task_id
stringlengths
8
10
docker_image
stringlengths
17
19
basedir
stringclasses
157 values
target_functions
listlengths
1
3
crash_type
stringclasses
85 values
project_name
stringclasses
157 values
sanitizer
stringclasses
3 values
sanitizer_output
stringlengths
1.13k
6.5M
language
stringclasses
2 values
vuln_commit
stringlengths
40
40
fix
stringlengths
69
110
vulnerability_description
stringlengths
38
824
arvo:10222
n132/arvo:10222-vul
/src/radare2
[ { "end_line": 731, "function_name": "r_bin_mdmp_init_directory", "start_line": 708, "target_file": "/src/radare2/libr/bin/format/mdmp/mdmp.c" } ]
Heap-buffer-overflow READ 8
radare2
asan
INFO: Seed: 1556718792 INFO: Loaded 1 modules (157202 inline 8-bit counters): 157202 [0x25919d0, 0x25b7fe2), INFO: Loaded 1 PC tables (157202 PCs): 157202 [0x25b7fe8,0x281e108), /out/ia_fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc 3 [ERROR] Size Mismatch - Stream data is larger than file size! [ERROR] S...
cpp
ef5c59e0d443c5af25ddfc7e5c33cc6ba1e65f6b
https://github.com/radare/radare2/commit/533da1306534ece22d67eaa3c32e46b717cd9199
null
arvo:10252
n132/arvo:10252-vul
/src/aom
[ { "end_line": 769, "function_name": "foreach_rest_unit_in_planes_mt", "start_line": 708, "target_file": "/src/aom/av1/common/thread_common.c" } ]
Heap-buffer-overflow WRITE 4
aom
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/av1_dec_fuzzer_threaded < INPUT_FILE or /out/av1_dec_fuzzer_threaded INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags...
cpp
8ae39302e354781ba03012d4f211da97e1715f9c
https://aomedia.googlesource.com/aom/+/32017745b0b4cb6d69ced6250dd67d9faf6282f8%5E%21/
A vulnerability exists in the loop restoration multi-threading code where, when luma loop restoration is disabled, the initialization of cur_sb_col in lr_sync does not occur correctly.
arvo:10486
n132/arvo:10486-vul
/src/libssh
[ { "end_line": 1300, "function_name": "ssh_buffer_unpack_va", "start_line": 1083, "target_file": "/src/libssh/src/buffer.c" } ]
Stack-buffer-overflow READ 8
libssh
asan
INFO: Seed: 1418098331 INFO: Loaded 1 modules (6761 inline 8-bit counters): 6761 [0xb64588, 0xb65ff1), INFO: Loaded 1 PC tables (6761 PCs): 6761 [0x89f0a0,0x8b9730), /out/libssh_server_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==4310...
cpp
5123f7955b67341e946987642354c0b123f5e1ff
https://git.libssh.org/projects/libssh.git07f7fa7806e94ccaa271c185213afed80e13a77d
An invalid memory access occurs in the function ssh_buffer_unpack() in the buffer component.
arvo:10487
n132/arvo:10487-vul
/src/radare2
[ { "end_line": 731, "function_name": "r_bin_mdmp_init_directory", "start_line": 708, "target_file": "/src/radare2/libr/bin/format/mdmp/mdmp.c" } ]
Heap-buffer-overflow READ 1
radare2
asan
INFO: Seed: 2320425810 INFO: Loaded 1 modules (157202 inline 8-bit counters): 157202 [0x25919d0, 0x25b7fe2), INFO: Loaded 1 PC tables (157202 PCs): 157202 [0x25b7fe8,0x281e108), /out/ia_fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc 3 [ERROR] Size Mismatch - Stream data is larger than file size! [ERROR] S...
cpp
ef5c59e0d443c5af25ddfc7e5c33cc6ba1e65f6b
https://github.com/radare/radare2/commit/533da1306534ece22d67eaa3c32e46b717cd9199
null
arvo:10604
n132/arvo:10604-vul
/src/open62541
[ { "end_line": 63, "function_name": "removeSecureChannel", "start_line": 48, "target_file": "/src/open62541/src/server/ua_securechannel_manager.c" }, { "end_line": 794, "function_name": "UA_Server_processBinaryMessage", "start_line": 757, "target_file": "/src/open62541/src/server/...
Use-of-uninitialized-value
open62541
msan
INFO: Seed: 1432192114 INFO: Loaded 1 modules (7027 inline 8-bit counters): 7027 [0xbfa488, 0xbfbffb), INFO: Loaded 1 PC tables (7027 PCs): 7027 [0xbfc000,0xc17730), /out/fuzz_binary_message: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==994==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x5322...
cpp
454b81b3ae282d93c2cbfad3530568a0ff358dd9
https://github.com/open62541/open62541/commit/27dc05196fc43036a2efcea060ae3711b3209cf2
null
arvo:10628
n132/arvo:10628-vul
/src/botan
[ { "end_line": 79, "function_name": "ref_oneandzero_unpad", "start_line": 54, "target_file": "/src/botan/src/fuzzer/mode_padding.cpp" } ]
Heap-buffer-overflow READ 1
botan
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/mode_padding < INPUT_FILE or /out/mode_padding INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/mode_padding [-...
cpp
97c7a8bf1d8af210b300b4d88a488b1c4cdaaa97
https://github.com/randombit/botan/commit/b859e175a0f2357dcfe2211ca487a7bde0e971b1
A crash occurs in the reference version of 1and0 padding in the mode padding fuzzer when processing an all-zero input.
arvo:1065
n132/arvo:1065-vul
/src/file
[ { "end_line": 515, "function_name": "file_regexec", "start_line": 507, "target_file": "/src/file/src/funcs.c" } ]
Use-of-uninitialized-value
file
msan
INFO: Seed: 1089329789 INFO: Loaded 1 modules (3771 guards): [0xa2f9a0, 0xa3348c), /out/magic_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==10654==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x590726 in match /src/file/src/softmagic.c:365:9 #1 0x58d2d3 in file_softmagic /src/file/src...
cpp
9b193be08bf7ecd374cd799844032671e869a1bf
https://github.com/file/file/commit/393dafa41b26a7d8ed593912e0ec1f1e7bd4e406
A bug in glibc/regex/msan causes regexec to return 0 but not initialize pmatch.
arvo:10811
n132/arvo:10811-vul
/src/wireshark
[ { "end_line": 12041, "function_name": "next_he_scidx", "start_line": 11910, "target_file": "/src/wireshark/epan/dissectors/packet-ieee80211.c" } ]
Global-buffer-overflow READ 4
wireshark
asan
oss-fuzzshark: disabling: ip oss-fuzzshark: disabling: udplite oss-fuzzshark: disabling: ospf oss-fuzzshark: disabling: bgp oss-fuzzshark: disabling: dhcp oss-fuzzshark: disabling: json oss-fuzzshark: disabling: snort oss-fuzzshark: configured for dissector: udp in table: ip.proto INFO: Seed: 1770710604 INFO: Loaded 1 ...
cpp
74903893d8be058bb51268d2b5e748e3ea2d9053
https://github.com/wireshark/wireshark/commit/ff73c307fae57fdb12e2fbbca87b9810d8b9cd27
null
arvo:10816
n132/arvo:10816-vul
/src/wireshark
[ { "end_line": 12041, "function_name": "next_he_scidx", "start_line": 11910, "target_file": "/src/wireshark/epan/dissectors/packet-ieee80211.c" } ]
Index-out-of-bounds
wireshark
ubsan
oss-fuzzshark: disabling: ip oss-fuzzshark: disabling: udplite oss-fuzzshark: disabling: ospf oss-fuzzshark: disabling: bgp oss-fuzzshark: disabling: dhcp oss-fuzzshark: disabling: json oss-fuzzshark: disabling: snort oss-fuzzshark: configured for dissector: udp in table: ip.proto INFO: Seed: 295136063 INFO: Loaded 1 m...
cpp
74903893d8be058bb51268d2b5e748e3ea2d9053
https://github.com/wireshark/wireshark/commit/ff73c307fae57fdb12e2fbbca87b9810d8b9cd27
null
arvo:10841
n132/arvo:10841-vul
/src/librawspeed
[ { "end_line": 54, "function_name": "PhaseOneDecompressor::PhaseOneDecompressor", "start_line": 38, "target_file": "/src/librawspeed/src/librawspeed/decompressors/PhaseOneDecompressor.cpp" } ]
Use-of-uninitialized-value
librawspeed
msan
INFO: Seed: 3104927159 INFO: Loaded 1 modules (1387 inline 8-bit counters): 1387 [0xa20870, 0xa20ddb), INFO: Loaded 1 PC tables (1387 PCs): 1387 [0xa20de0,0xa26490), /out/PhaseOneDecompressorFuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Uninitialized bytes in __msan_check_mem_is_initialized at offset 0...
cpp
fb1a40c2d9585e9af75ea8a17ad78b10564991bf
https://github.com/darktable-org/rawspeed/commit/27808d5a8dc8d13c64e88c0a819f5cd29b274979
The PhaseOneDecompressor does not validate the 'strips' vector (the rows it specifies), assuming it is always correct as in the proper IIQDecoder. This allows incorrect 'strips' to be processed, resulting in broken images.
arvo:10850
n132/arvo:10850-vul
/src/openvswitch
[ { "end_line": 5551, "function_name": "parse_odp_key_mask_attr", "start_line": 5364, "target_file": "/src/openvswitch/lib/odp-util.c" } ]
Heap-buffer-overflow READ 1
openvswitch
asan
INFO: Seed: 1676868116 INFO: Loaded 1 modules (38168 inline 8-bit counters): 38168 [0xea6f20, 0xeb0438), INFO: Loaded 1 PC tables (38168 PCs): 38168 [0xa7a868,0xb0f9e8), /out/odp_target: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==29017==ERR...
cpp
7587e1daa673149575149716605ef78f260d9989
https://github.com/openvswitch/ovs/commit/a1da3f297717c2de70dab88f7783117b78f85e89
null
arvo:10863
n132/arvo:10863-vul
/src/openvswitch
[ { "end_line": 2141, "function_name": "parse_odp_push_nsh_action", "start_line": 2031, "target_file": "/src/openvswitch/lib/odp-util.c" } ]
Use-of-uninitialized-value
openvswitch
msan
INFO: Seed: 2546583034 INFO: Loaded 1 modules (38478 inline 8-bit counters): 38478 [0x11682f8, 0x1171946), INFO: Loaded 1 PC tables (38478 PCs): 38478 [0xda1870,0xe37d50), /out/odp_target: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==29384==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x72899...
cpp
c3a08624975cf42489e8e1710babccc8d0569c85
https://github.com/openvswitch/ovs/commit/2e38f13d70a9c049497a8cab681fe7b1f443c8b1
A vulnerability exists in odp-util within the parse_odp_push_nsh_action function, where 'struct ofpbuf b' is expected to always point to metadata so that metadata can be filled with values through ofpbuf operations such as ofpbuf_put_hex and ofpbuf_push_zeros. However, the use of ofpbuf_push_zeros may change the data p...
arvo:10864
n132/arvo:10864-vul
/src/wpantund
[ { "end_line": 929, "function_name": "NCPInstanceBase::on_mesh_prefix_was_removed", "start_line": 888, "target_file": "/src/wpantund/src/wpantund/NCPInstanceBase-Addresses.cpp" } ]
Heap-use-after-free READ 4
wpantund
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/wpantund-fuzz < INPUT_FILE or /out/wpantund-fuzz INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/wpantund-fuzz...
cpp
8a8c7f7621dea86aa3136444561facf141e65512
https://github.com/openthread/wpantund/commit/bd1361434619a52b296e6a94c4188aae1a693179
A "use after delete" vulnerability exists in the on_mesh_prefix_was_removed() function.
arvo:10865
n132/arvo:10865-vul
/src/openvswitch
[ { "end_line": 2141, "function_name": "parse_odp_push_nsh_action", "start_line": 2031, "target_file": "/src/openvswitch/lib/odp-util.c" } ]
Stack-buffer-overflow READ {*}
openvswitch
asan
INFO: Seed: 1915738978 INFO: Loaded 1 modules (38220 inline 8-bit counters): 38220 [0xea8240, 0xeb178c), INFO: Loaded 1 PC tables (38220 PCs): 38220 [0xa7b928,0xb10de8), /out/odp_target: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==29144==ERR...
cpp
581d3bec7b8c714a98744b0b5f48dd7c7c4db037
https://github.com/openvswitch/ovs/commit/33a3ee6b39acd9799301ec6cc0069bc9e4b4428b
A buffer overflow vulnerability exists in odp-util when parsing push_nsh, because the buffer size of 'struct ofpbuf b' is less than the size of 'char buf[512]'. This can cause memory overflow of ofpbuf when calling ofpbuf_put_hex.
arvo:10945
n132/arvo:10945-vul
/src/openvswitch
[ { "end_line": 5551, "function_name": "parse_odp_key_mask_attr", "start_line": 5364, "target_file": "/src/openvswitch/lib/odp-util.c" } ]
Use-of-uninitialized-value
openvswitch
msan
INFO: Seed: 1620371529 INFO: Loaded 1 modules (38125 inline 8-bit counters): 38125 [0x1159fb8, 0x11634a5), INFO: Loaded 1 PC tables (38125 PCs): 38125 [0xd95400,0xe2a2d0), /out/odp_target: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==29026==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x88b57...
cpp
7587e1daa673149575149716605ef78f260d9989
https://github.com/openvswitch/ovs/commit/a1da3f297717c2de70dab88f7783117b78f85e89
null
arvo:10999
n132/arvo:10999-vul
/src/libgit2
[ { "end_line": 160, "function_name": "tag_parse", "start_line": 68, "target_file": "/src/libgit2/src/tag.c" } ]
Heap-buffer-overflow READ 2
libgit2
asan
INFO: Seed: 1582894454 INFO: Loaded 1 modules (27409 inline 8-bit counters): 27409 [0xe07350, 0xe0de61), INFO: Loaded 1 PC tables (27409 PCs): 27409 [0xadbbc0,0xb46cd0), /out/objects_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==2647==...
cpp
4c738e563d0a52c7f06902a6bdac37fe3472b86b
https://github.com/libgit2/libgit2/commit/ee11d47e3d907b66eeff99e0ba1e1c71e05164b7
An out of bounds read occurs when searching for the tag message during tag parsing. The code uses `strstr(buffer, "\n\n")` to locate the separator between tag fields and the tag message, but since `strstr` does not accept a buffer length, it may read past the end of the buffer. This can result in `strstr` returning a p...
arvo:11007
n132/arvo:11007-vul
/src/libgit2
[ { "end_line": 478, "function_name": "git_commit__parse_raw", "start_line": 386, "target_file": "/src/libgit2/src/commit.c" } ]
Heap-buffer-overflow READ 1
libgit2
asan
INFO: Seed: 1435506579 INFO: Loaded 1 modules (27478 inline 8-bit counters): 27478 [0xe0a7d0, 0xe11326), INFO: Loaded 1 PC tables (27478 PCs): 27478 [0xadec00,0xb4a160), /out/objects_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==2656==...
cpp
11d33df802b00acf5ef1e437c12751b3e6a5d39b
https://github.com/libgit2/libgit2/commit/cb23c3efd22d34db279ceb39cc312473761db5ed
An out-of-bound read occurs when parsing truncated author fields in commit objects. The commit parser handles multiple author fields by checking if a line starts with "author " using `git__prefixcmp`. If given a non-NUL-terminated string that ends immediately after the space, the comparison may read one byte out of bou...
arvo:11011
n132/arvo:11011-vul
/src/libarchive
[ { "end_line": 1861, "function_name": "init_unpack", "start_line": 1837, "target_file": "/src/libarchive/libarchive/archive_read_support_format_rar5.c" } ]
Heap-buffer-overflow WRITE 1
libarchive
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/libarchive_fuzzer < INPUT_FILE or /out/libarchive_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/libar...
cpp
84f7fd01b68127454fcee321086b771bdc230630
https://github.com/libarchive/libarchive/commit/b52dd6c9e4ef7cf95c2a6ae5ab7ccac7f6d462a1
A vulnerability exists where the mask is not set to 0 for directories, which can lead to buffer overflows due to incorrect truncation of the window.
arvo:11078
n132/arvo:11078-vul
/src/librawspeed
[ { "end_line": 619, "function_name": "VC5Decompressor::parseLargeCodeblock", "start_line": 549, "target_file": "/src/librawspeed/src/librawspeed/decompressors/VC5Decompressor.cpp" } ]
Use-of-uninitialized-value
librawspeed
msan
INFO: Seed: 3246793481 INFO: Loaded 1 modules (1869 inline 8-bit counters): 1869 [0xa40e50, 0xa4159d), INFO: Loaded 1 PC tables (1869 PCs): 1869 [0xa415a0,0xa48a70), /out/VC5DecompressorFuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc VC5DecompressorFuzzer: /src/librawspeed/src/librawspeed/common/Optional...
cpp
732a81d2bbe06dfe3bd4eef836d8f874fe718978
https://github.com/darktable-org/rawspeed/commit/7473d21494834f72f984b0e2a06346bd68fb6e1c
A vulnerability exists in VC5Decompressor where Optional tags are not properly handled, leading to potential assertion failures.
arvo:11170
n132/arvo:11170-vul
/src/openvswitch
[ { "end_line": 4843, "function_name": "scan_vxlan_gbp", "start_line": 4802, "target_file": "/src/openvswitch/lib/odp-util.c" } ]
Heap-buffer-overflow READ 1
openvswitch
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/odp_target < INPUT_FILE or /out/odp_target INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/odp_target [-N] afl...
cpp
f31b8ae7a7a777dd9dc40997903a283409674eae
https://github.com/openvswitch/ovs/commit/2d3deb58df05c4686f19ecf16ddbd76a79b2d5a5
null
arvo:11173
n132/arvo:11173-vul
/src/libgit2
[ { "end_line": 164, "function_name": "git__strntol64", "start_line": 71, "target_file": "/src/libgit2/src/util.c" } ]
Heap-buffer-overflow READ 1
libgit2
asan
Reading 58 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/objects_fuzzer < INPUT_FILE or /out/objects_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fu...
cpp
b5ae83bfac53fa3a17435ebf2fc3b79db8055dae
https://github.com/libgit2/libgit2/commit/41863a00f0d811c659c9ba87ae2cc0c3aae5a77f
The git__strntol family of functions accepts and skips leading spaces, but does not honor the provided buffer's length when doing so. This can lead to out-of-bounds reads if the input is not a simple NUL-terminated string. Additionally, when leading space is trimmed, the function advances the pointer without updating t...
arvo:11196
n132/arvo:11196-vul
/src/libarchive
[ { "end_line": 2764, "function_name": "merge_block", "start_line": 2673, "target_file": "/src/libarchive/libarchive/archive_read_support_format_rar5.c" } ]
Heap-buffer-overflow READ 1
libarchive
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/libarchive_fuzzer < INPUT_FILE or /out/libarchive_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/libar...
cpp
c3d742c9836f352af573d485aca9d312ed1320d5
https://github.com/libarchive/libarchive/commit/4bc5892128a042780f167ac35aa72f63c426f3b7
null
arvo:11253
n132/arvo:11253-vul
/src/openvswitch
[ { "end_line": 480, "function_name": "ofpbuf_insert", "start_line": 468, "target_file": "/src/openvswitch/lib/ofpbuf.c" } ]
Heap-buffer-overflow WRITE {*}
openvswitch
asan
Reading 32 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/ofctl_parse_target < INPUT_FILE or /out/ofctl_parse_target INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: ...
cpp
b48aa1437df1d438d39d7c798ef93e0854911022
https://github.com/openvswitch/ovs/commit/39976b99178eaa4862c43eaf00959f2653a01a6f
An arithmetic error in the ofpbuf_insert() function in ofpbuf causes the memmove byte count to be calculated incorrectly, because ofpbuf_put_uninit increases b->size by n. This results in an incorrect number of bytes being moved during buffer operations.
arvo:11263
n132/arvo:11263-vul
/src/harfbuzz
[ { "end_line": 102, "function_name": "test_face", "start_line": 35, "target_file": "/src/harfbuzz/test/api/test-ot-face.c" } ]
Heap-buffer-overflow READ {*}
harfbuzz
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/hb-shape-fuzzer < INPUT_FILE or /out/hb-shape-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/hb-shape-...
cpp
252632c477b963f305116d69fcafacd8bf7b97bf
https://github.com/harfbuzz/harfbuzz/commit/6482fda519ca7d173e3bcb3717aa30e237f04b25
null
arvo:11300
n132/arvo:11300-vul
/src/yara
[ { "end_line": 1359, "function_name": "dotnet_parse_tilde_2", "start_line": 342, "target_file": "/src/yara/libyara/modules/dotnet.c" } ]
UNKNOWN READ
yara
msan
INFO: Seed: 2199298579 INFO: Loaded 1 modules (7698 inline 8-bit counters): 7698 [0xb2ac48, 0xb2ca5a), INFO: Loaded 1 PC tables (7698 PCs): 7698 [0x89c9a0,0x8baac0), /out/dotnet_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc MemorySanitizer:DEADLYSIGNAL ==37394==ERROR: MemorySanitizer: SEGV on unknown a...
cpp
ab99479c96ba9759193b3b1f42089e5fe1b647f6
https://github.com/VirusTotal/yara/commit/72c109ea85f1434237a292de3478f53554989453
null
arvo:11359
n132/arvo:11359-vul
/src/radare2
[ { "end_line": 252, "function_name": "r_core_task_decref", "start_line": 240, "target_file": "/src/radare2/libr/core/task.c" } ]
Heap-use-after-free READ 8
radare2
asan
INFO: Seed: 1412606771 INFO: Loaded 1 modules (150204 inline 8-bit counters): 150204 [0x2424da8, 0x2449864), INFO: Loaded 1 PC tables (150204 PCs): 150204 [0x2449868,0x2694428), /out/ia_fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc Cannot allocate (0) 0 bytes cannot open file malloc://0 No file to load b...
cpp
8bc369ef3f67c3e074cccfe383922393fa11c89a
https://github.com/radare/radare2/commit/5783cf42c40aaed9b9180ae7069c7a60ea86dc45
null
arvo:11376
n132/arvo:11376-vul
/src/openthread
[ { "end_line": 1597, "function_name": "MeshForwarder::GetFramePriority", "start_line": 1560, "target_file": "/src/openthread/src/core/thread/mesh_forwarder.cpp" } ]
Heap-buffer-overflow READ 8
openthread
asan
Reading 13 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/radio-receive-done-fuzzer < INPUT_FILE or /out/radio-receive-done-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz ...
cpp
33b0ee93308345316ca7a8a1ddc8aa86ba42983e
https://github.com/openthread/openthread/commit/bf72fd8f8d4a898c019f279c8605e66fc0b42878
null
arvo:11382
n132/arvo:11382-vul
/src/libgit2
[ { "end_line": 181, "function_name": "git__strntol64", "start_line": 71, "target_file": "/src/libgit2/src/util.c" } ]
Heap-buffer-overflow READ 1
libgit2
asan
INFO: Seed: 1749770194 INFO: Loaded 1 modules (27472 inline 8-bit counters): 27472 [0xe0a4e8, 0xe11038), INFO: Loaded 1 PC tables (27472 PCs): 27472 [0xade8a0,0xb49da0), /out/objects_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==2657==...
cpp
fd4e3b216c0881b5825c013a55b487ac2e8b8ab0
https://github.com/libgit2/libgit2/commit/4209a5125802e714a6342a74ff0835c5c4a2397d
The strntol function inappropriately handles parsing numbers with a leading plus or minus sign, resulting in potential out-of-bounds reads. When a leading sign is present, the function advances the pointer but fails to update the number of remaining bytes in the string, which can cause the parser to read beyond the buf...
arvo:11429
n132/arvo:11429-vul
/src/librawspeed
[ { "end_line": 558, "function_name": "VC5Decompressor::Wavelet::HighPassBand::decode", "start_line": 531, "target_file": "/src/librawspeed/src/librawspeed/decompressors/VC5Decompressor.cpp" } ]
Heap-buffer-overflow WRITE 2
librawspeed
asan
INFO: Seed: 2623466991 INFO: Loaded 1 modules (1999 inline 8-bit counters): 1999 [0x941870, 0x94203f), INFO: Loaded 1 PC tables (1999 PCs): 1999 [0x942040,0x949d30), /out/VC5DecompressorFuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==671...
cpp
021ce54ea210896d1f3de1d2c604c3472769ddf7
https://github.com/darktable-org/rawspeed/commit/0bcf3488a4989c2724f0c4383401b0d0dcfc3dcc
An off-by-one error exists in the output buffer check within the HighPassBand::decode() function of VC5Decompressor.
arvo:11444
n132/arvo:11444-vul
/src/imagemagick
[ { "end_line": 312, "function_name": "GetNextToken", "start_line": 167, "target_file": "/src/imagemagick/MagickCore/token.c" } ]
Use-of-uninitialized-value
imagemagick
msan
INFO: Seed: 1852361830 INFO: Loaded 1 modules (166115 inline 8-bit counters): 166115 [0x2be2b48, 0x2c0b42b), INFO: Loaded 1 PC tables (166115 PCs): 166115 [0x2c0b430,0x2e94260), /out/encoder_mvg_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==159048==WARNING: MemorySanitizer: use-of-uninitialized-value...
cpp
c7cdd6602365ce55a408e2d793c92a8a9e0027c0
https://github.com/imagemagick/imagemagick/commit/537c2ca0244889634ced3c3e0724431862d3ced5
null
arvo:11484
n132/arvo:11484-vul
/src/open62541
[ { "end_line": 415, "function_name": "Variant_clear", "start_line": 403, "target_file": "/src/open62541/src/ua_types.c" } ]
Heap-use-after-free READ 4
open62541
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_binary_decode < INPUT_FILE or /out/fuzz_binary_decode INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/fuz...
cpp
94d61b6c13b975d711fe9027a6dd6eedbb4b6503
https://github.com/open62541/open62541/commit/f4f8cdc4c344ad75051f3785a53a956a644cba05
null
arvo:11517
n132/arvo:11517-vul
/src/aom
[ { "end_line": 1478, "function_name": "highbd_dr_prediction_z1_64xN_avx2", "start_line": 1380, "target_file": "/src/aom/aom_dsp/x86/intrapred_avx2.c" } ]
Stack-buffer-overflow READ 16
aom
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/av1_dec_fuzzer < INPUT_FILE or /out/av1_dec_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/av1_dec_fuz...
cpp
f48b0d22e2c1391351cb4ba75d033db1df9ad7ce
https://aomedia.googlesource.com/aom/+/fe996504f76f4204074c1f8f681925852c61b777%5E%21/
null
arvo:11523
n132/arvo:11523-vul
/src/aom
[ { "end_line": 4760, "function_name": "show_existing_frame_reset", "start_line": 4714, "target_file": "/src/aom/av1/decoder/decodeframe.c" } ]
Heap-buffer-overflow READ {*}
aom
asan
INFO: Seed: 2794871271 INFO: Loaded 1 modules (28001 inline 8-bit counters): 28001 [0x103b3a8, 0x1042109), INFO: Loaded 1 PC tables (28001 PCs): 28001 [0x1042110,0x10af720), /out/av1_dec_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==37...
cpp
352c10bb5b6466e21c657c2ef5de53d793e26724
https://aomedia.googlesource.com/aom/+/0ad5c625be27d7a3622dae95e9afe5e66b112d46%5E%21/
A vulnerability exists where the frame context is not set up using next_ref_frame_map, potentially leading to incorrect reference frame handling.
arvo:11752
n132/arvo:11752-vul
/src/yara
[ { "end_line": 522, "function_name": "yr_re_ast_split_at_chaining_point", "start_line": 456, "target_file": "/src/yara/libyara/re.c" } ]
Heap-use-after-free READ 4
yara
asan
INFO: Seed: 1032320226 INFO: Loaded 1 modules (7656 inline 8-bit counters): 7656 [0x9e1b88, 0x9e3970), INFO: Loaded 1 PC tables (7656 PCs): 7656 [0x7444a0,0x762320), /out/rules_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==37430==ERROR...
cpp
459d5a2bae0f4c9a2921be0d21fe920258cb5d6d
https://github.com/VirusTotal/yara/commit/8eeed3ef5e2bbd5b927bf1b72879c1fa9ab979cb
null
arvo:11753
n132/arvo:11753-vul
/src/yara
[ { "end_line": 522, "function_name": "yr_re_ast_split_at_chaining_point", "start_line": 456, "target_file": "/src/yara/libyara/re.c" } ]
Heap-use-after-free READ 4
yara
asan
INFO: Seed: 3471148202 INFO: Loaded 1 modules (7656 inline 8-bit counters): 7656 [0x9e1b88, 0x9e3970), INFO: Loaded 1 PC tables (7656 PCs): 7656 [0x7444a0,0x762320), /out/rules_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==37385==ERROR...
cpp
459d5a2bae0f4c9a2921be0d21fe920258cb5d6d
https://github.com/VirusTotal/yara/commit/8eeed3ef5e2bbd5b927bf1b72879c1fa9ab979cb
null
arvo:11945
n132/arvo:11945-vul
/src/yara
[ { "end_line": 251, "function_name": "dotnet_parse_us", "start_line": 200, "target_file": "/src/yara/libyara/modules/dotnet.c" } ]
Heap-buffer-overflow READ 1
yara
asan
INFO: Seed: 680739600 INFO: Loaded 1 modules (7670 inline 8-bit counters): 7670 [0x9e8628, 0x9ea41e), INFO: Loaded 1 PC tables (7670 PCs): 7670 [0x74bdc0,0x769d20), /out/dotnet_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==37397==ERROR...
cpp
a0ef13b26b9aa84af0754ac3fae140794ecc0876
https://github.com/VirusTotal/yara/commit/7493247020e24407f120b6b29f6dd43c883e2f21
A buffer overflow exists in the dotnet module.
arvo:12173
n132/arvo:12173-vul
/src/curl
[ { "end_line": 806, "function_name": "Curl_disconnect", "start_line": 752, "target_file": "/src/curl/lib/url.c" } ]
UNKNOWN READ
curl
asan
INFO: Seed: 1785420652 INFO: Loaded 1 modules (64063 inline 8-bit counters): 64063 [0x1118720, 0x112815f), INFO: Loaded 1 PC tables (64063 PCs): 64063 [0x1128160,0x1222550), /out/curl_fuzzer_ftp: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:DEADLYSIGNAL =======================================...
cpp
e9ababd4f5aff042dd3b5a4f9568f22e6604d115
https://github.com/curl/curl/commit/f3ce38739fa49008e36959aa8189c01ab1bad5b5
The vulnerability occurs because conn->data is not explicitly set to point to the current transfer when invoking the protocol-specific disconnect function in the disconnect process. This can cause the disconnect function to not work correctly.
arvo:12255
n132/arvo:12255-vul
/src/openvswitch
[ { "end_line": 5619, "function_name": "parse_odp_key_mask_attr", "start_line": 5420, "target_file": "/src/openvswitch/lib/odp-util.c" } ]
Heap-buffer-overflow READ 1
openvswitch
asan
INFO: Seed: 3789077833 INFO: Loaded 1 modules (38573 inline 8-bit counters): 38573 [0xeb5ec0, 0xebf56d), INFO: Loaded 1 PC tables (38573 PCs): 38573 [0xa84d88,0xb1b858), /out/odp_target: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==29371==ERR...
cpp
1f886f070f7fd0ada801f92b7ba6832d1b3f4314
https://github.com/openvswitch/ovs/commit/401eacfb22fc4a3bd5df5752ee77adf598864955
A vulnerability exists in odp-util where parsing of odp actions does not stop if nlattr is overflowed. The function `encap = nl_msg_start_nested(key, OVS_KEY_ATTR_ENCAP)` ensures that key->size is at least as large as (encap + NLA_HDRLEN), making the subsequent `if` statement safe, but without proper checks, an overflo...
arvo:1236
n132/arvo:1236-vul
/src/wireshark
[ { "end_line": 3915, "function_name": "OALMarshal_UncompressValue", "start_line": 3872, "target_file": "/src/wireshark/epan/dissectors/packet-dof.c" } ]
Heap-buffer-overflow READ 1
wireshark
asan
oss-fuzz configured for dissector: ip INFO: Seed: 1145313904 INFO: Loaded 1 modules (279650 guards): [0xc40da50, 0xc51ebd8), /out/fuzzshark_ip: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==100011==ERROR: AddressSanitizer: heap-buffer-overflow on...
cpp
f42b2a531e0c9cafe7d694cb1109dd53c33fdd40
https://github.com/wireshark/wireshark/commit/6fdf8eb5a92d51617203be1a712c15585b156497
A buffer overflow (read) vulnerability exists in the DOF code due to missing sanity checks on the buffer length parsed from data. The code does not verify the buffer size before reading a value, which can lead to out-of-bounds memory access.
arvo:12419
n132/arvo:12419-vul
/src/libxml2
[ { "end_line": 279, "function_name": "xmlTextReaderRemoveID", "start_line": 255, "target_file": "/src/libxml2/xmlreader.c" } ]
Heap-double-free
libxml2
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/libxml2_xml_reader_for_file_fuzzer < INPUT_FILE or /out/libxml2_xml_reader_for_file_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this:...
cpp
619534ef2ed501e5206915064a5bc36153a897f7
https://gitlab.gnome.org/GNOME/libxml2/-/commit/26828cb3a1294e09e42064f4769d4b3c0a8623b3
A double-free vulnerability exists in the xmlFreeID function in xmlreader.c due to changes introduced in a recent commit intended to fix a memory leak.
arvo:12420
n132/arvo:12420-vul
/src/libidn2
[ { "end_line": 635, "function_name": "idn2_to_ascii_4i", "start_line": 580, "target_file": "/src/libidn2/lib/lookup.c" } ]
Heap-buffer-overflow WRITE {*}
libidn2
asan
INFO: Seed: 3255613944 INFO: Loaded 1 modules (1555 inline 8-bit counters): 1555 [0x932328, 0x93293b), INFO: Loaded 1 PC tables (1555 PCs): 1555 [0x6cd940,0x6d3a70), /out/libidn2_to_ascii_8z_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ...
cpp
0965b23044e5b55a3beb01d6a6c62eb2b9a7b0c9
https://gitlab.com/libidn/libidn2/-/commit/e4d1558aa2c1c04a05066ee8600f37603890ba8c
A vulnerability exists in the idn2_to_ascii_4i() function where the output length is not restricted to 63 characters.
arvo:12536
n132/arvo:12536-vul
/src/openthread
[ { "end_line": 339, "function_name": "Message::ParseHeader", "start_line": 316, "target_file": "/src/openthread/src/core/coap/coap_message.cpp" } ]
Index-out-of-bounds
openthread
ubsan
INFO: Seed: 2432220643 INFO: Loaded 1 modules (19595 inline 8-bit counters): 19595 [0x8b7848, 0x8bc4d3), INFO: Loaded 1 PC tables (19595 PCs): 19595 [0x5e5440,0x631cf0), /out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc coap/coap_message.cpp:320:5: runtime error: index 96 out of bounds for ty...
cpp
28582ef03817a5627af3f41142b8d1be2981216f
https://github.com/openthread/openthread/commit/b268171278682083d290e01f0df4eba12cc4fc95
null
arvo:12595
n132/arvo:12595-vul
/src/readstat
[ { "end_line": 286, "function_name": "sav_read_variable_missing_values", "start_line": 247, "target_file": "/src/readstat/src/spss/readstat_sav_read.c" } ]
Bad-free
readstat
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_format_sav < INPUT_FILE or /out/fuzz_format_sav INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/fuzz_form...
cpp
7cfc52111e68e682db4cb59ac16b724780e0596a
https://github.com/WizardMac/ReadStat/commit/14265e717e48fc877697a27f1bee232116ce21e5
null
arvo:12631
n132/arvo:12631-vul
/src/openthread
[ { "end_line": 213, "function_name": "Uart::ReceiveTask", "start_line": 143, "target_file": "/src/openthread/src/cli/cli_uart.cpp" } ]
Index-out-of-bounds
openthread
ubsan
INFO: Seed: 3421409168 INFO: Loaded 1 modules (22293 inline 8-bit counters): 22293 [0x8f8108, 0x8fd81d), INFO: Loaded 1 PC tables (22293 PCs): 22293 [0x60fec0,0x667010), /out/cli-uart-received-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc cli_uart.cpp:177:17: runtime error: index 512 out of bounds for ...
cpp
aa5673cd48b9cc3b626fc40aa6fb380cf3e62393
https://github.com/openthread/openthread/commit/4ca58d440d83124f47ee28d7a84084543ff80a9d
null
arvo:12642
n132/arvo:12642-vul
/src/openthread
[ { "end_line": 1674, "function_name": "Interpreter::ProcessService", "start_line": 1624, "target_file": "/src/openthread/src/cli/cli.cpp" } ]
Stack-buffer-overflow WRITE {*}
openthread
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/cli-uart-received-fuzzer < INPUT_FILE or /out/cli-uart-received-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-fla...
cpp
993f537a03273e69ade90a38a653e367cb1a6c30
https://github.com/openthread/openthread/commit/249bc598748ad08a98b08995698669613594e54b
null
arvo:12662
n132/arvo:12662-vul
/src/readstat
[ { "end_line": 842, "function_name": "sas7bdat_parse_page_pass2", "start_line": 747, "target_file": "/src/readstat/src/sas/readstat_sas7bdat_read.c" } ]
Heap-buffer-overflow READ 8
readstat
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_format_sas7bdat < INPUT_FILE or /out/fuzz_format_sas7bdat INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out...
cpp
e1c41e1363b0414e49b21fd1ebbe24ff0733cdb1
https://github.com/WizardMac/ReadStat/commit/15d2192da9028fee80da0b2dd8df1b6a00873e46
The SAS7BDAT reader contains insufficient bounds checking, which allows a buffer overrun when reading the subheader pointers.
arvo:12679
n132/arvo:12679-vul
/src/openthread
[ { "end_line": 312, "function_name": "CoapSecure::Process", "start_line": 128, "target_file": "/src/openthread/src/cli/cli_coap_secure.cpp" } ]
Memcpy-param-overlap
openthread
asan
Reading 79 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/cli-uart-received-fuzzer < INPUT_FILE or /out/cli-uart-received-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz ex...
cpp
cc26f1418ee05e7c7eb277cbbcd03fb04fffccf8
https://github.com/openthread/openthread/commit/cb5e076a3e0a8daa7ee3576e1962c5388f2002ca
null
arvo:12684
n132/arvo:12684-vul
/src/openthread
[ { "end_line": 312, "function_name": "CoapSecure::Process", "start_line": 128, "target_file": "/src/openthread/src/cli/cli_coap_secure.cpp" } ]
UNKNOWN READ
openthread
asan
Reading 3396 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/cli-uart-received-fuzzer < INPUT_FILE or /out/cli-uart-received-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz ...
cpp
cc26f1418ee05e7c7eb277cbbcd03fb04fffccf8
https://github.com/openthread/openthread/commit/cb5e076a3e0a8daa7ee3576e1962c5388f2002ca
null
arvo:12712
n132/arvo:12712-vul
/src/openthread
[ { "end_line": 178, "function_name": "otThreadReleaseRouterId", "start_line": 167, "target_file": "/src/openthread/src/core/api/thread_ftd_api.cpp" } ]
Index-out-of-bounds
openthread
ubsan
INFO: Seed: 482520146 INFO: Loaded 1 modules (22308 inline 8-bit counters): 22308 [0x8f7068, 0x8fc78c), INFO: Loaded 1 PC tables (22308 PCs): 22308 [0x60e8e0,0x665b20), /out/cli-uart-received-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc thread/router_table.cpp:106:13: runtime error: index 12 out of bo...
cpp
cb5e076a3e0a8daa7ee3576e1962c5388f2002ca
https://github.com/openthread/openthread/commit/f9659b3733b85ffb499692a6d2f18a6414782dc0
null
arvo:12950
n132/arvo:12950-vul
/src/pcre2
[ { "end_line": 2310, "function_name": "read_name", "start_line": 2209, "target_file": "/src/pcre2/src/pcre2_compile.c" } ]
Heap-buffer-overflow READ 1
pcre2
asan
INFO: Seed: 1226477522 INFO: Loaded 1 modules (8806 inline 8-bit counters): 8806 [0x9c0250, 0x9c24b6), INFO: Loaded 1 PC tables (8806 PCs): 8806 [0x73e320,0x760980), /out/pcre2_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==7911==ERROR:...
cpp
4d17f4b8562fa7237ba34dbdaa881c258e87f3e0
https://github.com/PCRE2Project/pcre2/commit/45959f1eecb9eb2a06ec492e8d989cc1a1dc1d97
null
arvo:1304
n132/arvo:1304-vul
/src/gnutls
[ { "end_line": 1831, "function_name": "gnutls_pkcs12_simple_parse", "start_line": 1441, "target_file": "/src/gnutls/lib/x509/pkcs12.c" } ]
Heap-use-after-free READ 8
gnutls
asan
INFO: Seed: 2247902755 INFO: Loaded 1 modules (25762 guards): [0xc5e290, 0xc77518), /out/gnutls_pkcs12_key_parser_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==91286==ERROR: AddressSanitizer: heap-use-after-free on address 0x606000000020 ...
cpp
ace6cbd989db6e9413f7e5cc9c6867a7a12ad048
https://gitlab.com/gnutls/gnutls/-/commit/7265612d87f51c2f52a2e4cf5bdf14f31bd291a2
The gnutls_pkcs12_simple_parse function does not set variables to null after deinitialization, which allows the variables to be deinitialized twice during cleanup.
arvo:13073
n132/arvo:13073-vul
/src/pcre2
[ { "end_line": 2016, "function_name": "PRIV", "start_line": 1460, "target_file": "/src/pcre2/src/pcre2_compile.c" } ]
Heap-buffer-overflow READ 1
pcre2
asan
INFO: Seed: 1259692538 INFO: Loaded 1 modules (8813 inline 8-bit counters): 8813 [0x9bf470, 0x9c16dd), INFO: Loaded 1 PC tables (8813 PCs): 8813 [0x73ce40,0x75f510), /out/pcre2_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==7973==ERROR:...
cpp
8c8deae8ebb37774878ee402eac1d081c1d6c8d7
https://github.com/PCRE2Project/pcre2/commit/f2e1cea2884e93a0f27473c4e3db18936abed039
null
arvo:13222
n132/arvo:13222-vul
/src/file
[ { "end_line": 498, "function_name": "looks_ucs32", "start_line": 459, "target_file": "/src/file/src/encoding.c" } ]
Heap-buffer-overflow READ 1
file
asan
INFO: Seed: 50742689 INFO: Loaded 1 modules (4168 inline 8-bit counters): 4168 [0x92e308, 0x92f350), INFO: Loaded 1 PC tables (4168 PCs): 4168 [0x92f350,0x93f7d0), /out/magic_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==10911==ERROR: ...
cpp
f3a4b9ada3ca99e62c62b9aa78eee4935a8094fe
https://github.com/file/file/commit/ecca6e54f49f251bb4c16fe145d04c2b45923dc3
null
arvo:13332
n132/arvo:13332-vul
/src/openthread
[ { "end_line": 350, "function_name": "IsValid", "start_line": 345, "target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp" } ]
UNKNOWN READ
openthread
ubsan
INFO: Seed: 126674142 INFO: Loaded 1 modules (19713 inline 8-bit counters): 19713 [0x8c14c8, 0x8c61c9), INFO: Loaded 1 PC tables (19713 PCs): 19713 [0x5ec9c8,0x6399d8), /out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSanitizer:DEADLYSIGNAL ==17666==ERROR: UndefinedBehaviorS...
cpp
d912393c7f055333378ba80ba5ae3ddcf0e4be02
https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115
null
arvo:13333
n132/arvo:13333-vul
/src/openthread
[ { "end_line": 350, "function_name": "IsValid", "start_line": 345, "target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp" } ]
Stack-buffer-overflow READ 1
openthread
asan
INFO: Seed: 1777681649 INFO: Loaded 1 modules (15966 inline 8-bit counters): 15966 [0xa8f5a8, 0xa93406), INFO: Loaded 1 PC tables (15966 PCs): 15966 [0x7ba388,0x7f8968), /out/radio-receive-done-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===============================================================...
cpp
d912393c7f055333378ba80ba5ae3ddcf0e4be02
https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115
null
arvo:13334
n132/arvo:13334-vul
/src/openthread
[ { "end_line": 350, "function_name": "IsValid", "start_line": 345, "target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp" } ]
Stack-buffer-overflow WRITE {*}
openthread
asan
INFO: Seed: 821079052 INFO: Loaded 1 modules (15966 inline 8-bit counters): 15966 [0xa8f5a8, 0xa93406), INFO: Loaded 1 PC tables (15966 PCs): 15966 [0x7ba388,0x7f8968), /out/radio-receive-done-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================...
cpp
d912393c7f055333378ba80ba5ae3ddcf0e4be02
https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115
null
arvo:13348
n132/arvo:13348-vul
/src/openthread
[ { "end_line": 350, "function_name": "IsValid", "start_line": 345, "target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp" } ]
UNKNOWN READ
openthread
ubsan
INFO: Seed: 2280158323 INFO: Loaded 1 modules (19713 inline 8-bit counters): 19713 [0x8c14c8, 0x8c61c9), INFO: Loaded 1 PC tables (19713 PCs): 19713 [0x5ec9c8,0x6399d8), /out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSanitizer:DEADLYSIGNAL ==17667==ERROR: UndefinedBehavior...
cpp
d912393c7f055333378ba80ba5ae3ddcf0e4be02
https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115
null
arvo:13353
n132/arvo:13353-vul
/src/openthread
[ { "end_line": 350, "function_name": "IsValid", "start_line": 345, "target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp" } ]
UNKNOWN READ
openthread
ubsan
INFO: Seed: 3234042323 INFO: Loaded 1 modules (19713 inline 8-bit counters): 19713 [0x8c14c8, 0x8c61c9), INFO: Loaded 1 PC tables (19713 PCs): 19713 [0x5ec9c8,0x6399d8), /out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSanitizer:DEADLYSIGNAL ==17666==ERROR: UndefinedBehavior...
cpp
d912393c7f055333378ba80ba5ae3ddcf0e4be02
https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115
null
arvo:13359
n132/arvo:13359-vul
/src/libidn2
[ { "end_line": 220, "function_name": "punycode_decode", "start_line": 137, "target_file": "/src/libidn2/lib/puny_decode.c" } ]
Use-of-uninitialized-value
libidn2
msan
INFO: Seed: 56250094 INFO: Loaded 1 modules (1574 inline 8-bit counters): 1574 [0x9fefb8, 0x9ff5de), INFO: Loaded 1 PC tables (1574 PCs): 1574 [0x796b30,0x79cd90), /out/libidn2_to_ascii_8z_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==94340==WARNING: MemorySanitizer: use-of-uninitialized-value #0...
cpp
ce0d453222ca51c056f4f442988710eb0b696365
https://gitlab.com/libidn/libidn2/-/commit/734ef70e7e719e7aa777dbafbc727225bf71980a
null
arvo:13363
n132/arvo:13363-vul
/src/openthread
[ { "end_line": 350, "function_name": "IsValid", "start_line": 345, "target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp" } ]
Bad-cast
openthread
ubsan
INFO: Seed: 1441229541 INFO: Loaded 1 modules (19713 inline 8-bit counters): 19713 [0x8c14c8, 0x8c61c9), INFO: Loaded 1 PC tables (19713 PCs): 19713 [0x5ec9c8,0x6399d8), /out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc net/ip6.cpp:1068:20: runtime error: member call on address 0x000000ce0505...
cpp
d912393c7f055333378ba80ba5ae3ddcf0e4be02
https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115
null
arvo:13369
n132/arvo:13369-vul
/src/openthread
[ { "end_line": 350, "function_name": "IsValid", "start_line": 345, "target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp" } ]
UNKNOWN READ
openthread
ubsan
INFO: Seed: 3216371041 INFO: Loaded 1 modules (19713 inline 8-bit counters): 19713 [0x8c14c8, 0x8c61c9), INFO: Loaded 1 PC tables (19713 PCs): 19713 [0x5ec9c8,0x6399d8), /out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSanitizer:DEADLYSIGNAL ==17662==ERROR: UndefinedBehavior...
cpp
d912393c7f055333378ba80ba5ae3ddcf0e4be02
https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115
null
arvo:13380
n132/arvo:13380-vul
/src/openthread
[ { "end_line": 350, "function_name": "IsValid", "start_line": 345, "target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp" } ]
UNKNOWN READ
openthread
ubsan
INFO: Seed: 2257461537 INFO: Loaded 1 modules (19664 inline 8-bit counters): 19664 [0x8c0288, 0x8c4f58), INFO: Loaded 1 PC tables (19664 PCs): 19664 [0x5ebba8,0x6388a8), /out/radio-receive-done-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSanitizer:DEADLYSIGNAL ==17668==ERROR: Undefin...
cpp
d912393c7f055333378ba80ba5ae3ddcf0e4be02
https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115
null
arvo:13381
n132/arvo:13381-vul
/src/openthread
[ { "end_line": 350, "function_name": "IsValid", "start_line": 345, "target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp" } ]
Index-out-of-bounds
openthread
ubsan
INFO: Seed: 3899203174 INFO: Loaded 1 modules (19713 inline 8-bit counters): 19713 [0x8c14c8, 0x8c61c9), INFO: Loaded 1 PC tables (19713 PCs): 19713 [0x5ec9c8,0x6399d8), /out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc thread/child_table.cpp:82:31: runtime error: index 32 out of bounds for t...
cpp
d912393c7f055333378ba80ba5ae3ddcf0e4be02
https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115
null
arvo:13383
n132/arvo:13383-vul
/src/openthread
[ { "end_line": 350, "function_name": "IsValid", "start_line": 345, "target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp" } ]
UNKNOWN READ
openthread
ubsan
INFO: Seed: 70054613 INFO: Loaded 1 modules (19664 inline 8-bit counters): 19664 [0x8c0288, 0x8c4f58), INFO: Loaded 1 PC tables (19664 PCs): 19664 [0x5ebba8,0x6388a8), /out/radio-receive-done-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSanitizer:DEADLYSIGNAL ==17664==ERROR: Undefined...
cpp
d912393c7f055333378ba80ba5ae3ddcf0e4be02
https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115
null
arvo:13386
n132/arvo:13386-vul
/src/openthread
[ { "end_line": 350, "function_name": "IsValid", "start_line": 345, "target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp" } ]
UNKNOWN READ
openthread
ubsan
INFO: Seed: 2559851155 INFO: Loaded 1 modules (19664 inline 8-bit counters): 19664 [0x8c0288, 0x8c4f58), INFO: Loaded 1 PC tables (19664 PCs): 19664 [0x5ebba8,0x6388a8), /out/radio-receive-done-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSanitizer:DEADLYSIGNAL ==17666==ERROR: Undefin...
cpp
d912393c7f055333378ba80ba5ae3ddcf0e4be02
https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115
null
arvo:13390
n132/arvo:13390-vul
/src/openthread
[ { "end_line": 350, "function_name": "IsValid", "start_line": 345, "target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp" } ]
UNKNOWN READ
openthread
ubsan
INFO: Seed: 3770445395 INFO: Loaded 1 modules (19664 inline 8-bit counters): 19664 [0x8c0288, 0x8c4f58), INFO: Loaded 1 PC tables (19664 PCs): 19664 [0x5ebba8,0x6388a8), /out/radio-receive-done-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSanitizer:DEADLYSIGNAL ==17666==ERROR: Undefin...
cpp
d912393c7f055333378ba80ba5ae3ddcf0e4be02
https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115
null
arvo:13405
n132/arvo:13405-vul
/src/openthread
[ { "end_line": 350, "function_name": "IsValid", "start_line": 345, "target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp" } ]
UNKNOWN READ
openthread
ubsan
INFO: Seed: 284055245 INFO: Loaded 1 modules (19664 inline 8-bit counters): 19664 [0x8c0288, 0x8c4f58), INFO: Loaded 1 PC tables (19664 PCs): 19664 [0x5ebba8,0x6388a8), /out/radio-receive-done-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSanitizer:DEADLYSIGNAL ==17661==ERROR: Undefine...
cpp
d912393c7f055333378ba80ba5ae3ddcf0e4be02
https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115
null
arvo:13409
n132/arvo:13409-vul
/src/openthread
[ { "end_line": 350, "function_name": "IsValid", "start_line": 345, "target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp" } ]
UNKNOWN READ
openthread
ubsan
INFO: Seed: 3893450594 INFO: Loaded 1 modules (19713 inline 8-bit counters): 19713 [0x8c14c8, 0x8c61c9), INFO: Loaded 1 PC tables (19713 PCs): 19713 [0x5ec9c8,0x6399d8), /out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSanitizer:DEADLYSIGNAL ==17666==ERROR: UndefinedBehavior...
cpp
d912393c7f055333378ba80ba5ae3ddcf0e4be02
https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115
null
arvo:13412
n132/arvo:13412-vul
/src/openthread
[ { "end_line": 350, "function_name": "IsValid", "start_line": 345, "target_file": "/src/openthread/src/core/thread/network_data_tlvs.hpp" } ]
UNKNOWN READ
openthread
ubsan
INFO: Seed: 270755989 INFO: Loaded 1 modules (19664 inline 8-bit counters): 19664 [0x8c0288, 0x8c4f58), INFO: Loaded 1 PC tables (19664 PCs): 19664 [0x5ebba8,0x6388a8), /out/radio-receive-done-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSanitizer:DEADLYSIGNAL ==17662==ERROR: Undefine...
cpp
d912393c7f055333378ba80ba5ae3ddcf0e4be02
https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115
null
arvo:13435
n132/arvo:13435-vul
/src/libarchive
[ { "end_line": 2042, "function_name": "skip_base_block", "start_line": 2020, "target_file": "/src/libarchive/libarchive/archive_read_support_format_rar5.c" } ]
Heap-buffer-overflow READ {*}
libarchive
asan
INFO: Seed: 3928933440 INFO: Loaded 1 modules (12001 inline 8-bit counters): 12001 [0x264a988, 0x264d869), INFO: Loaded 1 PC tables (12001 PCs): 12001 [0x2325460,0x2354270), /out/libarchive_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= =...
cpp
a4744f65134ed3c38be7f3241e394e75fd28d7e7
https://github.com/libarchive/libarchive/commit/39736c43bd7374beedb372aa300ecf36c9fc4733
null
arvo:13453
n132/arvo:13453-vul
/src/file
[ { "end_line": 2271, "function_name": "magiccheck", "start_line": 1920, "target_file": "/src/file/src/softmagic.c" } ]
Use-of-uninitialized-value
file
msan
INFO: Seed: 3038447361 INFO: Loaded 1 modules (4099 guards): [0xa3d9c0, 0xa419cc), /out/magic_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Uninitialized bytes in __interceptor___strndup at offset 7 inside [0x704000000003, 8) ==10940==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x5a0f3d in...
cpp
4c41a4b6f9fbb95959edda00a2fd3d80e32a914a
https://github.com/file/file/commit/dcda2612a5f38a3d9e15c0ac9a7d156d74b3a395
null
arvo:13538
n132/arvo:13538-vul
/src/imagemagick
[ { "end_line": 1443, "function_name": "ReadPSDChannel", "start_line": 1341, "target_file": "/src/imagemagick/coders/psd.c" } ]
Use-of-uninitialized-value
imagemagick
msan
INFO: Seed: 1911790336 INFO: Loaded 1 modules (166567 inline 8-bit counters): 166567 [0x2bf7e88, 0x2c2092f), INFO: Loaded 1 PC tables (166567 PCs): 166567 [0x2c20930,0x2eab3a0), /out/encoder_psd_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==167267==WARNING: MemorySanitizer: use-of-uninitialized-value...
cpp
c1bd0be8167fdef1f11fa117e069432259c7d9e4
https://github.com/imagemagick/imagemagick/commit/41b03b43a5799abd898f871ce5865cb0307f1592
null
arvo:13704
n132/arvo:13704-vul
/src/radare2
[ { "end_line": 89, "function_name": "destroy", "start_line": 84, "target_file": "/src/radare2/libr/bin/p/bin_art.c" } ]
Heap-use-after-free READ 8
radare2
asan
INFO: Seed: 1723654116 INFO: Loaded 1 modules (157250 inline 8-bit counters): 157250 [0x25791d0, 0x259f812), INFO: Loaded 1 PC tables (157250 PCs): 157250 [0x259f818,0x2805c38), /out/ia_fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc 3 ================================================================= ==310...
cpp
d9a15aa661c367b45cdbd6dd57035a19fc35780a
https://github.com/radare/radare2/commit/5d65cbe1f7d677a22c0fca593dcae1aebf8cf35b
A double free vulnerability exists in bin_art due to improper management of ao->kv's ownership. The ownership of ao->kv is transferred to RBin through the get_sdb method of RBinPlugin, but plugins may still attempt to free it themselves.
arvo:13730
n132/arvo:13730-vul
/src/gnupg
[ { "end_line": 984, "function_name": "proc_plaintext", "start_line": 826, "target_file": "/src/gnupg/g10/mainproc.c" } ]
Heap-use-after-free READ 4
gnupg
asan
INFO: Seed: 904560189 INFO: Loaded 1 modules (40217 inline 8-bit counters): 40217 [0xdc6db0, 0xdd0ac9), INFO: Loaded 1 PC tables (40217 PCs): 40217 [0xdd0ad0,0xe6dc60), /out/fuzz_verify: Running 1 inputs 1 time(s) each. Running: /tmp/poc keybox '/tmp/fuzzdirverify/pubring.kbx' created /tmp/fuzzdirverify/trustdb.gpg...
cpp
bdda31a26bc69b6ee72e964510db113645de76ef
git://git.gnupg.org/gnupg.git3e1f3df6183b2ed2cadf2af2383063891e2c53bd
A use after free vulnerability exists in gpg, specifically in g10/mainproc.c within the proc_plaintext function, where freed memory is accessed.
arvo:13741
n132/arvo:13741-vul
/src/openthread
[ { "end_line": 275, "function_name": "ChannelMaskTlv::GetChannelMask", "start_line": 237, "target_file": "/src/openthread/src/core/meshcop/meshcop_tlvs.cpp" } ]
Stack-use-after-return READ 1
openthread
asan
INFO: Seed: 694634597 INFO: Loaded 1 modules (15958 inline 8-bit counters): 15958 [0xa8e530, 0xa92386), INFO: Loaded 1 PC tables (15958 PCs): 15958 [0x7b90f0,0x7f7650), /out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==17667=...
cpp
61e928880595725a60b592075ce34baaaa552295
https://github.com/openthread/openthread/commit/fab45352f5d6b2f516fed8a86c0d197bb7c27958
The vulnerability allows an arbitrary number of Channel Mask entries to be processed in the ChannelMaskTlv in meshcop.
arvo:13942
n132/arvo:13942-vul
/src/radare2
[ { "end_line": 49, "function_name": "is_kernelcache", "start_line": 1, "target_file": "/src/radare2/libr/bin/format/mach0/mach064_is_kernelcache.c" } ]
Heap-buffer-overflow READ 1
radare2
asan
INFO: Seed: 3886734344 INFO: Loaded 1 modules (157784 inline 8-bit counters): 157784 [0x2588150, 0x25ae9a8), INFO: Loaded 1 PC tables (157784 PCs): 157784 [0x25ae9a8,0x2816f28), /out/ia_fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc 3 ================================================================= ==310...
cpp
689873a80f2e48b616639c1c7795a6dfa3b7d652
https://github.com/radare/radare2/commit/d271da09ab6cf4817cfabede153e6bd547118cdd
null
arvo:13945
n132/arvo:13945-vul
/src/radare2
[ { "end_line": 49, "function_name": "is_kernelcache", "start_line": 1, "target_file": "/src/radare2/libr/bin/format/mach0/mach064_is_kernelcache.c" } ]
Heap-buffer-overflow READ 1
radare2
asan
INFO: Seed: 3602190692 INFO: Loaded 1 modules (157784 inline 8-bit counters): 157784 [0x2588150, 0x25ae9a8), INFO: Loaded 1 PC tables (157784 PCs): 157784 [0x25ae9a8,0x2816f28), /out/ia_fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc 3 ================================================================= ==310...
cpp
689873a80f2e48b616639c1c7795a6dfa3b7d652
https://github.com/radare/radare2/commit/d271da09ab6cf4817cfabede153e6bd547118cdd
null
arvo:14018
n132/arvo:14018-vul
/src/perfetto
[ { "end_line": 876, "function_name": "ProtoTraceParser::ParsePowerRails", "start_line": 841, "target_file": "/src/perfetto/src/trace_processor/proto_trace_parser.cc" } ]
UNKNOWN WRITE
perfetto
asan
INFO: Seed: 2968156588 INFO: Loaded 1 modules (120706 inline 8-bit counters): 120706 [0x1355638, 0x1372dba), INFO: Loaded 1 PC tables (120706 PCs): 120706 [0x1372dc0,0x154a5e0), /out/trace_processor_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:DEADLYSIGNAL ============================...
cpp
a59cff1e2707f5a959d769ada9d9f0fd73f20315
https://android.googlesource.com/platform/external/perfetto//+/fbd7bc474766673cde8b4a87bf76e82049e23f05%5E%21/
null
arvo:14331
n132/arvo:14331-vul
/src/libarchive
[ { "end_line": 1402, "function_name": "parse_file_extra_owner", "start_line": 1332, "target_file": "/src/libarchive/libarchive/archive_read_support_format_rar5.c" } ]
Stack-buffer-overflow WRITE 1
libarchive
asan
Reading 357 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/libarchive_fuzzer < INPUT_FILE or /out/libarchive_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: ...
cpp
7b3068c4bf7a217a1838db280072653197d30012
https://github.com/libarchive/libarchive/commit/2fce6f81cc59144bf4f2f66f7620233d609b41ef
null
arvo:14467
n132/arvo:14467-vul
/src/kimageformats
[ { "end_line": 345, "function_name": "LoadTGA", "start_line": 177, "target_file": "/src/kimageformats/src/imageformats/tga.cpp" } ]
Use-of-uninitialized-value
kimageformats
msan
INFO: Seed: 2878715556 INFO: Loaded 1 modules (217591 inline 8-bit counters): 217591 [0x31d9378, 0x320e56f), INFO: Loaded 1 PC tables (217591 PCs): 217591 [0x320e570,0x35604e0), /out/kimgio_tga_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc QBuffer::seek: Invalid pos: 273 ==7461==WARNING: MemorySanitize...
cpp
bcce48012ec81b59aeeef2d071d35dc24385c255
https://github.com/KDE/kimageformats/commit/96b1d7e7bcd9b25db9fb1eb3edc736a10e9bb90d
A vulnerability exists in the TGA image handling where the destination buffer (dst) in the tga file processing is not initialized with memset if a read operation fails, potentially leading to the use of uninitialized memory.
arvo:14529
n132/arvo:14529-vul
/src/lwan
[ { "end_line": 611, "function_name": "parse_headers", "start_line": 528, "target_file": "/src/lwan/src/lib/lwan-request.c" } ]
Global-buffer-overflow WRITE 8
lwan
asan
INFO: Seed: 506532327 INFO: Loaded 1 modules (3038 inline 8-bit counters): 3038 [0x83bf10, 0x83caee), INFO: Loaded 1 PC tables (3038 PCs): 3038 [0x83caf0,0x8488d0), /out/request_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==202==ERROR:...
c
2bf15453c639c194d840a26ff2122d12b8190d8a
https://github.com/lpereira/lwan/commit/8feaf5303d43cad4d057a51722713213d3c9732c
The vulnerability allows the number of elements in the header_start array to exceed intended limits, potentially leading to security issues.
arvo:14537
n132/arvo:14537-vul
/src/libarchive
[ { "end_line": 2680, "function_name": "copy_string", "start_line": 2659, "target_file": "/src/libarchive/libarchive/archive_read_support_format_rar5.c" } ]
Heap-buffer-overflow READ 1
libarchive
asan
Reading 255 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/libarchive_fuzzer < INPUT_FILE or /out/libarchive_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: ...
cpp
3614747af54e60229a2bf11e8f40e1b975cc9ae6
https://github.com/libarchive/libarchive/commit/69bb9bcf6cef43b744e5baa101a8a3a78db0b00d
The RAR5 reader uses an invalid type for the dictionary size mask in operations involving the window_mask variable, which is essential for managing the dictionary circular buffer. When the dictionary buffer size is declared as 4GB, window_mask is set to 0xFFFFFFFF. Assigning this value to an int variable results in a v...
arvo:14560
n132/arvo:14560-vul
/src/yara
[ { "end_line": 248, "function_name": "dotnet_parse_us", "start_line": 200, "target_file": "/src/yara/libyara/modules/dotnet.c" } ]
Heap-buffer-overflow READ {*}
yara
asan
INFO: Seed: 1989091636 INFO: Loaded 1 modules (7701 inline 8-bit counters): 7701 [0x9ea588, 0x9ec39d), INFO: Loaded 1 PC tables (7701 PCs): 7701 [0x74d7a0,0x76b8f0), /out/dotnet_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==37475==ERRO...
cpp
ee16b8cc4d40dad775be22103b3d5419df9bd98b
https://github.com/VirusTotal/yara/commit/e83662f85c6f9534dc19e1a0cede55bebc64f21f
A buffer overflow exists in the dotnet module.
arvo:14565
n132/arvo:14565-vul
/src/kimageformats
[ { "end_line": 351, "function_name": "LoadTGA", "start_line": 177, "target_file": "/src/kimageformats/src/imageformats/tga.cpp" } ]
Use-of-uninitialized-value
kimageformats
msan
INFO: Seed: 433082292 INFO: Loaded 1 modules (217594 inline 8-bit counters): 217594 [0x31d9378, 0x320e572), INFO: Loaded 1 PC tables (217594 PCs): 217594 [0x320e578,0x3560518), /out/kimgio_tga_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc QBuffer::seek: Invalid pos: 50 ==7462==WARNING: MemorySanitizer:...
cpp
40353da5dbdb9e9da703313e5c0647d2845ca528
https://github.com/KDE/kimageformats/commit/4bf2894bdee81ae7da6953f05915351685373b75
The vulnerability allows uninitialized memory to be read in the pixel structure, as the entire pixel_size in pixel does not always contain valid data, either from being read or explicitly set to 0.
arvo:14574
n132/arvo:14574-vul
/src/libarchive
[ { "end_line": 3727, "function_name": "rar5_read_data", "start_line": 3677, "target_file": "/src/libarchive/libarchive/archive_read_support_format_rar5.c" } ]
Heap-buffer-overflow READ 8
libarchive
asan
Reading 246 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/libarchive_fuzzer < INPUT_FILE or /out/libarchive_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: ...
cpp
9d9fb860a92b495fb3bcbbfbab6d72edcc680334
https://github.com/libarchive/libarchive/commit/9950d89616d31fe2d83f5134d357560c423794ee
The RAR5 reader attempts to unpack entries that are marked as directories.
arvo:14620
n132/arvo:14620-vul
/src/open62541
[ { "end_line": 2303, "function_name": "searchObjectForKeyRec", "start_line": 2245, "target_file": "/src/open62541/src/ua_types_encoding_json.c" } ]
Use-of-uninitialized-value
open62541
msan
INFO: Seed: 4188415935 INFO: Loaded 1 modules (10154 inline 8-bit counters): 10154 [0xa3e1f0, 0xa4099a), INFO: Loaded 1 PC tables (10154 PCs): 10154 [0xa409a0,0xa68440), /out/fuzz_json_decode: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==1251==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x6f...
cpp
9e0a81f518fd46a5da8f0421b7a5ad856926002e
https://github.com/open62541/open62541/commit/cc7d2558ff2f63859ee1301b5d07b8b110f6cd6e
null
arvo:14703
n132/arvo:14703-vul
/src/karchive
[ { "end_line": 189, "function_name": "KAr::openArchive", "start_line": 92, "target_file": "/src/karchive/src/kar.cpp" } ]
Heap-buffer-overflow WRITE 1
karchive
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/karchive_fuzzer < INPUT_FILE or /out/karchive_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/karchive_...
cpp
a149acbeb0fc6dec388d1034e52ce9010ae057a6
https://github.com/KDE/karchive/commit/5724138c01c616f8327e5be5156f56290c9a395c
A heap-buffer-overflow vulnerability exists in KAr::openArchive when handling broken files with a negative size value. If the size is negative, the function continues processing, which can lead to memory corruption.
arvo:14821
n132/arvo:14821-vul
/src/openthread
[ { "end_line": 386, "function_name": "Address::FromString", "start_line": 260, "target_file": "/src/openthread/src/core/net/ip6_address.cpp" } ]
Stack-buffer-overflow WRITE 1
openthread
asan
INFO: Seed: 2801645822 INFO: Loaded 1 modules (17755 inline 8-bit counters): 17755 [0x9e06b0, 0x9e4c0b), INFO: Loaded 1 PC tables (17755 PCs): 17755 [0x70dbf8,0x7531a8), /out/cli-uart-received-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================...
cpp
607f7711e60a3abb4257f510f13791b54045bdb8
https://github.com/openthread/openthread/commit/8bb50d4ccde667295f892f976ee5ff90ba4a4a2f
A security vulnerability exists in the Ip6::Address::FromString function in the ip6 module, where insufficient parse validation allows malformed input to be incorrectly processed.
arvo:14854
n132/arvo:14854-vul
/src/openthread
[ { "end_line": 444, "function_name": "Ip6::RemoveMplOption", "start_line": 330, "target_file": "/src/openthread/src/core/net/ip6.cpp" } ]
Stack-buffer-overflow WRITE 9
openthread
asan
INFO: Seed: 1041795144 INFO: Loaded 1 modules (19553 inline 8-bit counters): 19553 [0xa06190, 0xa0adf1), INFO: Loaded 1 PC tables (19553 PCs): 19553 [0x727758,0x773d68), /out/ncp-uart-received-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================...
cpp
8d462f316e53d5255ca643acae384f2448980a3b
https://github.com/openthread/openthread/commit/bcfa791912dd7bd3dd7432f9f6313b6dd5ca358b
null
arvo:14961
n132/arvo:14961-vul
/src/karchive
[ { "end_line": 259, "function_name": "KCompressionDevice::seek", "start_line": 206, "target_file": "/src/karchive/src/kcompressiondevice.cpp" } ]
Heap-buffer-overflow WRITE 2
karchive
asan
INFO: Seed: 3257710741 INFO: Loaded 1 modules (116679 inline 8-bit counters): 116679 [0x1802e70, 0x181f637), INFO: Loaded 1 PC tables (116679 PCs): 116679 [0x181f638,0x19e72a8), /out/karchive_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =================================================================...
cpp
d9878a684bad6bff4dc9b052663b7bc87a44d729
https://github.com/KDE/karchive/commit/5dedab8cb9ec5acb94d6f9957f0f3494f59a3316
null
arvo:14965
n132/arvo:14965-vul
/src/karchive
[ { "end_line": 259, "function_name": "KCompressionDevice::seek", "start_line": 206, "target_file": "/src/karchive/src/kcompressiondevice.cpp" } ]
UNKNOWN WRITE
karchive
msan
INFO: Seed: 177465663 INFO: Loaded 1 modules (109481 inline 8-bit counters): 109481 [0x1e7fee8, 0x1e9aa91), INFO: Loaded 1 PC tables (109481 PCs): 109481 [0x1e9aa98,0x2046528), /out/karchive_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc MemorySanitizer:DEADLYSIGNAL ==18985==ERROR: MemorySanitizer: SEGV...
cpp
d9878a684bad6bff4dc9b052663b7bc87a44d729
https://github.com/KDE/karchive/commit/5dedab8cb9ec5acb94d6f9957f0f3494f59a3316
null
arvo:15003
n132/arvo:15003-vul
/src/radare2
[ { "end_line": 47, "function_name": "check_buffer", "start_line": 21, "target_file": "/src/radare2/libr/bin/p/bin_omf.c" } ]
Heap-buffer-overflow READ 1
radare2
asan
INFO: Seed: 870017072 INFO: Loaded 1 modules (159877 inline 8-bit counters): 159877 [0x25f1710, 0x2618795), INFO: Loaded 1 PC tables (159877 PCs): 159877 [0x2618798,0x2888fe8), /out/ia_fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc 3 ================================================================= ==3104...
cpp
ca9715e8c6b39795ef1203579d2f5afe5a1340c3
https://github.com/radare/radare2/commit/0e7b37601a2011c9b11112566e2d8f1b2611986d
A crash occurs when parsing 1 byte truncated omf files.
arvo:15035
n132/arvo:15035-vul
/src/radare2
[ { "end_line": 2214, "function_name": "bin_symbols", "start_line": 1954, "target_file": "/src/radare2/libr/core/cbin.c" } ]
Heap-buffer-overflow WRITE 8
radare2
asan
INFO: Seed: 742956317 INFO: Loaded 1 modules (162886 inline 8-bit counters): 162886 [0x266d030, 0x2694c76), INFO: Loaded 1 PC tables (162886 PCs): 162886 [0x2694c78,0x29110d8), /out/ia_fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc 3 parse: Missing backtick in expression. |ERROR| Invalid command 'f sym.N`...
cpp
16a44d3a3e4dbd3f52f6ceef34b1480423119416
https://github.com/radare/radare2/commit/7d30ff52fc1be6f9698b166107b8981eab6ec7ba
null
arvo:15120
n132/arvo:15120-vul
/src/libarchive
[ { "end_line": 1041, "function_name": "archive_read_format_rar_read_data", "start_line": 989, "target_file": "/src/libarchive/libarchive/archive_read_support_format_rar.c" } ]
UNKNOWN READ
libarchive
ubsan
INFO: Seed: 3676092055 INFO: Loaded 1 modules (11197 guards): 11197 [0x23e0e60, 0x23ebd54), /out/libarchive_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSanitizer:DEADLYSIGNAL ==25279==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x7ff486002008 (pc 0x0000004cacd7 bp 0x7ff...
cpp
8dee29db3ec1054ff571d7559a115003ac8854b3
https://github.com/libarchive/libarchive/commit/cb76165ac5b091545c32d26483b0c0d7a2c47e4f
A use-after-free vulnerability exists in the RAR reader when read_data_compressed() returns ARCHIVE_FAILED. The caller is allowed to continue with the next archive headers, but rar->ppmd_valid is not set to 0 in addition to rar->start_new_table=1, which can lead to unsafe memory access.
arvo:15133
n132/arvo:15133-vul
/src/open62541
[ { "end_line": 570, "function_name": "Operation_Browse", "start_line": 452, "target_file": "/src/open62541/src/server/ua_services_view.c" } ]
Use-of-uninitialized-value
open62541
msan
INFO: Seed: 3983688825 INFO: Loaded 1 modules (9977 inline 8-bit counters): 9977 [0xa33fb0, 0xa366a9), INFO: Loaded 1 PC tables (9977 PCs): 9977 [0xa366b0,0xa5d640), /out/fuzz_binary_message: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==1207==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x5d9...
cpp
aff76e6f778aba81b74e9f6e15cb66fc9db0d009
https://github.com/open62541/open62541/commit/054f460d6e9e98deba186eee6bd956756dfc89e0
null
arvo:15152
n132/arvo:15152-vul
/src/open62541
[ { "end_line": 570, "function_name": "Operation_Browse", "start_line": 452, "target_file": "/src/open62541/src/server/ua_services_view.c" } ]
Heap-buffer-overflow WRITE {*}
open62541
asan
INFO: Seed: 734418743 INFO: Loaded 1 modules (10015 inline 8-bit counters): 10015 [0x9e2c10, 0x9e532f), INFO: Loaded 1 PC tables (10015 PCs): 10015 [0x9e5330,0xa0c520), /out/fuzz_binary_message: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==12...
cpp
aff76e6f778aba81b74e9f6e15cb66fc9db0d009
https://github.com/open62541/open62541/commit/054f460d6e9e98deba186eee6bd956756dfc89e0
null
arvo:15200
n132/arvo:15200-vul
/src/radare2
[ { "end_line": 2230, "function_name": "bin_symbols", "start_line": 1967, "target_file": "/src/radare2/libr/core/cbin.c" } ]
Heap-use-after-free READ 1
radare2
asan
INFO: Seed: 3473867696 INFO: Loaded 1 modules (163126 inline 8-bit counters): 163126 [0x2675630, 0x269d366), INFO: Loaded 1 PC tables (163126 PCs): 163126 [0x269d368,0x291a6c8), /out/ia_fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==31550...
cpp
2c53ca5bf4f42b33c16941fd723b1f2133b3cd8b
https://github.com/radare/radare2/commit/d7fd30df8ef0f1a9081863b91a0197f26408dc6b
null
arvo:15278
n132/arvo:15278-vul
/src/libarchive
[ { "end_line": 3933, "function_name": "rar5_read_data_skip", "start_line": 3884, "target_file": "/src/libarchive/libarchive/archive_read_support_format_rar5.c" } ]
UNKNOWN READ
libarchive
asan
INFO: Seed: 3711180061 INFO: Loaded 1 modules (12115 inline 8-bit counters): 12115 [0x2583258, 0x25861ab), INFO: Loaded 1 PC tables (12115 PCs): 12115 [0x226de38,0x229d368), /out/libarchive_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:DEADLYSIGNAL =====================================...
cpp
fa2f626ac0ebe0841370eadd3ffd69679258fa0a
https://github.com/libarchive/libarchive/commit/47bb8187d3ef2d49ee8c7841cb2872b3cfa1f6f7
The RAR5 reader contains a vulnerability where the `window_mask` variable is not always updated correctly to stay in sync with the `window_size` variable. In one instance, `window_size` is modified without updating `window_mask`, which leads to incorrect memory access outside the current window buffer and can result in...
arvo:15373
n132/arvo:15373-vul
/src/c-ares
[ { "end_line": 209, "function_name": "ares_parse_aaaa_reply", "start_line": 52, "target_file": "/src/c-ares/ares_parse_aaaa_reply.c" } ]
Heap-buffer-overflow READ 16
c-ares
asan
INFO: Seed: 11987 INFO: Loaded 1 modules (1592 inline 8-bit counters): 1592 [0x7f3f98, 0x7f45d0), INFO: Loaded 1 PC tables (1592 PCs): 1592 [0x7f45d0,0x7fa950), /out/ares_parse_reply_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==40955=...
c
c5bfbe0dc3086b39218a4d9a8ef2ce4f538673da
https://github.com/c-ares/c-ares/commit/5dd3629bc93449840c36dd635ea6cce606b8c366
null
arvo:15374
n132/arvo:15374-vul
/src/openthread
[ { "end_line": 287, "function_name": "DatasetManager::HandleSet", "start_line": 69, "target_file": "/src/openthread/src/core/meshcop/dataset_manager_ftd.cpp" } ]
Stack-buffer-overflow READ 15
openthread
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/ip6-send-fuzzer < INPUT_FILE or /out/ip6-send-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/ip6-send-...
cpp
0a084bbb9aef5cd233d787dc7ba14f718a0896e0
https://github.com/openthread/openthread/commit/d1ded876f9cb09d83b904b40cf6a4f67adfe91fe
null