table.h:52:25
#4 0x609c4449ef66 in flatbuffers::String const* flatbuffers::Table::GetPointer<flatbuffers::String const*, unsigned int>(unsigned short) const /home/lab/huntr/targets/executorch/third-party/flatbuffers/include/flatbuffers/table.h:59:39
#5 0x609c4449ef66 in executorch_flatbuffer::ExecutionPlan::name() const /home/lab/huntr/targets/executorch/cmake-out/schema/include/executorch/schema/program_generated.h:2387:12
#6 0x609c4449ef66 in executorch::runtime::Program::get_method_name(unsigned long) const /home/lab/huntr/targets/executorch/runtime/executor/program.cpp:291:68
#7 0x609c443f11c0 in main /home/lab/huntr/harnesses/executorch/fuzz_pte_method_load.cpp:58:36
#8 0x7810a0e2a1c9 in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16
#9 0x7810a0e2a28a in __libc_start_main csu/../csu/libc-start.c:360:3
#10 0x609c443124a4 in _start (/home/lab/huntr/harnesses/executorch/fuzz_pte_method_load+0x844a4) (BuildId: 109100ce7539f4c6b730090333ef09e7b018569a)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/lab/huntr/targets/executorch/third-party/flatbuffers/include/flatbuffers/base.h:428:23 in int flatbuffers::ReadScalar<int>(void const*)
==2650215==ABORTING
Impact
Memory corruption vulnerability reachable by processing a malformed executorch-deep file. An attacker could craft a malicious file and distribute it to cause denial of service or potentially leak sensitive heap data.
- Downloads last month
- 7