task_id stringlengths 8 10 | docker_image stringlengths 17 19 | basedir stringclasses 157
values | target_functions listlengths 1 3 | crash_type stringclasses 85
values | project_name stringclasses 157
values | sanitizer stringclasses 3
values | sanitizer_output stringlengths 1.13k 6.5M | language stringclasses 2
values | vuln_commit stringlengths 40 40 | fix stringlengths 69 110 | vulnerability_description stringlengths 38 824 ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
arvo:10222 | n132/arvo:10222-vul | /src/radare2 | [
{
"end_line": 731,
"function_name": "r_bin_mdmp_init_directory",
"start_line": 708,
"target_file": "/src/radare2/libr/bin/format/mdmp/mdmp.c"
}
] | Heap-buffer-overflow READ 8 | radare2 | asan | INFO: Seed: 1556718792
INFO: Loaded 1 modules (157202 inline 8-bit counters): 157202 [0x25919d0, 0x25b7fe2),
INFO: Loaded 1 PC tables (157202 PCs): 157202 [0x25b7fe8,0x281e108),
/out/ia_fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
3
[ERROR] Size Mismatch - Stream data is larger than file size!
[ERROR] S... | cpp | ef5c59e0d443c5af25ddfc7e5c33cc6ba1e65f6b | https://github.com/radare/radare2/commit/533da1306534ece22d67eaa3c32e46b717cd9199 | null |
arvo:10252 | n132/arvo:10252-vul | /src/aom | [
{
"end_line": 769,
"function_name": "foreach_rest_unit_in_planes_mt",
"start_line": 708,
"target_file": "/src/aom/av1/common/thread_common.c"
}
] | Heap-buffer-overflow WRITE 4 | aom | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/av1_dec_fuzzer_threaded < INPUT_FILE
or
/out/av1_dec_fuzzer_threaded INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags... | cpp | 8ae39302e354781ba03012d4f211da97e1715f9c | https://aomedia.googlesource.com/aom/+/32017745b0b4cb6d69ced6250dd67d9faf6282f8%5E%21/ | A vulnerability exists in the loop restoration multi-threading code where, when luma loop restoration is disabled, the initialization of cur_sb_col in lr_sync does not occur correctly. |
arvo:10486 | n132/arvo:10486-vul | /src/libssh | [
{
"end_line": 1300,
"function_name": "ssh_buffer_unpack_va",
"start_line": 1083,
"target_file": "/src/libssh/src/buffer.c"
}
] | Stack-buffer-overflow READ 8 | libssh | asan | INFO: Seed: 1418098331
INFO: Loaded 1 modules (6761 inline 8-bit counters): 6761 [0xb64588, 0xb65ff1),
INFO: Loaded 1 PC tables (6761 PCs): 6761 [0x89f0a0,0x8b9730),
/out/libssh_server_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==4310... | cpp | 5123f7955b67341e946987642354c0b123f5e1ff | https://git.libssh.org/projects/libssh.git07f7fa7806e94ccaa271c185213afed80e13a77d | An invalid memory access occurs in the function ssh_buffer_unpack() in the buffer component. |
arvo:10487 | n132/arvo:10487-vul | /src/radare2 | [
{
"end_line": 731,
"function_name": "r_bin_mdmp_init_directory",
"start_line": 708,
"target_file": "/src/radare2/libr/bin/format/mdmp/mdmp.c"
}
] | Heap-buffer-overflow READ 1 | radare2 | asan | INFO: Seed: 2320425810
INFO: Loaded 1 modules (157202 inline 8-bit counters): 157202 [0x25919d0, 0x25b7fe2),
INFO: Loaded 1 PC tables (157202 PCs): 157202 [0x25b7fe8,0x281e108),
/out/ia_fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
3
[ERROR] Size Mismatch - Stream data is larger than file size!
[ERROR] S... | cpp | ef5c59e0d443c5af25ddfc7e5c33cc6ba1e65f6b | https://github.com/radare/radare2/commit/533da1306534ece22d67eaa3c32e46b717cd9199 | null |
arvo:10604 | n132/arvo:10604-vul | /src/open62541 | [
{
"end_line": 63,
"function_name": "removeSecureChannel",
"start_line": 48,
"target_file": "/src/open62541/src/server/ua_securechannel_manager.c"
},
{
"end_line": 794,
"function_name": "UA_Server_processBinaryMessage",
"start_line": 757,
"target_file": "/src/open62541/src/server/... | Use-of-uninitialized-value | open62541 | msan | INFO: Seed: 1432192114
INFO: Loaded 1 modules (7027 inline 8-bit counters): 7027 [0xbfa488, 0xbfbffb),
INFO: Loaded 1 PC tables (7027 PCs): 7027 [0xbfc000,0xc17730),
/out/fuzz_binary_message: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==994==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x5322... | cpp | 454b81b3ae282d93c2cbfad3530568a0ff358dd9 | https://github.com/open62541/open62541/commit/27dc05196fc43036a2efcea060ae3711b3209cf2 | null |
arvo:10628 | n132/arvo:10628-vul | /src/botan | [
{
"end_line": 79,
"function_name": "ref_oneandzero_unpad",
"start_line": 54,
"target_file": "/src/botan/src/fuzzer/mode_padding.cpp"
}
] | Heap-buffer-overflow READ 1 | botan | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/mode_padding < INPUT_FILE
or
/out/mode_padding INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/mode_padding [-... | cpp | 97c7a8bf1d8af210b300b4d88a488b1c4cdaaa97 | https://github.com/randombit/botan/commit/b859e175a0f2357dcfe2211ca487a7bde0e971b1 | A crash occurs in the reference version of 1and0 padding in the mode padding fuzzer when processing an all-zero input. |
arvo:1065 | n132/arvo:1065-vul | /src/file | [
{
"end_line": 515,
"function_name": "file_regexec",
"start_line": 507,
"target_file": "/src/file/src/funcs.c"
}
] | Use-of-uninitialized-value | file | msan | INFO: Seed: 1089329789
INFO: Loaded 1 modules (3771 guards): [0xa2f9a0, 0xa3348c),
/out/magic_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==10654==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x590726 in match /src/file/src/softmagic.c:365:9
#1 0x58d2d3 in file_softmagic /src/file/src... | cpp | 9b193be08bf7ecd374cd799844032671e869a1bf | https://github.com/file/file/commit/393dafa41b26a7d8ed593912e0ec1f1e7bd4e406 | A bug in glibc/regex/msan causes regexec to return 0 but not initialize pmatch. |
arvo:10811 | n132/arvo:10811-vul | /src/wireshark | [
{
"end_line": 12041,
"function_name": "next_he_scidx",
"start_line": 11910,
"target_file": "/src/wireshark/epan/dissectors/packet-ieee80211.c"
}
] | Global-buffer-overflow READ 4 | wireshark | asan | oss-fuzzshark: disabling: ip
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: bgp
oss-fuzzshark: disabling: dhcp
oss-fuzzshark: disabling: json
oss-fuzzshark: disabling: snort
oss-fuzzshark: configured for dissector: udp in table: ip.proto
INFO: Seed: 1770710604
INFO: Loaded 1 ... | cpp | 74903893d8be058bb51268d2b5e748e3ea2d9053 | https://github.com/wireshark/wireshark/commit/ff73c307fae57fdb12e2fbbca87b9810d8b9cd27 | null |
arvo:10816 | n132/arvo:10816-vul | /src/wireshark | [
{
"end_line": 12041,
"function_name": "next_he_scidx",
"start_line": 11910,
"target_file": "/src/wireshark/epan/dissectors/packet-ieee80211.c"
}
] | Index-out-of-bounds | wireshark | ubsan | oss-fuzzshark: disabling: ip
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: bgp
oss-fuzzshark: disabling: dhcp
oss-fuzzshark: disabling: json
oss-fuzzshark: disabling: snort
oss-fuzzshark: configured for dissector: udp in table: ip.proto
INFO: Seed: 295136063
INFO: Loaded 1 m... | cpp | 74903893d8be058bb51268d2b5e748e3ea2d9053 | https://github.com/wireshark/wireshark/commit/ff73c307fae57fdb12e2fbbca87b9810d8b9cd27 | null |
arvo:10841 | n132/arvo:10841-vul | /src/librawspeed | [
{
"end_line": 54,
"function_name": "PhaseOneDecompressor::PhaseOneDecompressor",
"start_line": 38,
"target_file": "/src/librawspeed/src/librawspeed/decompressors/PhaseOneDecompressor.cpp"
}
] | Use-of-uninitialized-value | librawspeed | msan | INFO: Seed: 3104927159
INFO: Loaded 1 modules (1387 inline 8-bit counters): 1387 [0xa20870, 0xa20ddb),
INFO: Loaded 1 PC tables (1387 PCs): 1387 [0xa20de0,0xa26490),
/out/PhaseOneDecompressorFuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialized bytes in __msan_check_mem_is_initialized at offset 0... | cpp | fb1a40c2d9585e9af75ea8a17ad78b10564991bf | https://github.com/darktable-org/rawspeed/commit/27808d5a8dc8d13c64e88c0a819f5cd29b274979 | The PhaseOneDecompressor does not validate the 'strips' vector (the rows it specifies), assuming it is always correct as in the proper IIQDecoder. This allows incorrect 'strips' to be processed, resulting in broken images. |
arvo:10850 | n132/arvo:10850-vul | /src/openvswitch | [
{
"end_line": 5551,
"function_name": "parse_odp_key_mask_attr",
"start_line": 5364,
"target_file": "/src/openvswitch/lib/odp-util.c"
}
] | Heap-buffer-overflow READ 1 | openvswitch | asan | INFO: Seed: 1676868116
INFO: Loaded 1 modules (38168 inline 8-bit counters): 38168 [0xea6f20, 0xeb0438),
INFO: Loaded 1 PC tables (38168 PCs): 38168 [0xa7a868,0xb0f9e8),
/out/odp_target: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==29017==ERR... | cpp | 7587e1daa673149575149716605ef78f260d9989 | https://github.com/openvswitch/ovs/commit/a1da3f297717c2de70dab88f7783117b78f85e89 | null |
arvo:10863 | n132/arvo:10863-vul | /src/openvswitch | [
{
"end_line": 2141,
"function_name": "parse_odp_push_nsh_action",
"start_line": 2031,
"target_file": "/src/openvswitch/lib/odp-util.c"
}
] | Use-of-uninitialized-value | openvswitch | msan | INFO: Seed: 2546583034
INFO: Loaded 1 modules (38478 inline 8-bit counters): 38478 [0x11682f8, 0x1171946),
INFO: Loaded 1 PC tables (38478 PCs): 38478 [0xda1870,0xe37d50),
/out/odp_target: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==29384==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x72899... | cpp | c3a08624975cf42489e8e1710babccc8d0569c85 | https://github.com/openvswitch/ovs/commit/2e38f13d70a9c049497a8cab681fe7b1f443c8b1 | A vulnerability exists in odp-util within the parse_odp_push_nsh_action function, where 'struct ofpbuf b' is expected to always point to metadata so that metadata can be filled with values through ofpbuf operations such as ofpbuf_put_hex and ofpbuf_push_zeros. However, the use of ofpbuf_push_zeros may change the data p... |
arvo:10864 | n132/arvo:10864-vul | /src/wpantund | [
{
"end_line": 929,
"function_name": "NCPInstanceBase::on_mesh_prefix_was_removed",
"start_line": 888,
"target_file": "/src/wpantund/src/wpantund/NCPInstanceBase-Addresses.cpp"
}
] | Heap-use-after-free READ 4 | wpantund | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/wpantund-fuzz < INPUT_FILE
or
/out/wpantund-fuzz INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/wpantund-fuzz... | cpp | 8a8c7f7621dea86aa3136444561facf141e65512 | https://github.com/openthread/wpantund/commit/bd1361434619a52b296e6a94c4188aae1a693179 | A "use after delete" vulnerability exists in the on_mesh_prefix_was_removed() function. |
arvo:10865 | n132/arvo:10865-vul | /src/openvswitch | [
{
"end_line": 2141,
"function_name": "parse_odp_push_nsh_action",
"start_line": 2031,
"target_file": "/src/openvswitch/lib/odp-util.c"
}
] | Stack-buffer-overflow READ {*} | openvswitch | asan | INFO: Seed: 1915738978
INFO: Loaded 1 modules (38220 inline 8-bit counters): 38220 [0xea8240, 0xeb178c),
INFO: Loaded 1 PC tables (38220 PCs): 38220 [0xa7b928,0xb10de8),
/out/odp_target: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==29144==ERR... | cpp | 581d3bec7b8c714a98744b0b5f48dd7c7c4db037 | https://github.com/openvswitch/ovs/commit/33a3ee6b39acd9799301ec6cc0069bc9e4b4428b | A buffer overflow vulnerability exists in odp-util when parsing push_nsh, because the buffer size of 'struct ofpbuf b' is less than the size of 'char buf[512]'. This can cause memory overflow of ofpbuf when calling ofpbuf_put_hex. |
arvo:10945 | n132/arvo:10945-vul | /src/openvswitch | [
{
"end_line": 5551,
"function_name": "parse_odp_key_mask_attr",
"start_line": 5364,
"target_file": "/src/openvswitch/lib/odp-util.c"
}
] | Use-of-uninitialized-value | openvswitch | msan | INFO: Seed: 1620371529
INFO: Loaded 1 modules (38125 inline 8-bit counters): 38125 [0x1159fb8, 0x11634a5),
INFO: Loaded 1 PC tables (38125 PCs): 38125 [0xd95400,0xe2a2d0),
/out/odp_target: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==29026==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x88b57... | cpp | 7587e1daa673149575149716605ef78f260d9989 | https://github.com/openvswitch/ovs/commit/a1da3f297717c2de70dab88f7783117b78f85e89 | null |
arvo:10999 | n132/arvo:10999-vul | /src/libgit2 | [
{
"end_line": 160,
"function_name": "tag_parse",
"start_line": 68,
"target_file": "/src/libgit2/src/tag.c"
}
] | Heap-buffer-overflow READ 2 | libgit2 | asan | INFO: Seed: 1582894454
INFO: Loaded 1 modules (27409 inline 8-bit counters): 27409 [0xe07350, 0xe0de61),
INFO: Loaded 1 PC tables (27409 PCs): 27409 [0xadbbc0,0xb46cd0),
/out/objects_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==2647==... | cpp | 4c738e563d0a52c7f06902a6bdac37fe3472b86b | https://github.com/libgit2/libgit2/commit/ee11d47e3d907b66eeff99e0ba1e1c71e05164b7 | An out of bounds read occurs when searching for the tag message during tag parsing. The code uses `strstr(buffer, "\n\n")` to locate the separator between tag fields and the tag message, but since `strstr` does not accept a buffer length, it may read past the end of the buffer. This can result in `strstr` returning a p... |
arvo:11007 | n132/arvo:11007-vul | /src/libgit2 | [
{
"end_line": 478,
"function_name": "git_commit__parse_raw",
"start_line": 386,
"target_file": "/src/libgit2/src/commit.c"
}
] | Heap-buffer-overflow READ 1 | libgit2 | asan | INFO: Seed: 1435506579
INFO: Loaded 1 modules (27478 inline 8-bit counters): 27478 [0xe0a7d0, 0xe11326),
INFO: Loaded 1 PC tables (27478 PCs): 27478 [0xadec00,0xb4a160),
/out/objects_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==2656==... | cpp | 11d33df802b00acf5ef1e437c12751b3e6a5d39b | https://github.com/libgit2/libgit2/commit/cb23c3efd22d34db279ceb39cc312473761db5ed | An out-of-bound read occurs when parsing truncated author fields in commit objects. The commit parser handles multiple author fields by checking if a line starts with "author " using `git__prefixcmp`. If given a non-NUL-terminated string that ends immediately after the space, the comparison may read one byte out of bou... |
arvo:11011 | n132/arvo:11011-vul | /src/libarchive | [
{
"end_line": 1861,
"function_name": "init_unpack",
"start_line": 1837,
"target_file": "/src/libarchive/libarchive/archive_read_support_format_rar5.c"
}
] | Heap-buffer-overflow WRITE 1 | libarchive | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/libarchive_fuzzer < INPUT_FILE
or
/out/libarchive_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/libar... | cpp | 84f7fd01b68127454fcee321086b771bdc230630 | https://github.com/libarchive/libarchive/commit/b52dd6c9e4ef7cf95c2a6ae5ab7ccac7f6d462a1 | A vulnerability exists where the mask is not set to 0 for directories, which can lead to buffer overflows due to incorrect truncation of the window. |
arvo:11078 | n132/arvo:11078-vul | /src/librawspeed | [
{
"end_line": 619,
"function_name": "VC5Decompressor::parseLargeCodeblock",
"start_line": 549,
"target_file": "/src/librawspeed/src/librawspeed/decompressors/VC5Decompressor.cpp"
}
] | Use-of-uninitialized-value | librawspeed | msan | INFO: Seed: 3246793481
INFO: Loaded 1 modules (1869 inline 8-bit counters): 1869 [0xa40e50, 0xa4159d),
INFO: Loaded 1 PC tables (1869 PCs): 1869 [0xa415a0,0xa48a70),
/out/VC5DecompressorFuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
VC5DecompressorFuzzer: /src/librawspeed/src/librawspeed/common/Optional... | cpp | 732a81d2bbe06dfe3bd4eef836d8f874fe718978 | https://github.com/darktable-org/rawspeed/commit/7473d21494834f72f984b0e2a06346bd68fb6e1c | A vulnerability exists in VC5Decompressor where Optional tags are not properly handled, leading to potential assertion failures. |
arvo:11170 | n132/arvo:11170-vul | /src/openvswitch | [
{
"end_line": 4843,
"function_name": "scan_vxlan_gbp",
"start_line": 4802,
"target_file": "/src/openvswitch/lib/odp-util.c"
}
] | Heap-buffer-overflow READ 1 | openvswitch | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/odp_target < INPUT_FILE
or
/out/odp_target INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/odp_target [-N]
afl... | cpp | f31b8ae7a7a777dd9dc40997903a283409674eae | https://github.com/openvswitch/ovs/commit/2d3deb58df05c4686f19ecf16ddbd76a79b2d5a5 | null |
arvo:11173 | n132/arvo:11173-vul | /src/libgit2 | [
{
"end_line": 164,
"function_name": "git__strntol64",
"start_line": 71,
"target_file": "/src/libgit2/src/util.c"
}
] | Heap-buffer-overflow READ 1 | libgit2 | asan | Reading 58 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/objects_fuzzer < INPUT_FILE
or
/out/objects_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fu... | cpp | b5ae83bfac53fa3a17435ebf2fc3b79db8055dae | https://github.com/libgit2/libgit2/commit/41863a00f0d811c659c9ba87ae2cc0c3aae5a77f | The git__strntol family of functions accepts and skips leading spaces, but does not honor the provided buffer's length when doing so. This can lead to out-of-bounds reads if the input is not a simple NUL-terminated string. Additionally, when leading space is trimmed, the function advances the pointer without updating t... |
arvo:11196 | n132/arvo:11196-vul | /src/libarchive | [
{
"end_line": 2764,
"function_name": "merge_block",
"start_line": 2673,
"target_file": "/src/libarchive/libarchive/archive_read_support_format_rar5.c"
}
] | Heap-buffer-overflow READ 1 | libarchive | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/libarchive_fuzzer < INPUT_FILE
or
/out/libarchive_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/libar... | cpp | c3d742c9836f352af573d485aca9d312ed1320d5 | https://github.com/libarchive/libarchive/commit/4bc5892128a042780f167ac35aa72f63c426f3b7 | null |
arvo:11253 | n132/arvo:11253-vul | /src/openvswitch | [
{
"end_line": 480,
"function_name": "ofpbuf_insert",
"start_line": 468,
"target_file": "/src/openvswitch/lib/ofpbuf.c"
}
] | Heap-buffer-overflow WRITE {*} | openvswitch | asan | Reading 32 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/ofctl_parse_target < INPUT_FILE
or
/out/ofctl_parse_target INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
... | cpp | b48aa1437df1d438d39d7c798ef93e0854911022 | https://github.com/openvswitch/ovs/commit/39976b99178eaa4862c43eaf00959f2653a01a6f | An arithmetic error in the ofpbuf_insert() function in ofpbuf causes the memmove byte count to be calculated incorrectly, because ofpbuf_put_uninit increases b->size by n. This results in an incorrect number of bytes being moved during buffer operations. |
arvo:11263 | n132/arvo:11263-vul | /src/harfbuzz | [
{
"end_line": 102,
"function_name": "test_face",
"start_line": 35,
"target_file": "/src/harfbuzz/test/api/test-ot-face.c"
}
] | Heap-buffer-overflow READ {*} | harfbuzz | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/hb-shape-fuzzer < INPUT_FILE
or
/out/hb-shape-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/hb-shape-... | cpp | 252632c477b963f305116d69fcafacd8bf7b97bf | https://github.com/harfbuzz/harfbuzz/commit/6482fda519ca7d173e3bcb3717aa30e237f04b25 | null |
arvo:11300 | n132/arvo:11300-vul | /src/yara | [
{
"end_line": 1359,
"function_name": "dotnet_parse_tilde_2",
"start_line": 342,
"target_file": "/src/yara/libyara/modules/dotnet.c"
}
] | UNKNOWN READ | yara | msan | INFO: Seed: 2199298579
INFO: Loaded 1 modules (7698 inline 8-bit counters): 7698 [0xb2ac48, 0xb2ca5a),
INFO: Loaded 1 PC tables (7698 PCs): 7698 [0x89c9a0,0x8baac0),
/out/dotnet_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:DEADLYSIGNAL
==37394==ERROR: MemorySanitizer: SEGV on unknown a... | cpp | ab99479c96ba9759193b3b1f42089e5fe1b647f6 | https://github.com/VirusTotal/yara/commit/72c109ea85f1434237a292de3478f53554989453 | null |
arvo:11359 | n132/arvo:11359-vul | /src/radare2 | [
{
"end_line": 252,
"function_name": "r_core_task_decref",
"start_line": 240,
"target_file": "/src/radare2/libr/core/task.c"
}
] | Heap-use-after-free READ 8 | radare2 | asan | INFO: Seed: 1412606771
INFO: Loaded 1 modules (150204 inline 8-bit counters): 150204 [0x2424da8, 0x2449864),
INFO: Loaded 1 PC tables (150204 PCs): 150204 [0x2449868,0x2694428),
/out/ia_fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Cannot allocate (0) 0 bytes
cannot open file malloc://0
No file to load b... | cpp | 8bc369ef3f67c3e074cccfe383922393fa11c89a | https://github.com/radare/radare2/commit/5783cf42c40aaed9b9180ae7069c7a60ea86dc45 | null |
arvo:11376 | n132/arvo:11376-vul | /src/openthread | [
{
"end_line": 1597,
"function_name": "MeshForwarder::GetFramePriority",
"start_line": 1560,
"target_file": "/src/openthread/src/core/thread/mesh_forwarder.cpp"
}
] | Heap-buffer-overflow READ 8 | openthread | asan | Reading 13 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/radio-receive-done-fuzzer < INPUT_FILE
or
/out/radio-receive-done-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz ... | cpp | 33b0ee93308345316ca7a8a1ddc8aa86ba42983e | https://github.com/openthread/openthread/commit/bf72fd8f8d4a898c019f279c8605e66fc0b42878 | null |
arvo:11382 | n132/arvo:11382-vul | /src/libgit2 | [
{
"end_line": 181,
"function_name": "git__strntol64",
"start_line": 71,
"target_file": "/src/libgit2/src/util.c"
}
] | Heap-buffer-overflow READ 1 | libgit2 | asan | INFO: Seed: 1749770194
INFO: Loaded 1 modules (27472 inline 8-bit counters): 27472 [0xe0a4e8, 0xe11038),
INFO: Loaded 1 PC tables (27472 PCs): 27472 [0xade8a0,0xb49da0),
/out/objects_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==2657==... | cpp | fd4e3b216c0881b5825c013a55b487ac2e8b8ab0 | https://github.com/libgit2/libgit2/commit/4209a5125802e714a6342a74ff0835c5c4a2397d | The strntol function inappropriately handles parsing numbers with a leading plus or minus sign, resulting in potential out-of-bounds reads. When a leading sign is present, the function advances the pointer but fails to update the number of remaining bytes in the string, which can cause the parser to read beyond the buf... |
arvo:11429 | n132/arvo:11429-vul | /src/librawspeed | [
{
"end_line": 558,
"function_name": "VC5Decompressor::Wavelet::HighPassBand::decode",
"start_line": 531,
"target_file": "/src/librawspeed/src/librawspeed/decompressors/VC5Decompressor.cpp"
}
] | Heap-buffer-overflow WRITE 2 | librawspeed | asan | INFO: Seed: 2623466991
INFO: Loaded 1 modules (1999 inline 8-bit counters): 1999 [0x941870, 0x94203f),
INFO: Loaded 1 PC tables (1999 PCs): 1999 [0x942040,0x949d30),
/out/VC5DecompressorFuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==671... | cpp | 021ce54ea210896d1f3de1d2c604c3472769ddf7 | https://github.com/darktable-org/rawspeed/commit/0bcf3488a4989c2724f0c4383401b0d0dcfc3dcc | An off-by-one error exists in the output buffer check within the HighPassBand::decode() function of VC5Decompressor. |
arvo:11444 | n132/arvo:11444-vul | /src/imagemagick | [
{
"end_line": 312,
"function_name": "GetNextToken",
"start_line": 167,
"target_file": "/src/imagemagick/MagickCore/token.c"
}
] | Use-of-uninitialized-value | imagemagick | msan | INFO: Seed: 1852361830
INFO: Loaded 1 modules (166115 inline 8-bit counters): 166115 [0x2be2b48, 0x2c0b42b),
INFO: Loaded 1 PC tables (166115 PCs): 166115 [0x2c0b430,0x2e94260),
/out/encoder_mvg_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==159048==WARNING: MemorySanitizer: use-of-uninitialized-value... | cpp | c7cdd6602365ce55a408e2d793c92a8a9e0027c0 | https://github.com/imagemagick/imagemagick/commit/537c2ca0244889634ced3c3e0724431862d3ced5 | null |
arvo:11484 | n132/arvo:11484-vul | /src/open62541 | [
{
"end_line": 415,
"function_name": "Variant_clear",
"start_line": 403,
"target_file": "/src/open62541/src/ua_types.c"
}
] | Heap-use-after-free READ 4 | open62541 | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_binary_decode < INPUT_FILE
or
/out/fuzz_binary_decode INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/fuz... | cpp | 94d61b6c13b975d711fe9027a6dd6eedbb4b6503 | https://github.com/open62541/open62541/commit/f4f8cdc4c344ad75051f3785a53a956a644cba05 | null |
arvo:11517 | n132/arvo:11517-vul | /src/aom | [
{
"end_line": 1478,
"function_name": "highbd_dr_prediction_z1_64xN_avx2",
"start_line": 1380,
"target_file": "/src/aom/aom_dsp/x86/intrapred_avx2.c"
}
] | Stack-buffer-overflow READ 16 | aom | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/av1_dec_fuzzer < INPUT_FILE
or
/out/av1_dec_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/av1_dec_fuz... | cpp | f48b0d22e2c1391351cb4ba75d033db1df9ad7ce | https://aomedia.googlesource.com/aom/+/fe996504f76f4204074c1f8f681925852c61b777%5E%21/ | null |
arvo:11523 | n132/arvo:11523-vul | /src/aom | [
{
"end_line": 4760,
"function_name": "show_existing_frame_reset",
"start_line": 4714,
"target_file": "/src/aom/av1/decoder/decodeframe.c"
}
] | Heap-buffer-overflow READ {*} | aom | asan | INFO: Seed: 2794871271
INFO: Loaded 1 modules (28001 inline 8-bit counters): 28001 [0x103b3a8, 0x1042109),
INFO: Loaded 1 PC tables (28001 PCs): 28001 [0x1042110,0x10af720),
/out/av1_dec_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==37... | cpp | 352c10bb5b6466e21c657c2ef5de53d793e26724 | https://aomedia.googlesource.com/aom/+/0ad5c625be27d7a3622dae95e9afe5e66b112d46%5E%21/ | A vulnerability exists where the frame context is not set up using next_ref_frame_map, potentially leading to incorrect reference frame handling. |
arvo:11752 | n132/arvo:11752-vul | /src/yara | [
{
"end_line": 522,
"function_name": "yr_re_ast_split_at_chaining_point",
"start_line": 456,
"target_file": "/src/yara/libyara/re.c"
}
] | Heap-use-after-free READ 4 | yara | asan | INFO: Seed: 1032320226
INFO: Loaded 1 modules (7656 inline 8-bit counters): 7656 [0x9e1b88, 0x9e3970),
INFO: Loaded 1 PC tables (7656 PCs): 7656 [0x7444a0,0x762320),
/out/rules_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==37430==ERROR... | cpp | 459d5a2bae0f4c9a2921be0d21fe920258cb5d6d | https://github.com/VirusTotal/yara/commit/8eeed3ef5e2bbd5b927bf1b72879c1fa9ab979cb | null |
arvo:11753 | n132/arvo:11753-vul | /src/yara | [
{
"end_line": 522,
"function_name": "yr_re_ast_split_at_chaining_point",
"start_line": 456,
"target_file": "/src/yara/libyara/re.c"
}
] | Heap-use-after-free READ 4 | yara | asan | INFO: Seed: 3471148202
INFO: Loaded 1 modules (7656 inline 8-bit counters): 7656 [0x9e1b88, 0x9e3970),
INFO: Loaded 1 PC tables (7656 PCs): 7656 [0x7444a0,0x762320),
/out/rules_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==37385==ERROR... | cpp | 459d5a2bae0f4c9a2921be0d21fe920258cb5d6d | https://github.com/VirusTotal/yara/commit/8eeed3ef5e2bbd5b927bf1b72879c1fa9ab979cb | null |
arvo:11945 | n132/arvo:11945-vul | /src/yara | [
{
"end_line": 251,
"function_name": "dotnet_parse_us",
"start_line": 200,
"target_file": "/src/yara/libyara/modules/dotnet.c"
}
] | Heap-buffer-overflow READ 1 | yara | asan | INFO: Seed: 680739600
INFO: Loaded 1 modules (7670 inline 8-bit counters): 7670 [0x9e8628, 0x9ea41e),
INFO: Loaded 1 PC tables (7670 PCs): 7670 [0x74bdc0,0x769d20),
/out/dotnet_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==37397==ERROR... | cpp | a0ef13b26b9aa84af0754ac3fae140794ecc0876 | https://github.com/VirusTotal/yara/commit/7493247020e24407f120b6b29f6dd43c883e2f21 | A buffer overflow exists in the dotnet module. |
arvo:12173 | n132/arvo:12173-vul | /src/curl | [
{
"end_line": 806,
"function_name": "Curl_disconnect",
"start_line": 752,
"target_file": "/src/curl/lib/url.c"
}
] | UNKNOWN READ | curl | asan | INFO: Seed: 1785420652
INFO: Loaded 1 modules (64063 inline 8-bit counters): 64063 [0x1118720, 0x112815f),
INFO: Loaded 1 PC tables (64063 PCs): 64063 [0x1128160,0x1222550),
/out/curl_fuzzer_ftp: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEADLYSIGNAL
=======================================... | cpp | e9ababd4f5aff042dd3b5a4f9568f22e6604d115 | https://github.com/curl/curl/commit/f3ce38739fa49008e36959aa8189c01ab1bad5b5 | The vulnerability occurs because conn->data is not explicitly set to point to the current transfer when invoking the protocol-specific disconnect function in the disconnect process. This can cause the disconnect function to not work correctly. |
arvo:12255 | n132/arvo:12255-vul | /src/openvswitch | [
{
"end_line": 5619,
"function_name": "parse_odp_key_mask_attr",
"start_line": 5420,
"target_file": "/src/openvswitch/lib/odp-util.c"
}
] | Heap-buffer-overflow READ 1 | openvswitch | asan | INFO: Seed: 3789077833
INFO: Loaded 1 modules (38573 inline 8-bit counters): 38573 [0xeb5ec0, 0xebf56d),
INFO: Loaded 1 PC tables (38573 PCs): 38573 [0xa84d88,0xb1b858),
/out/odp_target: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==29371==ERR... | cpp | 1f886f070f7fd0ada801f92b7ba6832d1b3f4314 | https://github.com/openvswitch/ovs/commit/401eacfb22fc4a3bd5df5752ee77adf598864955 | A vulnerability exists in odp-util where parsing of odp actions does not stop if nlattr is overflowed. The function `encap = nl_msg_start_nested(key, OVS_KEY_ATTR_ENCAP)` ensures that key->size is at least as large as (encap + NLA_HDRLEN), making the subsequent `if` statement safe, but without proper checks, an overflo... |
arvo:1236 | n132/arvo:1236-vul | /src/wireshark | [
{
"end_line": 3915,
"function_name": "OALMarshal_UncompressValue",
"start_line": 3872,
"target_file": "/src/wireshark/epan/dissectors/packet-dof.c"
}
] | Heap-buffer-overflow READ 1 | wireshark | asan | oss-fuzz configured for dissector: ip
INFO: Seed: 1145313904
INFO: Loaded 1 modules (279650 guards): [0xc40da50, 0xc51ebd8),
/out/fuzzshark_ip: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==100011==ERROR: AddressSanitizer: heap-buffer-overflow on... | cpp | f42b2a531e0c9cafe7d694cb1109dd53c33fdd40 | https://github.com/wireshark/wireshark/commit/6fdf8eb5a92d51617203be1a712c15585b156497 | A buffer overflow (read) vulnerability exists in the DOF code due to missing sanity checks on the buffer length parsed from data. The code does not verify the buffer size before reading a value, which can lead to out-of-bounds memory access. |
arvo:12419 | n132/arvo:12419-vul | /src/libxml2 | [
{
"end_line": 279,
"function_name": "xmlTextReaderRemoveID",
"start_line": 255,
"target_file": "/src/libxml2/xmlreader.c"
}
] | Heap-double-free | libxml2 | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/libxml2_xml_reader_for_file_fuzzer < INPUT_FILE
or
/out/libxml2_xml_reader_for_file_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:... | cpp | 619534ef2ed501e5206915064a5bc36153a897f7 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/26828cb3a1294e09e42064f4769d4b3c0a8623b3 | A double-free vulnerability exists in the xmlFreeID function in xmlreader.c due to changes introduced in a recent commit intended to fix a memory leak. |
arvo:12420 | n132/arvo:12420-vul | /src/libidn2 | [
{
"end_line": 635,
"function_name": "idn2_to_ascii_4i",
"start_line": 580,
"target_file": "/src/libidn2/lib/lookup.c"
}
] | Heap-buffer-overflow WRITE {*} | libidn2 | asan | INFO: Seed: 3255613944
INFO: Loaded 1 modules (1555 inline 8-bit counters): 1555 [0x932328, 0x93293b),
INFO: Loaded 1 PC tables (1555 PCs): 1555 [0x6cd940,0x6d3a70),
/out/libidn2_to_ascii_8z_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
... | cpp | 0965b23044e5b55a3beb01d6a6c62eb2b9a7b0c9 | https://gitlab.com/libidn/libidn2/-/commit/e4d1558aa2c1c04a05066ee8600f37603890ba8c | A vulnerability exists in the idn2_to_ascii_4i() function where the output length is not restricted to 63 characters. |
arvo:12536 | n132/arvo:12536-vul | /src/openthread | [
{
"end_line": 339,
"function_name": "Message::ParseHeader",
"start_line": 316,
"target_file": "/src/openthread/src/core/coap/coap_message.cpp"
}
] | Index-out-of-bounds | openthread | ubsan | INFO: Seed: 2432220643
INFO: Loaded 1 modules (19595 inline 8-bit counters): 19595 [0x8b7848, 0x8bc4d3),
INFO: Loaded 1 PC tables (19595 PCs): 19595 [0x5e5440,0x631cf0),
/out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
coap/coap_message.cpp:320:5: runtime error: index 96 out of bounds for ty... | cpp | 28582ef03817a5627af3f41142b8d1be2981216f | https://github.com/openthread/openthread/commit/b268171278682083d290e01f0df4eba12cc4fc95 | null |
arvo:12595 | n132/arvo:12595-vul | /src/readstat | [
{
"end_line": 286,
"function_name": "sav_read_variable_missing_values",
"start_line": 247,
"target_file": "/src/readstat/src/spss/readstat_sav_read.c"
}
] | Bad-free | readstat | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_format_sav < INPUT_FILE
or
/out/fuzz_format_sav INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/fuzz_form... | cpp | 7cfc52111e68e682db4cb59ac16b724780e0596a | https://github.com/WizardMac/ReadStat/commit/14265e717e48fc877697a27f1bee232116ce21e5 | null |
arvo:12631 | n132/arvo:12631-vul | /src/openthread | [
{
"end_line": 213,
"function_name": "Uart::ReceiveTask",
"start_line": 143,
"target_file": "/src/openthread/src/cli/cli_uart.cpp"
}
] | Index-out-of-bounds | openthread | ubsan | INFO: Seed: 3421409168
INFO: Loaded 1 modules (22293 inline 8-bit counters): 22293 [0x8f8108, 0x8fd81d),
INFO: Loaded 1 PC tables (22293 PCs): 22293 [0x60fec0,0x667010),
/out/cli-uart-received-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
cli_uart.cpp:177:17: runtime error: index 512 out of bounds for ... | cpp | aa5673cd48b9cc3b626fc40aa6fb380cf3e62393 | https://github.com/openthread/openthread/commit/4ca58d440d83124f47ee28d7a84084543ff80a9d | null |
arvo:12642 | n132/arvo:12642-vul | /src/openthread | [
{
"end_line": 1674,
"function_name": "Interpreter::ProcessService",
"start_line": 1624,
"target_file": "/src/openthread/src/cli/cli.cpp"
}
] | Stack-buffer-overflow WRITE {*} | openthread | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/cli-uart-received-fuzzer < INPUT_FILE
or
/out/cli-uart-received-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-fla... | cpp | 993f537a03273e69ade90a38a653e367cb1a6c30 | https://github.com/openthread/openthread/commit/249bc598748ad08a98b08995698669613594e54b | null |
arvo:12662 | n132/arvo:12662-vul | /src/readstat | [
{
"end_line": 842,
"function_name": "sas7bdat_parse_page_pass2",
"start_line": 747,
"target_file": "/src/readstat/src/sas/readstat_sas7bdat_read.c"
}
] | Heap-buffer-overflow READ 8 | readstat | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_format_sas7bdat < INPUT_FILE
or
/out/fuzz_format_sas7bdat INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out... | cpp | e1c41e1363b0414e49b21fd1ebbe24ff0733cdb1 | https://github.com/WizardMac/ReadStat/commit/15d2192da9028fee80da0b2dd8df1b6a00873e46 | The SAS7BDAT reader contains insufficient bounds checking, which allows a buffer overrun when reading the subheader pointers. |
arvo:12679 | n132/arvo:12679-vul | /src/openthread | [
{
"end_line": 312,
"function_name": "CoapSecure::Process",
"start_line": 128,
"target_file": "/src/openthread/src/cli/cli_coap_secure.cpp"
}
] | Memcpy-param-overlap | openthread | asan | Reading 79 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/cli-uart-received-fuzzer < INPUT_FILE
or
/out/cli-uart-received-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz ex... | cpp | cc26f1418ee05e7c7eb277cbbcd03fb04fffccf8 | https://github.com/openthread/openthread/commit/cb5e076a3e0a8daa7ee3576e1962c5388f2002ca | null |
arvo:12684 | n132/arvo:12684-vul | /src/openthread | [
{
"end_line": 312,
"function_name": "CoapSecure::Process",
"start_line": 128,
"target_file": "/src/openthread/src/cli/cli_coap_secure.cpp"
}
] | UNKNOWN READ | openthread | asan | Reading 3396 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/cli-uart-received-fuzzer < INPUT_FILE
or
/out/cli-uart-received-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz ... | cpp | cc26f1418ee05e7c7eb277cbbcd03fb04fffccf8 | https://github.com/openthread/openthread/commit/cb5e076a3e0a8daa7ee3576e1962c5388f2002ca | null |
arvo:12712 | n132/arvo:12712-vul | /src/openthread | [
{
"end_line": 178,
"function_name": "otThreadReleaseRouterId",
"start_line": 167,
"target_file": "/src/openthread/src/core/api/thread_ftd_api.cpp"
}
] | Index-out-of-bounds | openthread | ubsan | INFO: Seed: 482520146
INFO: Loaded 1 modules (22308 inline 8-bit counters): 22308 [0x8f7068, 0x8fc78c),
INFO: Loaded 1 PC tables (22308 PCs): 22308 [0x60e8e0,0x665b20),
/out/cli-uart-received-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
thread/router_table.cpp:106:13: runtime error: index 12 out of bo... | cpp | cb5e076a3e0a8daa7ee3576e1962c5388f2002ca | https://github.com/openthread/openthread/commit/f9659b3733b85ffb499692a6d2f18a6414782dc0 | null |
arvo:12950 | n132/arvo:12950-vul | /src/pcre2 | [
{
"end_line": 2310,
"function_name": "read_name",
"start_line": 2209,
"target_file": "/src/pcre2/src/pcre2_compile.c"
}
] | Heap-buffer-overflow READ 1 | pcre2 | asan | INFO: Seed: 1226477522
INFO: Loaded 1 modules (8806 inline 8-bit counters): 8806 [0x9c0250, 0x9c24b6),
INFO: Loaded 1 PC tables (8806 PCs): 8806 [0x73e320,0x760980),
/out/pcre2_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==7911==ERROR:... | cpp | 4d17f4b8562fa7237ba34dbdaa881c258e87f3e0 | https://github.com/PCRE2Project/pcre2/commit/45959f1eecb9eb2a06ec492e8d989cc1a1dc1d97 | null |
arvo:1304 | n132/arvo:1304-vul | /src/gnutls | [
{
"end_line": 1831,
"function_name": "gnutls_pkcs12_simple_parse",
"start_line": 1441,
"target_file": "/src/gnutls/lib/x509/pkcs12.c"
}
] | Heap-use-after-free READ 8 | gnutls | asan | INFO: Seed: 2247902755
INFO: Loaded 1 modules (25762 guards): [0xc5e290, 0xc77518),
/out/gnutls_pkcs12_key_parser_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==91286==ERROR: AddressSanitizer: heap-use-after-free on address 0x606000000020 ... | cpp | ace6cbd989db6e9413f7e5cc9c6867a7a12ad048 | https://gitlab.com/gnutls/gnutls/-/commit/7265612d87f51c2f52a2e4cf5bdf14f31bd291a2 | The gnutls_pkcs12_simple_parse function does not set variables to null after deinitialization, which allows the variables to be deinitialized twice during cleanup. |
arvo:13073 | n132/arvo:13073-vul | /src/pcre2 | [
{
"end_line": 2016,
"function_name": "PRIV",
"start_line": 1460,
"target_file": "/src/pcre2/src/pcre2_compile.c"
}
] | Heap-buffer-overflow READ 1 | pcre2 | asan | INFO: Seed: 1259692538
INFO: Loaded 1 modules (8813 inline 8-bit counters): 8813 [0x9bf470, 0x9c16dd),
INFO: Loaded 1 PC tables (8813 PCs): 8813 [0x73ce40,0x75f510),
/out/pcre2_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==7973==ERROR:... | cpp | 8c8deae8ebb37774878ee402eac1d081c1d6c8d7 | https://github.com/PCRE2Project/pcre2/commit/f2e1cea2884e93a0f27473c4e3db18936abed039 | null |
arvo:13222 | n132/arvo:13222-vul | /src/file | [
{
"end_line": 498,
"function_name": "looks_ucs32",
"start_line": 459,
"target_file": "/src/file/src/encoding.c"
}
] | Heap-buffer-overflow READ 1 | file | asan | INFO: Seed: 50742689
INFO: Loaded 1 modules (4168 inline 8-bit counters): 4168 [0x92e308, 0x92f350),
INFO: Loaded 1 PC tables (4168 PCs): 4168 [0x92f350,0x93f7d0),
/out/magic_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==10911==ERROR: ... | cpp | f3a4b9ada3ca99e62c62b9aa78eee4935a8094fe | https://github.com/file/file/commit/ecca6e54f49f251bb4c16fe145d04c2b45923dc3 | null |
arvo:13332 | n132/arvo:13332-vul | /src/openthread | [
{
"end_line": 350,
"function_name": "IsValid",
"start_line": 345,
"target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp"
}
] | UNKNOWN READ | openthread | ubsan | INFO: Seed: 126674142
INFO: Loaded 1 modules (19713 inline 8-bit counters): 19713 [0x8c14c8, 0x8c61c9),
INFO: Loaded 1 PC tables (19713 PCs): 19713 [0x5ec9c8,0x6399d8),
/out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitizer:DEADLYSIGNAL
==17666==ERROR: UndefinedBehaviorS... | cpp | d912393c7f055333378ba80ba5ae3ddcf0e4be02 | https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115 | null |
arvo:13333 | n132/arvo:13333-vul | /src/openthread | [
{
"end_line": 350,
"function_name": "IsValid",
"start_line": 345,
"target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp"
}
] | Stack-buffer-overflow READ 1 | openthread | asan | INFO: Seed: 1777681649
INFO: Loaded 1 modules (15966 inline 8-bit counters): 15966 [0xa8f5a8, 0xa93406),
INFO: Loaded 1 PC tables (15966 PCs): 15966 [0x7ba388,0x7f8968),
/out/radio-receive-done-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===============================================================... | cpp | d912393c7f055333378ba80ba5ae3ddcf0e4be02 | https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115 | null |
arvo:13334 | n132/arvo:13334-vul | /src/openthread | [
{
"end_line": 350,
"function_name": "IsValid",
"start_line": 345,
"target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp"
}
] | Stack-buffer-overflow WRITE {*} | openthread | asan | INFO: Seed: 821079052
INFO: Loaded 1 modules (15966 inline 8-bit counters): 15966 [0xa8f5a8, 0xa93406),
INFO: Loaded 1 PC tables (15966 PCs): 15966 [0x7ba388,0x7f8968),
/out/radio-receive-done-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================================================================... | cpp | d912393c7f055333378ba80ba5ae3ddcf0e4be02 | https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115 | null |
arvo:13348 | n132/arvo:13348-vul | /src/openthread | [
{
"end_line": 350,
"function_name": "IsValid",
"start_line": 345,
"target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp"
}
] | UNKNOWN READ | openthread | ubsan | INFO: Seed: 2280158323
INFO: Loaded 1 modules (19713 inline 8-bit counters): 19713 [0x8c14c8, 0x8c61c9),
INFO: Loaded 1 PC tables (19713 PCs): 19713 [0x5ec9c8,0x6399d8),
/out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitizer:DEADLYSIGNAL
==17667==ERROR: UndefinedBehavior... | cpp | d912393c7f055333378ba80ba5ae3ddcf0e4be02 | https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115 | null |
arvo:13353 | n132/arvo:13353-vul | /src/openthread | [
{
"end_line": 350,
"function_name": "IsValid",
"start_line": 345,
"target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp"
}
] | UNKNOWN READ | openthread | ubsan | INFO: Seed: 3234042323
INFO: Loaded 1 modules (19713 inline 8-bit counters): 19713 [0x8c14c8, 0x8c61c9),
INFO: Loaded 1 PC tables (19713 PCs): 19713 [0x5ec9c8,0x6399d8),
/out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitizer:DEADLYSIGNAL
==17666==ERROR: UndefinedBehavior... | cpp | d912393c7f055333378ba80ba5ae3ddcf0e4be02 | https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115 | null |
arvo:13359 | n132/arvo:13359-vul | /src/libidn2 | [
{
"end_line": 220,
"function_name": "punycode_decode",
"start_line": 137,
"target_file": "/src/libidn2/lib/puny_decode.c"
}
] | Use-of-uninitialized-value | libidn2 | msan | INFO: Seed: 56250094
INFO: Loaded 1 modules (1574 inline 8-bit counters): 1574 [0x9fefb8, 0x9ff5de),
INFO: Loaded 1 PC tables (1574 PCs): 1574 [0x796b30,0x79cd90),
/out/libidn2_to_ascii_8z_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==94340==WARNING: MemorySanitizer: use-of-uninitialized-value
#0... | cpp | ce0d453222ca51c056f4f442988710eb0b696365 | https://gitlab.com/libidn/libidn2/-/commit/734ef70e7e719e7aa777dbafbc727225bf71980a | null |
arvo:13363 | n132/arvo:13363-vul | /src/openthread | [
{
"end_line": 350,
"function_name": "IsValid",
"start_line": 345,
"target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp"
}
] | Bad-cast | openthread | ubsan | INFO: Seed: 1441229541
INFO: Loaded 1 modules (19713 inline 8-bit counters): 19713 [0x8c14c8, 0x8c61c9),
INFO: Loaded 1 PC tables (19713 PCs): 19713 [0x5ec9c8,0x6399d8),
/out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
net/ip6.cpp:1068:20: runtime error: member call on address 0x000000ce0505... | cpp | d912393c7f055333378ba80ba5ae3ddcf0e4be02 | https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115 | null |
arvo:13369 | n132/arvo:13369-vul | /src/openthread | [
{
"end_line": 350,
"function_name": "IsValid",
"start_line": 345,
"target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp"
}
] | UNKNOWN READ | openthread | ubsan | INFO: Seed: 3216371041
INFO: Loaded 1 modules (19713 inline 8-bit counters): 19713 [0x8c14c8, 0x8c61c9),
INFO: Loaded 1 PC tables (19713 PCs): 19713 [0x5ec9c8,0x6399d8),
/out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitizer:DEADLYSIGNAL
==17662==ERROR: UndefinedBehavior... | cpp | d912393c7f055333378ba80ba5ae3ddcf0e4be02 | https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115 | null |
arvo:13380 | n132/arvo:13380-vul | /src/openthread | [
{
"end_line": 350,
"function_name": "IsValid",
"start_line": 345,
"target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp"
}
] | UNKNOWN READ | openthread | ubsan | INFO: Seed: 2257461537
INFO: Loaded 1 modules (19664 inline 8-bit counters): 19664 [0x8c0288, 0x8c4f58),
INFO: Loaded 1 PC tables (19664 PCs): 19664 [0x5ebba8,0x6388a8),
/out/radio-receive-done-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitizer:DEADLYSIGNAL
==17668==ERROR: Undefin... | cpp | d912393c7f055333378ba80ba5ae3ddcf0e4be02 | https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115 | null |
arvo:13381 | n132/arvo:13381-vul | /src/openthread | [
{
"end_line": 350,
"function_name": "IsValid",
"start_line": 345,
"target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp"
}
] | Index-out-of-bounds | openthread | ubsan | INFO: Seed: 3899203174
INFO: Loaded 1 modules (19713 inline 8-bit counters): 19713 [0x8c14c8, 0x8c61c9),
INFO: Loaded 1 PC tables (19713 PCs): 19713 [0x5ec9c8,0x6399d8),
/out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
thread/child_table.cpp:82:31: runtime error: index 32 out of bounds for t... | cpp | d912393c7f055333378ba80ba5ae3ddcf0e4be02 | https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115 | null |
arvo:13383 | n132/arvo:13383-vul | /src/openthread | [
{
"end_line": 350,
"function_name": "IsValid",
"start_line": 345,
"target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp"
}
] | UNKNOWN READ | openthread | ubsan | INFO: Seed: 70054613
INFO: Loaded 1 modules (19664 inline 8-bit counters): 19664 [0x8c0288, 0x8c4f58),
INFO: Loaded 1 PC tables (19664 PCs): 19664 [0x5ebba8,0x6388a8),
/out/radio-receive-done-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitizer:DEADLYSIGNAL
==17664==ERROR: Undefined... | cpp | d912393c7f055333378ba80ba5ae3ddcf0e4be02 | https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115 | null |
arvo:13386 | n132/arvo:13386-vul | /src/openthread | [
{
"end_line": 350,
"function_name": "IsValid",
"start_line": 345,
"target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp"
}
] | UNKNOWN READ | openthread | ubsan | INFO: Seed: 2559851155
INFO: Loaded 1 modules (19664 inline 8-bit counters): 19664 [0x8c0288, 0x8c4f58),
INFO: Loaded 1 PC tables (19664 PCs): 19664 [0x5ebba8,0x6388a8),
/out/radio-receive-done-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitizer:DEADLYSIGNAL
==17666==ERROR: Undefin... | cpp | d912393c7f055333378ba80ba5ae3ddcf0e4be02 | https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115 | null |
arvo:13390 | n132/arvo:13390-vul | /src/openthread | [
{
"end_line": 350,
"function_name": "IsValid",
"start_line": 345,
"target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp"
}
] | UNKNOWN READ | openthread | ubsan | INFO: Seed: 3770445395
INFO: Loaded 1 modules (19664 inline 8-bit counters): 19664 [0x8c0288, 0x8c4f58),
INFO: Loaded 1 PC tables (19664 PCs): 19664 [0x5ebba8,0x6388a8),
/out/radio-receive-done-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitizer:DEADLYSIGNAL
==17666==ERROR: Undefin... | cpp | d912393c7f055333378ba80ba5ae3ddcf0e4be02 | https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115 | null |
arvo:13405 | n132/arvo:13405-vul | /src/openthread | [
{
"end_line": 350,
"function_name": "IsValid",
"start_line": 345,
"target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp"
}
] | UNKNOWN READ | openthread | ubsan | INFO: Seed: 284055245
INFO: Loaded 1 modules (19664 inline 8-bit counters): 19664 [0x8c0288, 0x8c4f58),
INFO: Loaded 1 PC tables (19664 PCs): 19664 [0x5ebba8,0x6388a8),
/out/radio-receive-done-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitizer:DEADLYSIGNAL
==17661==ERROR: Undefine... | cpp | d912393c7f055333378ba80ba5ae3ddcf0e4be02 | https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115 | null |
arvo:13409 | n132/arvo:13409-vul | /src/openthread | [
{
"end_line": 350,
"function_name": "IsValid",
"start_line": 345,
"target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp"
}
] | UNKNOWN READ | openthread | ubsan | INFO: Seed: 3893450594
INFO: Loaded 1 modules (19713 inline 8-bit counters): 19713 [0x8c14c8, 0x8c61c9),
INFO: Loaded 1 PC tables (19713 PCs): 19713 [0x5ec9c8,0x6399d8),
/out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitizer:DEADLYSIGNAL
==17666==ERROR: UndefinedBehavior... | cpp | d912393c7f055333378ba80ba5ae3ddcf0e4be02 | https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115 | null |
arvo:13412 | n132/arvo:13412-vul | /src/openthread | [
{
"end_line": 350,
"function_name": "IsValid",
"start_line": 345,
"target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp"
}
] | UNKNOWN READ | openthread | ubsan | INFO: Seed: 270755989
INFO: Loaded 1 modules (19664 inline 8-bit counters): 19664 [0x8c0288, 0x8c4f58),
INFO: Loaded 1 PC tables (19664 PCs): 19664 [0x5ebba8,0x6388a8),
/out/radio-receive-done-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitizer:DEADLYSIGNAL
==17662==ERROR: Undefine... | cpp | d912393c7f055333378ba80ba5ae3ddcf0e4be02 | https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115 | null |
arvo:13435 | n132/arvo:13435-vul | /src/libarchive | [
{
"end_line": 2042,
"function_name": "skip_base_block",
"start_line": 2020,
"target_file": "/src/libarchive/libarchive/archive_read_support_format_rar5.c"
}
] | Heap-buffer-overflow READ {*} | libarchive | asan | INFO: Seed: 3928933440
INFO: Loaded 1 modules (12001 inline 8-bit counters): 12001 [0x264a988, 0x264d869),
INFO: Loaded 1 PC tables (12001 PCs): 12001 [0x2325460,0x2354270),
/out/libarchive_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
=... | cpp | a4744f65134ed3c38be7f3241e394e75fd28d7e7 | https://github.com/libarchive/libarchive/commit/39736c43bd7374beedb372aa300ecf36c9fc4733 | null |
arvo:13453 | n132/arvo:13453-vul | /src/file | [
{
"end_line": 2271,
"function_name": "magiccheck",
"start_line": 1920,
"target_file": "/src/file/src/softmagic.c"
}
] | Use-of-uninitialized-value | file | msan | INFO: Seed: 3038447361
INFO: Loaded 1 modules (4099 guards): [0xa3d9c0, 0xa419cc),
/out/magic_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialized bytes in __interceptor___strndup at offset 7 inside [0x704000000003, 8)
==10940==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x5a0f3d in... | cpp | 4c41a4b6f9fbb95959edda00a2fd3d80e32a914a | https://github.com/file/file/commit/dcda2612a5f38a3d9e15c0ac9a7d156d74b3a395 | null |
arvo:13538 | n132/arvo:13538-vul | /src/imagemagick | [
{
"end_line": 1443,
"function_name": "ReadPSDChannel",
"start_line": 1341,
"target_file": "/src/imagemagick/coders/psd.c"
}
] | Use-of-uninitialized-value | imagemagick | msan | INFO: Seed: 1911790336
INFO: Loaded 1 modules (166567 inline 8-bit counters): 166567 [0x2bf7e88, 0x2c2092f),
INFO: Loaded 1 PC tables (166567 PCs): 166567 [0x2c20930,0x2eab3a0),
/out/encoder_psd_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==167267==WARNING: MemorySanitizer: use-of-uninitialized-value... | cpp | c1bd0be8167fdef1f11fa117e069432259c7d9e4 | https://github.com/imagemagick/imagemagick/commit/41b03b43a5799abd898f871ce5865cb0307f1592 | null |
arvo:13704 | n132/arvo:13704-vul | /src/radare2 | [
{
"end_line": 89,
"function_name": "destroy",
"start_line": 84,
"target_file": "/src/radare2/libr/bin/p/bin_art.c"
}
] | Heap-use-after-free READ 8 | radare2 | asan | INFO: Seed: 1723654116
INFO: Loaded 1 modules (157250 inline 8-bit counters): 157250 [0x25791d0, 0x259f812),
INFO: Loaded 1 PC tables (157250 PCs): 157250 [0x259f818,0x2805c38),
/out/ia_fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
3
=================================================================
==310... | cpp | d9a15aa661c367b45cdbd6dd57035a19fc35780a | https://github.com/radare/radare2/commit/5d65cbe1f7d677a22c0fca593dcae1aebf8cf35b | A double free vulnerability exists in bin_art due to improper management of ao->kv's ownership. The ownership of ao->kv is transferred to RBin through the get_sdb method of RBinPlugin, but plugins may still attempt to free it themselves. |
arvo:13730 | n132/arvo:13730-vul | /src/gnupg | [
{
"end_line": 984,
"function_name": "proc_plaintext",
"start_line": 826,
"target_file": "/src/gnupg/g10/mainproc.c"
}
] | Heap-use-after-free READ 4 | gnupg | asan | INFO: Seed: 904560189
INFO: Loaded 1 modules (40217 inline 8-bit counters): 40217 [0xdc6db0, 0xdd0ac9),
INFO: Loaded 1 PC tables (40217 PCs): 40217 [0xdd0ad0,0xe6dc60),
/out/fuzz_verify: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
keybox '/tmp/fuzzdirverify/pubring.kbx' created
/tmp/fuzzdirverify/trustdb.gpg... | cpp | bdda31a26bc69b6ee72e964510db113645de76ef | git://git.gnupg.org/gnupg.git3e1f3df6183b2ed2cadf2af2383063891e2c53bd | A use after free vulnerability exists in gpg, specifically in g10/mainproc.c within the proc_plaintext function, where freed memory is accessed. |
arvo:13741 | n132/arvo:13741-vul | /src/openthread | [
{
"end_line": 275,
"function_name": "ChannelMaskTlv::GetChannelMask",
"start_line": 237,
"target_file": "/src/openthread/src/core/meshcop/meshcop_tlvs.cpp"
}
] | Stack-use-after-return READ 1 | openthread | asan | INFO: Seed: 694634597
INFO: Loaded 1 modules (15958 inline 8-bit counters): 15958 [0xa8e530, 0xa92386),
INFO: Loaded 1 PC tables (15958 PCs): 15958 [0x7b90f0,0x7f7650),
/out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==17667=... | cpp | 61e928880595725a60b592075ce34baaaa552295 | https://github.com/openthread/openthread/commit/fab45352f5d6b2f516fed8a86c0d197bb7c27958 | The vulnerability allows an arbitrary number of Channel Mask entries to be processed in the ChannelMaskTlv in meshcop. |
arvo:13942 | n132/arvo:13942-vul | /src/radare2 | [
{
"end_line": 49,
"function_name": "is_kernelcache",
"start_line": 1,
"target_file": "/src/radare2/libr/bin/format/mach0/mach064_is_kernelcache.c"
}
] | Heap-buffer-overflow READ 1 | radare2 | asan | INFO: Seed: 3886734344
INFO: Loaded 1 modules (157784 inline 8-bit counters): 157784 [0x2588150, 0x25ae9a8),
INFO: Loaded 1 PC tables (157784 PCs): 157784 [0x25ae9a8,0x2816f28),
/out/ia_fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
3
=================================================================
==310... | cpp | 689873a80f2e48b616639c1c7795a6dfa3b7d652 | https://github.com/radare/radare2/commit/d271da09ab6cf4817cfabede153e6bd547118cdd | null |
arvo:13945 | n132/arvo:13945-vul | /src/radare2 | [
{
"end_line": 49,
"function_name": "is_kernelcache",
"start_line": 1,
"target_file": "/src/radare2/libr/bin/format/mach0/mach064_is_kernelcache.c"
}
] | Heap-buffer-overflow READ 1 | radare2 | asan | INFO: Seed: 3602190692
INFO: Loaded 1 modules (157784 inline 8-bit counters): 157784 [0x2588150, 0x25ae9a8),
INFO: Loaded 1 PC tables (157784 PCs): 157784 [0x25ae9a8,0x2816f28),
/out/ia_fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
3
=================================================================
==310... | cpp | 689873a80f2e48b616639c1c7795a6dfa3b7d652 | https://github.com/radare/radare2/commit/d271da09ab6cf4817cfabede153e6bd547118cdd | null |
arvo:14018 | n132/arvo:14018-vul | /src/perfetto | [
{
"end_line": 876,
"function_name": "ProtoTraceParser::ParsePowerRails",
"start_line": 841,
"target_file": "/src/perfetto/src/trace_processor/proto_trace_parser.cc"
}
] | UNKNOWN WRITE | perfetto | asan | INFO: Seed: 2968156588
INFO: Loaded 1 modules (120706 inline 8-bit counters): 120706 [0x1355638, 0x1372dba),
INFO: Loaded 1 PC tables (120706 PCs): 120706 [0x1372dc0,0x154a5e0),
/out/trace_processor_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEADLYSIGNAL
============================... | cpp | a59cff1e2707f5a959d769ada9d9f0fd73f20315 | https://android.googlesource.com/platform/external/perfetto//+/fbd7bc474766673cde8b4a87bf76e82049e23f05%5E%21/ | null |
arvo:14331 | n132/arvo:14331-vul | /src/libarchive | [
{
"end_line": 1402,
"function_name": "parse_file_extra_owner",
"start_line": 1332,
"target_file": "/src/libarchive/libarchive/archive_read_support_format_rar5.c"
}
] | Stack-buffer-overflow WRITE 1 | libarchive | asan | Reading 357 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/libarchive_fuzzer < INPUT_FILE
or
/out/libarchive_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
... | cpp | 7b3068c4bf7a217a1838db280072653197d30012 | https://github.com/libarchive/libarchive/commit/2fce6f81cc59144bf4f2f66f7620233d609b41ef | null |
arvo:14467 | n132/arvo:14467-vul | /src/kimageformats | [
{
"end_line": 345,
"function_name": "LoadTGA",
"start_line": 177,
"target_file": "/src/kimageformats/src/imageformats/tga.cpp"
}
] | Use-of-uninitialized-value | kimageformats | msan | INFO: Seed: 2878715556
INFO: Loaded 1 modules (217591 inline 8-bit counters): 217591 [0x31d9378, 0x320e56f),
INFO: Loaded 1 PC tables (217591 PCs): 217591 [0x320e570,0x35604e0),
/out/kimgio_tga_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
QBuffer::seek: Invalid pos: 273
==7461==WARNING: MemorySanitize... | cpp | bcce48012ec81b59aeeef2d071d35dc24385c255 | https://github.com/KDE/kimageformats/commit/96b1d7e7bcd9b25db9fb1eb3edc736a10e9bb90d | A vulnerability exists in the TGA image handling where the destination buffer (dst) in the tga file processing is not initialized with memset if a read operation fails, potentially leading to the use of uninitialized memory. |
arvo:14529 | n132/arvo:14529-vul | /src/lwan | [
{
"end_line": 611,
"function_name": "parse_headers",
"start_line": 528,
"target_file": "/src/lwan/src/lib/lwan-request.c"
}
] | Global-buffer-overflow WRITE 8 | lwan | asan | INFO: Seed: 506532327
INFO: Loaded 1 modules (3038 inline 8-bit counters): 3038 [0x83bf10, 0x83caee),
INFO: Loaded 1 PC tables (3038 PCs): 3038 [0x83caf0,0x8488d0),
/out/request_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==202==ERROR:... | c | 2bf15453c639c194d840a26ff2122d12b8190d8a | https://github.com/lpereira/lwan/commit/8feaf5303d43cad4d057a51722713213d3c9732c | The vulnerability allows the number of elements in the header_start array to exceed intended limits, potentially leading to security issues. |
arvo:14537 | n132/arvo:14537-vul | /src/libarchive | [
{
"end_line": 2680,
"function_name": "copy_string",
"start_line": 2659,
"target_file": "/src/libarchive/libarchive/archive_read_support_format_rar5.c"
}
] | Heap-buffer-overflow READ 1 | libarchive | asan | Reading 255 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/libarchive_fuzzer < INPUT_FILE
or
/out/libarchive_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
... | cpp | 3614747af54e60229a2bf11e8f40e1b975cc9ae6 | https://github.com/libarchive/libarchive/commit/69bb9bcf6cef43b744e5baa101a8a3a78db0b00d | The RAR5 reader uses an invalid type for the dictionary size mask in operations involving the window_mask variable, which is essential for managing the dictionary circular buffer. When the dictionary buffer size is declared as 4GB, window_mask is set to 0xFFFFFFFF. Assigning this value to an int variable results in a v... |
arvo:14560 | n132/arvo:14560-vul | /src/yara | [
{
"end_line": 248,
"function_name": "dotnet_parse_us",
"start_line": 200,
"target_file": "/src/yara/libyara/modules/dotnet.c"
}
] | Heap-buffer-overflow READ {*} | yara | asan | INFO: Seed: 1989091636
INFO: Loaded 1 modules (7701 inline 8-bit counters): 7701 [0x9ea588, 0x9ec39d),
INFO: Loaded 1 PC tables (7701 PCs): 7701 [0x74d7a0,0x76b8f0),
/out/dotnet_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==37475==ERRO... | cpp | ee16b8cc4d40dad775be22103b3d5419df9bd98b | https://github.com/VirusTotal/yara/commit/e83662f85c6f9534dc19e1a0cede55bebc64f21f | A buffer overflow exists in the dotnet module. |
arvo:14565 | n132/arvo:14565-vul | /src/kimageformats | [
{
"end_line": 351,
"function_name": "LoadTGA",
"start_line": 177,
"target_file": "/src/kimageformats/src/imageformats/tga.cpp"
}
] | Use-of-uninitialized-value | kimageformats | msan | INFO: Seed: 433082292
INFO: Loaded 1 modules (217594 inline 8-bit counters): 217594 [0x31d9378, 0x320e572),
INFO: Loaded 1 PC tables (217594 PCs): 217594 [0x320e578,0x3560518),
/out/kimgio_tga_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
QBuffer::seek: Invalid pos: 50
==7462==WARNING: MemorySanitizer:... | cpp | 40353da5dbdb9e9da703313e5c0647d2845ca528 | https://github.com/KDE/kimageformats/commit/4bf2894bdee81ae7da6953f05915351685373b75 | The vulnerability allows uninitialized memory to be read in the pixel structure, as the entire pixel_size in pixel does not always contain valid data, either from being read or explicitly set to 0. |
arvo:14574 | n132/arvo:14574-vul | /src/libarchive | [
{
"end_line": 3727,
"function_name": "rar5_read_data",
"start_line": 3677,
"target_file": "/src/libarchive/libarchive/archive_read_support_format_rar5.c"
}
] | Heap-buffer-overflow READ 8 | libarchive | asan | Reading 246 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/libarchive_fuzzer < INPUT_FILE
or
/out/libarchive_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
... | cpp | 9d9fb860a92b495fb3bcbbfbab6d72edcc680334 | https://github.com/libarchive/libarchive/commit/9950d89616d31fe2d83f5134d357560c423794ee | The RAR5 reader attempts to unpack entries that are marked as directories. |
arvo:14620 | n132/arvo:14620-vul | /src/open62541 | [
{
"end_line": 2303,
"function_name": "searchObjectForKeyRec",
"start_line": 2245,
"target_file": "/src/open62541/src/ua_types_encoding_json.c"
}
] | Use-of-uninitialized-value | open62541 | msan | INFO: Seed: 4188415935
INFO: Loaded 1 modules (10154 inline 8-bit counters): 10154 [0xa3e1f0, 0xa4099a),
INFO: Loaded 1 PC tables (10154 PCs): 10154 [0xa409a0,0xa68440),
/out/fuzz_json_decode: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==1251==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x6f... | cpp | 9e0a81f518fd46a5da8f0421b7a5ad856926002e | https://github.com/open62541/open62541/commit/cc7d2558ff2f63859ee1301b5d07b8b110f6cd6e | null |
arvo:14703 | n132/arvo:14703-vul | /src/karchive | [
{
"end_line": 189,
"function_name": "KAr::openArchive",
"start_line": 92,
"target_file": "/src/karchive/src/kar.cpp"
}
] | Heap-buffer-overflow WRITE 1 | karchive | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/karchive_fuzzer < INPUT_FILE
or
/out/karchive_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/karchive_... | cpp | a149acbeb0fc6dec388d1034e52ce9010ae057a6 | https://github.com/KDE/karchive/commit/5724138c01c616f8327e5be5156f56290c9a395c | A heap-buffer-overflow vulnerability exists in KAr::openArchive when handling broken files with a negative size value. If the size is negative, the function continues processing, which can lead to memory corruption. |
arvo:14821 | n132/arvo:14821-vul | /src/openthread | [
{
"end_line": 386,
"function_name": "Address::FromString",
"start_line": 260,
"target_file": "/src/openthread/src/core/net/ip6_address.cpp"
}
] | Stack-buffer-overflow WRITE 1 | openthread | asan | INFO: Seed: 2801645822
INFO: Loaded 1 modules (17755 inline 8-bit counters): 17755 [0x9e06b0, 0x9e4c0b),
INFO: Loaded 1 PC tables (17755 PCs): 17755 [0x70dbf8,0x7531a8),
/out/cli-uart-received-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================================================================... | cpp | 607f7711e60a3abb4257f510f13791b54045bdb8 | https://github.com/openthread/openthread/commit/8bb50d4ccde667295f892f976ee5ff90ba4a4a2f | A security vulnerability exists in the Ip6::Address::FromString function in the ip6 module, where insufficient parse validation allows malformed input to be incorrectly processed. |
arvo:14854 | n132/arvo:14854-vul | /src/openthread | [
{
"end_line": 444,
"function_name": "Ip6::RemoveMplOption",
"start_line": 330,
"target_file": "/src/openthread/src/core/net/ip6.cpp"
}
] | Stack-buffer-overflow WRITE 9 | openthread | asan | INFO: Seed: 1041795144
INFO: Loaded 1 modules (19553 inline 8-bit counters): 19553 [0xa06190, 0xa0adf1),
INFO: Loaded 1 PC tables (19553 PCs): 19553 [0x727758,0x773d68),
/out/ncp-uart-received-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================================================================... | cpp | 8d462f316e53d5255ca643acae384f2448980a3b | https://github.com/openthread/openthread/commit/bcfa791912dd7bd3dd7432f9f6313b6dd5ca358b | null |
arvo:14961 | n132/arvo:14961-vul | /src/karchive | [
{
"end_line": 259,
"function_name": "KCompressionDevice::seek",
"start_line": 206,
"target_file": "/src/karchive/src/kcompressiondevice.cpp"
}
] | Heap-buffer-overflow WRITE 2 | karchive | asan | INFO: Seed: 3257710741
INFO: Loaded 1 modules (116679 inline 8-bit counters): 116679 [0x1802e70, 0x181f637),
INFO: Loaded 1 PC tables (116679 PCs): 116679 [0x181f638,0x19e72a8),
/out/karchive_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================... | cpp | d9878a684bad6bff4dc9b052663b7bc87a44d729 | https://github.com/KDE/karchive/commit/5dedab8cb9ec5acb94d6f9957f0f3494f59a3316 | null |
arvo:14965 | n132/arvo:14965-vul | /src/karchive | [
{
"end_line": 259,
"function_name": "KCompressionDevice::seek",
"start_line": 206,
"target_file": "/src/karchive/src/kcompressiondevice.cpp"
}
] | UNKNOWN WRITE | karchive | msan | INFO: Seed: 177465663
INFO: Loaded 1 modules (109481 inline 8-bit counters): 109481 [0x1e7fee8, 0x1e9aa91),
INFO: Loaded 1 PC tables (109481 PCs): 109481 [0x1e9aa98,0x2046528),
/out/karchive_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:DEADLYSIGNAL
==18985==ERROR: MemorySanitizer: SEGV... | cpp | d9878a684bad6bff4dc9b052663b7bc87a44d729 | https://github.com/KDE/karchive/commit/5dedab8cb9ec5acb94d6f9957f0f3494f59a3316 | null |
arvo:15003 | n132/arvo:15003-vul | /src/radare2 | [
{
"end_line": 47,
"function_name": "check_buffer",
"start_line": 21,
"target_file": "/src/radare2/libr/bin/p/bin_omf.c"
}
] | Heap-buffer-overflow READ 1 | radare2 | asan | INFO: Seed: 870017072
INFO: Loaded 1 modules (159877 inline 8-bit counters): 159877 [0x25f1710, 0x2618795),
INFO: Loaded 1 PC tables (159877 PCs): 159877 [0x2618798,0x2888fe8),
/out/ia_fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
3
=================================================================
==3104... | cpp | ca9715e8c6b39795ef1203579d2f5afe5a1340c3 | https://github.com/radare/radare2/commit/0e7b37601a2011c9b11112566e2d8f1b2611986d | A crash occurs when parsing 1 byte truncated omf files. |
arvo:15035 | n132/arvo:15035-vul | /src/radare2 | [
{
"end_line": 2214,
"function_name": "bin_symbols",
"start_line": 1954,
"target_file": "/src/radare2/libr/core/cbin.c"
}
] | Heap-buffer-overflow WRITE 8 | radare2 | asan | INFO: Seed: 742956317
INFO: Loaded 1 modules (162886 inline 8-bit counters): 162886 [0x266d030, 0x2694c76),
INFO: Loaded 1 PC tables (162886 PCs): 162886 [0x2694c78,0x29110d8),
/out/ia_fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
3
parse: Missing backtick in expression.
|ERROR| Invalid command 'f sym.N`... | cpp | 16a44d3a3e4dbd3f52f6ceef34b1480423119416 | https://github.com/radare/radare2/commit/7d30ff52fc1be6f9698b166107b8981eab6ec7ba | null |
arvo:15120 | n132/arvo:15120-vul | /src/libarchive | [
{
"end_line": 1041,
"function_name": "archive_read_format_rar_read_data",
"start_line": 989,
"target_file": "/src/libarchive/libarchive/archive_read_support_format_rar.c"
}
] | UNKNOWN READ | libarchive | ubsan | INFO: Seed: 3676092055
INFO: Loaded 1 modules (11197 guards): 11197 [0x23e0e60, 0x23ebd54),
/out/libarchive_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitizer:DEADLYSIGNAL
==25279==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x7ff486002008 (pc 0x0000004cacd7 bp 0x7ff... | cpp | 8dee29db3ec1054ff571d7559a115003ac8854b3 | https://github.com/libarchive/libarchive/commit/cb76165ac5b091545c32d26483b0c0d7a2c47e4f | A use-after-free vulnerability exists in the RAR reader when read_data_compressed() returns ARCHIVE_FAILED. The caller is allowed to continue with the next archive headers, but rar->ppmd_valid is not set to 0 in addition to rar->start_new_table=1, which can lead to unsafe memory access. |
arvo:15133 | n132/arvo:15133-vul | /src/open62541 | [
{
"end_line": 570,
"function_name": "Operation_Browse",
"start_line": 452,
"target_file": "/src/open62541/src/server/ua_services_view.c"
}
] | Use-of-uninitialized-value | open62541 | msan | INFO: Seed: 3983688825
INFO: Loaded 1 modules (9977 inline 8-bit counters): 9977 [0xa33fb0, 0xa366a9),
INFO: Loaded 1 PC tables (9977 PCs): 9977 [0xa366b0,0xa5d640),
/out/fuzz_binary_message: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==1207==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x5d9... | cpp | aff76e6f778aba81b74e9f6e15cb66fc9db0d009 | https://github.com/open62541/open62541/commit/054f460d6e9e98deba186eee6bd956756dfc89e0 | null |
arvo:15152 | n132/arvo:15152-vul | /src/open62541 | [
{
"end_line": 570,
"function_name": "Operation_Browse",
"start_line": 452,
"target_file": "/src/open62541/src/server/ua_services_view.c"
}
] | Heap-buffer-overflow WRITE {*} | open62541 | asan | INFO: Seed: 734418743
INFO: Loaded 1 modules (10015 inline 8-bit counters): 10015 [0x9e2c10, 0x9e532f),
INFO: Loaded 1 PC tables (10015 PCs): 10015 [0x9e5330,0xa0c520),
/out/fuzz_binary_message: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==12... | cpp | aff76e6f778aba81b74e9f6e15cb66fc9db0d009 | https://github.com/open62541/open62541/commit/054f460d6e9e98deba186eee6bd956756dfc89e0 | null |
arvo:15200 | n132/arvo:15200-vul | /src/radare2 | [
{
"end_line": 2230,
"function_name": "bin_symbols",
"start_line": 1967,
"target_file": "/src/radare2/libr/core/cbin.c"
}
] | Heap-use-after-free READ 1 | radare2 | asan | INFO: Seed: 3473867696
INFO: Loaded 1 modules (163126 inline 8-bit counters): 163126 [0x2675630, 0x269d366),
INFO: Loaded 1 PC tables (163126 PCs): 163126 [0x269d368,0x291a6c8),
/out/ia_fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==31550... | cpp | 2c53ca5bf4f42b33c16941fd723b1f2133b3cd8b | https://github.com/radare/radare2/commit/d7fd30df8ef0f1a9081863b91a0197f26408dc6b | null |
arvo:15278 | n132/arvo:15278-vul | /src/libarchive | [
{
"end_line": 3933,
"function_name": "rar5_read_data_skip",
"start_line": 3884,
"target_file": "/src/libarchive/libarchive/archive_read_support_format_rar5.c"
}
] | UNKNOWN READ | libarchive | asan | INFO: Seed: 3711180061
INFO: Loaded 1 modules (12115 inline 8-bit counters): 12115 [0x2583258, 0x25861ab),
INFO: Loaded 1 PC tables (12115 PCs): 12115 [0x226de38,0x229d368),
/out/libarchive_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEADLYSIGNAL
=====================================... | cpp | fa2f626ac0ebe0841370eadd3ffd69679258fa0a | https://github.com/libarchive/libarchive/commit/47bb8187d3ef2d49ee8c7841cb2872b3cfa1f6f7 | The RAR5 reader contains a vulnerability where the `window_mask` variable is not always updated correctly to stay in sync with the `window_size` variable. In one instance, `window_size` is modified without updating `window_mask`, which leads to incorrect memory access outside the current window buffer and can result in... |
arvo:15373 | n132/arvo:15373-vul | /src/c-ares | [
{
"end_line": 209,
"function_name": "ares_parse_aaaa_reply",
"start_line": 52,
"target_file": "/src/c-ares/ares_parse_aaaa_reply.c"
}
] | Heap-buffer-overflow READ 16 | c-ares | asan | INFO: Seed: 11987
INFO: Loaded 1 modules (1592 inline 8-bit counters): 1592 [0x7f3f98, 0x7f45d0),
INFO: Loaded 1 PC tables (1592 PCs): 1592 [0x7f45d0,0x7fa950),
/out/ares_parse_reply_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==40955=... | c | c5bfbe0dc3086b39218a4d9a8ef2ce4f538673da | https://github.com/c-ares/c-ares/commit/5dd3629bc93449840c36dd635ea6cce606b8c366 | null |
arvo:15374 | n132/arvo:15374-vul | /src/openthread | [
{
"end_line": 287,
"function_name": "DatasetManager::HandleSet",
"start_line": 69,
"target_file": "/src/openthread/src/core/meshcop/dataset_manager_ftd.cpp"
}
] | Stack-buffer-overflow READ 15 | openthread | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/ip6-send-fuzzer < INPUT_FILE
or
/out/ip6-send-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/ip6-send-... | cpp | 0a084bbb9aef5cd233d787dc7ba14f718a0896e0 | https://github.com/openthread/openthread/commit/d1ded876f9cb09d83b904b40cf6a4f67adfe91fe | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.