task_id stringlengths 8 10 | docker_image stringlengths 17 19 | basedir stringclasses 157
values | target_functions listlengths 1 3 | crash_type stringclasses 85
values | project_name stringclasses 157
values | sanitizer stringclasses 3
values | sanitizer_output stringlengths 1.13k 6.5M | language stringclasses 2
values | vuln_commit stringlengths 40 40 | fix stringlengths 69 110 | vulnerability_description stringlengths 38 824 ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
arvo:15375 | n132/arvo:15375-vul | /src/c-ares | [
{
"end_line": 211,
"function_name": "ares_parse_a_reply",
"start_line": 50,
"target_file": "/src/c-ares/ares_parse_a_reply.c"
}
] | UNKNOWN WRITE | c-ares | msan | INFO: Seed: 480831794
INFO: Loaded 1 modules (1596 inline 8-bit counters): 1596 [0x7dcd0b, 0x7dd347),
INFO: Loaded 1 PC tables (1596 PCs): 1596 [0x7dd348,0x7e3708),
/out/ares_parse_reply_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:DEADLYSIGNAL
==40951==ERROR: MemorySanitizer: SEGV on ... | c | 5dd3629bc93449840c36dd635ea6cce606b8c366 | https://github.com/c-ares/c-ares/commit/b949cc3ddfbeb1b3fba571fb53b186b645e66e9c | null |
arvo:15379 | n132/arvo:15379-vul | /src/c-ares | [
{
"end_line": 211,
"function_name": "ares_parse_a_reply",
"start_line": 50,
"target_file": "/src/c-ares/ares_parse_a_reply.c"
}
] | Use-of-uninitialized-value | c-ares | msan | INFO: Seed: 3149123322
INFO: Loaded 1 modules (1596 inline 8-bit counters): 1596 [0x7dcd0b, 0x7dd347),
INFO: Loaded 1 PC tables (1596 PCs): 1596 [0x7dd348,0x7e3708),
/out/ares_parse_reply_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==40947==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 ... | c | 5dd3629bc93449840c36dd635ea6cce606b8c366 | https://github.com/c-ares/c-ares/commit/b949cc3ddfbeb1b3fba571fb53b186b645e66e9c | null |
arvo:15380 | n132/arvo:15380-vul | /src/openthread | [
{
"end_line": 1941,
"function_name": "MleRouter::SendParentResponse",
"start_line": 1886,
"target_file": "/src/openthread/src/core/thread/mle_router.cpp"
}
] | Stack-buffer-overflow READ {*} | openthread | asan | INFO: Seed: 3468096720
INFO: Loaded 1 modules (16234 inline 8-bit counters): 16234 [0x99d050, 0x9a0fba),
INFO: Loaded 1 PC tables (16234 PCs): 16234 [0x6dbcb8,0x71b358),
/out/radio-receive-done-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===============================================================... | cpp | ea9a6d2b14f794c756575bbbea668ac029acb1bb | https://github.com/openthread/openthread/commit/8224b3c49f8bd285ad5658c1b3cd9683d6627bdb | null |
arvo:15408 | n132/arvo:15408-vul | /src/hostap | [
{
"end_line": 896,
"function_name": "x509_parse_ext_basic_constraints",
"start_line": 812,
"target_file": "/src/hostap/src/tls/x509v3.c"
}
] | Heap-buffer-overflow READ 1 | hostap | asan | Reading 413 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/x509 < INPUT_FILE
or
/out/x509 INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out... | cpp | df5dc8787347859827f615d5cb20a888ba6c074c | https://w1.fi/cgit/hostap/commit/?id=ce11c281ad1de25a815d49a29043d127cbc6354d | null |
arvo:15431 | n132/arvo:15431-vul | /src/libarchive | [
{
"end_line": 641,
"function_name": "run_arm_filter",
"start_line": 614,
"target_file": "/src/libarchive/libarchive/archive_read_support_format_rar5.c"
}
] | Heap-buffer-overflow READ 1 | libarchive | asan | INFO: Seed: 3155117920
INFO: Loaded 1 modules (12117 inline 8-bit counters): 12117 [0x2583258, 0x25861ad),
INFO: Loaded 1 PC tables (12117 PCs): 12117 [0x226de38,0x229d388),
/out/libarchive_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
=... | cpp | a163558c388bb2ccedef683e8031c11193e6875c | https://github.com/libarchive/libarchive/commit/6af08cff8e07824530b4ebef2689fc6cc60c4d03 | The ARM filter in the RAR5 reader goes beyond the window buffer boundary. |
arvo:15447 | n132/arvo:15447-vul | /src/openthread | [
{
"end_line": 632,
"function_name": "AddressResolver::HandleAddressQuery",
"start_line": 586,
"target_file": "/src/openthread/src/core/thread/address_resolver.cpp"
}
] | Stack-buffer-overflow READ {*} | openthread | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/ncp-uart-received-fuzzer < INPUT_FILE
or
/out/ncp-uart-received-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-fla... | cpp | 03fac0ff48c8152e9bcc8cfeed4a6eddb3b0e17f | https://github.com/openthread/openthread/commit/016b1b152327c27b2f46accd272b49da8a16ed9f | null |
arvo:15451 | n132/arvo:15451-vul | /src/hostap | [
{
"end_line": 896,
"function_name": "x509_parse_ext_basic_constraints",
"start_line": 812,
"target_file": "/src/hostap/src/tls/x509v3.c"
}
] | Heap-buffer-overflow READ 1 | hostap | asan | INFO: Seed: 2688468503
INFO: Loaded 1 modules (2129 inline 8-bit counters): 2129 [0x81f710, 0x81ff61),
INFO: Loaded 1 PC tables (2129 PCs): 2129 [0x5cbda0,0x5d42b0),
/out/x509: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==10557==ERROR: Addres... | c | df5dc8787347859827f615d5cb20a888ba6c074c | https://w1.fi/cgit/hostap/commit/?id=ce11c281ad1de25a815d49a29043d127cbc6354d | null |
arvo:15459 | n132/arvo:15459-vul | /src/c-ares | [
{
"end_line": 214,
"function_name": "ares_parse_aaaa_reply",
"start_line": 52,
"target_file": "/src/c-ares/ares_parse_aaaa_reply.c"
}
] | Stack-buffer-overflow WRITE 4 | c-ares | asan | INFO: Seed: 898363089
INFO: Loaded 1 modules (1598 inline 8-bit counters): 1598 [0x7f3f98, 0x7f45d6),
INFO: Loaded 1 PC tables (1598 PCs): 1598 [0x7f45d8,0x7fa9b8),
/out/ares_parse_reply_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==40... | c | 5dd3629bc93449840c36dd635ea6cce606b8c366 | https://github.com/c-ares/c-ares/commit/b949cc3ddfbeb1b3fba571fb53b186b645e66e9c | null |
arvo:15827 | n132/arvo:15827-vul | /src/imagemagick | [
{
"end_line": 591,
"function_name": "ReadICCProfile",
"start_line": 481,
"target_file": "/src/imagemagick/coders/jpeg.c"
}
] | Heap-use-after-free READ 8 | imagemagick | asan | INFO: Seed: 680845414
INFO: Loaded 1 modules (174919 inline 8-bit counters): 174919 [0x1f33880, 0x1f5e3c7),
INFO: Loaded 1 PC tables (174919 PCs): 174919 [0x1f5e3c8,0x2209838),
/out/encoder_jnx_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===============================================================... | cpp | 8de7d660fcffcbc580cec1daa09bc7d4ededdf6b | https://github.com/imagemagick/imagemagick/commit/39f226a9c137f547e12afde972eeba7551124493 | null |
arvo:15893 | n132/arvo:15893-vul | /src/libsass | [
{
"end_line": 812,
"function_name": "Parser::parse_pseudo_selector",
"start_line": 731,
"target_file": "/src/libsass/src/parser.cpp"
}
] | Heap-buffer-overflow READ 8 | libsass | asan | INFO: Seed: 1194112760
INFO: Loaded 1 modules (74785 inline 8-bit counters): 74785 [0xf51fb0, 0xf643d1),
INFO: Loaded 1 PC tables (74785 PCs): 74785 [0xf643d8,0x10885e8),
/out/data_context_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==... | cpp | 23cabbebb1a50412a85b85208ce54daa039f98ca | https://github.com/sass/libsass/commit/04a234a7bd5e74b0eb5be489f831a9c0d08c8606 | null |
arvo:15904 | n132/arvo:15904-vul | /src/libsass | [
{
"end_line": 186,
"function_name": "Parser::parseCompoundSelector",
"start_line": 114,
"target_file": "/src/libsass/src/parser_selectors.cpp"
}
] | UNKNOWN READ | libsass | msan | INFO: Seed: 1575804624
INFO: Loaded 1 modules (75417 inline 8-bit counters): 75417 [0x1556270, 0x1568909),
INFO: Loaded 1 PC tables (75417 PCs): 75417 [0x1568910,0x168f2a0),
/out/data_context_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:DEADLYSIGNAL
==965==ERROR: MemorySanitizer: SEGV ... | cpp | d2390e54c4f1ab5c33a0e35e7b9264b36284fa91 | https://github.com/sass/libsass/commit/994695c669085058c4a500f295a0531893eff77a | null |
arvo:15936 | n132/arvo:15936-vul | /src/wireshark | [
{
"end_line": 2192,
"function_name": "quic_extract_header",
"start_line": 2144,
"target_file": "/src/wireshark/epan/dissectors/packet-quic.c"
}
] | Stack-buffer-overflow WRITE {*} | wireshark | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzzshark_ip_proto-udp < INPUT_FILE
or
/out/fuzzshark_ip_proto-udp INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] ... | cpp | fac8c25bb133ef241f5d3d034751727a59fa2b87 | https://github.com/wireshark/wireshark/commit/ba54b896969930491645aa3ec4125b76480add9c | null |
arvo:15939 | n132/arvo:15939-vul | /src/wireshark | [
{
"end_line": 2192,
"function_name": "quic_extract_header",
"start_line": 2144,
"target_file": "/src/wireshark/epan/dissectors/packet-quic.c"
}
] | UNKNOWN READ | wireshark | ubsan | oss-fuzzshark: disabling: ip
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: bgp
oss-fuzzshark: disabling: dhcp
oss-fuzzshark: disabling: json
oss-fuzzshark: disabling: snort
oss-fuzzshark: configured for dissector: udp in table: ip.proto
INFO: Seed: 2448473890
INFO: Loaded 1 ... | c | fac8c25bb133ef241f5d3d034751727a59fa2b87 | https://github.com/wireshark/wireshark/commit/ba54b896969930491645aa3ec4125b76480add9c | null |
arvo:15941 | n132/arvo:15941-vul | /src/lz4 | [
{
"end_line": 1171,
"function_name": "LZ4_compress_generic",
"start_line": 783,
"target_file": "/src/lz4/lib/lz4.c"
}
] | Heap-buffer-overflow WRITE 4 | lz4 | asan | Reading 468570 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/compress_fuzzer < INPUT_FILE
or
/out/compress_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
... | cpp | 6bc6f836a18d1f8fd05c8fc2b42f1d800bc25de1 | https://github.com/lz4/lz4/commit/13a2d9e34ffc4170720ce417c73e396d0ac1471a | null |
arvo:15952 | n132/arvo:15952-vul | /src/imagemagick | [
{
"end_line": 50,
"function_name": "ReadMagickByteBuffer",
"start_line": 34,
"target_file": "/src/imagemagick/coders/bytebuffer-private.h"
}
] | Stack-buffer-overflow READ 1 | imagemagick | asan | INFO: Seed: 1877951006
INFO: Loaded 1 modules (174925 inline 8-bit counters): 174925 [0x1f33880, 0x1f5e3cd),
INFO: Loaded 1 PC tables (174925 PCs): 174925 [0x1f5e3d0,0x22098a0),
/out/ping_ept2_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================================================================... | cpp | 1f70b13ac169b522b0b8df59cb82e23fb52801a1 | https://github.com/imagemagick/imagemagick/commit/6d15222b066f82ad89e90cf07db08721ef53fe9a | null |
arvo:15971 | n132/arvo:15971-vul | /src/openthread | [
{
"end_line": 738,
"function_name": "Leader::IsStableUpdated",
"start_line": 598,
"target_file": "/src/openthread/src/core/thread/network_data_leader_ftd.cpp"
}
] | Stack-buffer-overflow READ 8 | openthread | asan | INFO: Seed: 1216249345
INFO: Loaded 1 modules (19602 inline 8-bit counters): 19602 [0x9fe3f0, 0xa03082),
INFO: Loaded 1 PC tables (19602 PCs): 19602 [0x720a38,0x76d358),
/out/ncp-uart-received-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================================================================... | cpp | db8c4c83399e5df7514d2ef8d4a57423e5f1b39a | https://github.com/openthread/openthread/commit/a211901f62b96fb6fb0ee792dab4007c64b44e18 | A vulnerability exists in Leader::IsStableUpdated() in network-data where the TLV length is not properly compared. |
arvo:1621 | n132/arvo:1621-vul | /src/wireshark | [
{
"end_line": 1949,
"function_name": "dissect_radiotap",
"start_line": 665,
"target_file": "/src/wireshark/epan/dissectors/packet-ieee80211-radiotap.c"
}
] | Index-out-of-bounds | wireshark | ubsan | oss-fuzzshark: configured for dissector: ip
INFO: Seed: 1395233490
INFO: Loaded 0 modules (0 guards):
/out/fuzzshark_ip: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
packet-ieee80211-radiotap.c:1836:12: runtime error: index 8 out of bounds for type 'gboolean const[8]'
#0 0xa99485 in dissect_radiotap /src/wir... | cpp | 1ef6013d895a0bf2914f1c2fb8d84de293d0d538 | https://github.com/wireshark/wireshark/commit/924d1ecf6370c26bd31c08b922519a85669fa301 | An array index in the code does not use nss to match the definition, which can lead to a security vulnerability. |
arvo:16537 | n132/arvo:16537-vul | /src/imagemagick | [
{
"end_line": 6213,
"function_name": "TraceBezier",
"start_line": 6079,
"target_file": "/src/imagemagick/MagickCore/draw.c"
}
] | Heap-use-after-free READ 8 | imagemagick | asan | INFO: Seed: 1955335642
INFO: Loaded 1 modules (177101 inline 8-bit counters): 177101 [0x1f72fa0, 0x1f9e36d),
INFO: Loaded 1 PC tables (177101 PCs): 177101 [0x1f9e370,0x2252040),
/out/encoder_mvg_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==============================================================... | cpp | 492b1e98b1d9b5b4172802f45b288060f1805f98 | https://github.com/imagemagick/imagemagick/commit/ecf7c6b288e11e7e7f75387c5e9e93e423b98397 | null |
arvo:16542 | n132/arvo:16542-vul | /src/imagemagick | [
{
"end_line": 6213,
"function_name": "TraceBezier",
"start_line": 6079,
"target_file": "/src/imagemagick/MagickCore/draw.c"
}
] | UNKNOWN READ | imagemagick | msan | INFO: Seed: 2571800612
INFO: Loaded 1 modules (176750 inline 8-bit counters): 176750 [0x2bef740, 0x2c1a9ae),
INFO: Loaded 1 PC tables (176750 PCs): 176750 [0x2c1a9b0,0x2ecd090),
/out/encoder_mvg_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:DEADLYSIGNAL
==159482==ERROR: MemorySanitizer:... | cpp | 492b1e98b1d9b5b4172802f45b288060f1805f98 | https://github.com/imagemagick/imagemagick/commit/ecf7c6b288e11e7e7f75387c5e9e93e423b98397 | null |
arvo:16604 | n132/arvo:16604-vul | /src/libmpeg2 | [
{
"end_line": 399,
"function_name": "impeg2_fmt_conv_yuv420p_to_yuv420sp_uv",
"start_line": 343,
"target_file": "/src/libmpeg2/common/impeg2_format_conv.c"
}
] | Heap-buffer-overflow WRITE 1 | libmpeg2 | asan | Reading 68 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/mpeg2_dec_fuzzer < INPUT_FILE
or
/out/mpeg2_dec_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
af... | cpp | d80f1f94472d841d6b4670941f2d4dc3332c8639 | https://android.googlesource.com/platform/external/libmpeg2/+/6f28264c1170fae4f6c847625f4a6d4467a3262b%5E%21/ | null |
arvo:16972 | n132/arvo:16972-vul | /src/aac | [
{
"end_line": 886,
"function_name": "sbrDecoder_Header",
"start_line": 800,
"target_file": "/src/aac/libSBRdec/src/sbrdecoder.cpp"
}
] | Index-out-of-bounds | aac | ubsan | INFO: Seed: 1171481273
INFO: Loaded 1 modules (41011 inline 8-bit counters): 41011 [0xa475d0, 0xa51603),
INFO: Loaded 1 PC tables (41011 PCs): 41011 [0x6ef5c0,0x78f8f0),
/out/aacDecoder_DecodeFrame: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
aac/libSBRdec/src/env_extr.cpp:763:5: runtime error: index 5 out o... | cpp | 97b421ce43995eaa730ac5081c56d8c2f55c9982 | https://android.googlesource.com/platform/external/aac//+/273a43f61fdd07e29f2dd62ab3ee95ff8e29a832%5E%21/ | A vulnerability exists where SBR data is not discarded in the case of an unsuccessful SBR header update, potentially leading to incorrect processing or use of invalid data. |
arvo:17006 | n132/arvo:17006-vul | /src/libhevc | [
{
"end_line": 3497,
"function_name": "ihevcd_sao_shift_ctb",
"start_line": 524,
"target_file": "/src/libhevc/decoder/ihevcd_sao.c"
}
] | Use-of-uninitialized-value | libhevc | msan | INFO: Seed: 2619796119
INFO: Loaded 1 modules (9727 inline 8-bit counters): 9727 [0xab05f8, 0xab2bf7),
INFO: Loaded 1 PC tables (9727 PCs): 9727 [0x83bde8,0x861dd8),
/out/hevc_dec_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==1210==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x610008 ... | c | ddefcfd39fc003c65f2e11a4673c899788ddcf8f | https://android.googlesource.com/platform/external/libhevc/+/663b9fd80355898fb087793752f72632b110b2b3%5E%21/ | The function ihevcd_sao_shift_ctb in the decoder has a memory uninitialized issue. |
arvo:17084 | n132/arvo:17084-vul | /src/libmpeg2 | [
{
"end_line": 1259,
"function_name": "impeg2d_init_thread_dec_ctxt",
"start_line": 1135,
"target_file": "/src/libmpeg2/decoder/impeg2d_dec_hdr.c"
}
] | UNKNOWN WRITE | libmpeg2 | asan | INFO: Seed: 1881921074
INFO: Loaded 1 modules (1924 inline 8-bit counters): 1924 [0x82b690, 0x82be14),
INFO: Loaded 1 PC tables (1924 PCs): 1924 [0x5d96a8,0x5e0ee8),
/out/mpeg2_dec_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEADLYSIGNAL
==============================================... | c | 2ab896c520b3efd1bdf411978808df360e649d2b | https://android.googlesource.com/platform/external/libmpeg2/+/d80f1f94472d841d6b4670941f2d4dc3332c8639%5E%21/ | null |
arvo:17101 | n132/arvo:17101-vul | /src/pcre2 | [
{
"end_line": 7949,
"function_name": "compile_branch",
"start_line": 5274,
"target_file": "/src/pcre2/src/pcre2_compile.c"
}
] | UNKNOWN READ | pcre2 | msan | INFO: Seed: 1010219010
INFO: Loaded 1 modules (9257 inline 8-bit counters): 9257 [0x900919, 0x902d42),
INFO: Loaded 1 PC tables (9257 PCs): 9257 [0x6957f8,0x6b9a88),
/out/pcre2_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:DEADLYSIGNAL
==7940==ERROR: MemorySanitizer: SEGV on unknown add... | c | bf15267c30e202e3192472adebc8865915a0c72b | https://github.com/PCRE2Project/pcre2/commit/78fae97f6c480b942ef06d537c0a784c076bf7ad | null |
arvo:17171 | n132/arvo:17171-vul | /src/libxslt | [
{
"end_line": 776,
"function_name": "exsltCryptoRc4DecryptFunction",
"start_line": 682,
"target_file": "/src/libxslt/libexslt/crypto.c"
}
] | Heap-buffer-overflow READ 1 | libxslt | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/xpath < INPUT_FILE
or
/out/xpath INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/xpath [-N]
afl-fuzz will run ... | cpp | d8ce4f1c27cdcbe0b202a696d636d2122abb192e | https://gitlab.gnome.org/GNOME/libxslt.gite1f8d2e6eb1167fd51eb5b8c99d2d40c37299897 | The vulnerability allows invalid UTF-8 to be included in the output of crypto:rc4_decrypt, as there is no check to ensure the decrypted data is valid UTF-8. |
arvo:17193 | n132/arvo:17193-vul | /src/unicorn | [
{
"end_line": 333,
"function_name": "get_page_addr_code",
"start_line": 288,
"target_file": "/src/unicorn/qemu/cputlb.c"
}
] | Heap-buffer-overflow READ 8 | unicorn | asan | INFO: Seed: 3793399261
INFO: Loaded 1 modules (218545 inline 8-bit counters): 218545 [0x25d6780, 0x260bd31),
INFO: Loaded 1 PC tables (218545 PCs): 218545 [0x260bd38,0x2961848),
/out/fuzz_emu_mips_32be: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEADLYSIGNAL
================================... | c | 1eabe2ffaa8aafa42bc3a957927ad1a498791803 | https://github.com/unicorn-engine/unicorn/commit/901efc4bd45bffa7fae58a06a90949b070ed7303 | null |
arvo:17236 | n132/arvo:17236-vul | /src/matio | [
{
"end_line": 236,
"function_name": "SafeMulDims",
"start_line": 219,
"target_file": "/src/matio/src/mat.c"
}
] | Use-of-uninitialized-value | matio | msan | INFO: Seed: 438931066
INFO: Loaded 1 modules (4743 inline 8-bit counters): 4743 [0x8ba870, 0x8bbaf7),
INFO: Loaded 1 PC tables (4743 PCs): 4743 [0x65dce8,0x670558),
/out/matio_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==6692==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x53cef5 in R... | cpp | 65831b7ec829b0ae0ac9d691a2f8fbc2b26af677 | https://github.com/tbeu/matio/commit/a47b7cd3aca70e9a0bddf8146eb4ab0cbd19c2c3 | null |
arvo:17607 | n132/arvo:17607-vul | /src/poppler | [
{
"end_line": 4049,
"function_name": "Annot::layoutText",
"start_line": 3858,
"target_file": "/src/poppler/poppler/Annot.cc"
}
] | Use-of-uninitialized-value | poppler | msan | INFO: Seed: 2746252085
INFO: Loaded 1 modules (67604 inline 8-bit counters): 67604 [0x1659630, 0x1669e44),
INFO: Loaded 1 PC tables (67604 PCs): 67604 [0x1172368,0x127a4a8),
/out/pdf_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==7950==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0xb62f... | cpp | 39a8b10181d77fff8846df2cff236a3105dd03a5 | https://anongit.freedesktop.org/git/poppler/poppler.git0e8ed9a34e04cc4e56b31f4057c267630c4a7656 | A vulnerability in Annot::layoutText allows uninitialized memory to be read when processing broken files, due to width and charCount variables being used before they are properly initialized. |
arvo:17780 | n132/arvo:17780-vul | /src/usrsctp | [
{
"end_line": 147,
"function_name": "initialize_fuzzer",
"start_line": 128,
"target_file": "/src/usrsctp/fuzzer/fuzzer_connect.c"
}
] | Use-of-uninitialized-value | usrsctp | msan | INFO: Seed: 620337011
INFO: Loaded 1 modules (26355 inline 8-bit counters): 26355 [0xb8fa0c, 0xb960ff),
INFO: Loaded 1 PC tables (26355 PCs): 26355 [0x8d9a60,0x940990),
/out/fuzzer_connect: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==1236==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x80eeb... | c | 34032ce33d2b3f3e87ff5bc4107c5465070763ee | https://github.com/weinrank/usrsctp/commit/118e1e8327c5b9b741302e64c9f00e56701174c0 | null |
arvo:17790 | n132/arvo:17790-vul | /src/usrsctp | [
{
"end_line": 147,
"function_name": "initialize_fuzzer",
"start_line": 128,
"target_file": "/src/usrsctp/fuzzer/fuzzer_connect.c"
}
] | Use-of-uninitialized-value | usrsctp | msan | INFO: Seed: 2528230246
INFO: Loaded 1 modules (26355 inline 8-bit counters): 26355 [0xb8fa0c, 0xb960ff),
INFO: Loaded 1 PC tables (26355 PCs): 26355 [0x8d9a60,0x940990),
/out/fuzzer_connect: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==1239==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x8a5b... | c | 34032ce33d2b3f3e87ff5bc4107c5465070763ee | https://github.com/weinrank/usrsctp/commit/118e1e8327c5b9b741302e64c9f00e56701174c0 | null |
arvo:17855 | n132/arvo:17855-vul | /src/jbig2dec | [
{
"end_line": 76,
"function_name": "jbig2_decode_mmr_init",
"start_line": 59,
"target_file": "/src/jbig2dec/jbig2_mmr.c"
}
] | Use-of-uninitialized-value | jbig2dec | msan | INFO: Seed: 3998154647
INFO: Loaded 1 modules (2008 inline 8-bit counters): 2008 [0x7f4d48, 0x7f5520),
INFO: Loaded 1 PC tables (2008 PCs): 2008 [0x5abbe0,0x5b3960),
/out/jbig2_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==10111==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x56cf89 in... | cpp | 0665a13dcda6ab99dd93c1002d52e0206c7ecb0b | git://git.ghostscript.com/jbig2dec.gitdc14b5a69be02341d84e2956131f93f962408af2 | The MMR decoder in jbig2dec pre-buffers up to 32 bits of encoded input data in a word buffer before consumption. When refilling the buffer, the decoder avoids reading data from succeeding segments but still reports having consumed those bytes, even though they were never read. After finishing, the MMR decoder propagate... |
arvo:18001 | n132/arvo:18001-vul | /src/usrsctp | [
{
"end_line": 147,
"function_name": "initialize_fuzzer",
"start_line": 128,
"target_file": "/src/usrsctp/fuzzer/fuzzer_connect.c"
}
] | Use-of-uninitialized-value | usrsctp | msan | INFO: Seed: 3173761744
INFO: Loaded 1 modules (26355 inline 8-bit counters): 26355 [0xb8fa0c, 0xb960ff),
INFO: Loaded 1 PC tables (26355 PCs): 26355 [0x8d9a60,0x940990),
/out/fuzzer_connect: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==1242==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x7ca1... | c | 34032ce33d2b3f3e87ff5bc4107c5465070763ee | https://github.com/weinrank/usrsctp/commit/118e1e8327c5b9b741302e64c9f00e56701174c0 | null |
arvo:18004 | n132/arvo:18004-vul | /src/usrsctp | [
{
"end_line": 147,
"function_name": "initialize_fuzzer",
"start_line": 128,
"target_file": "/src/usrsctp/fuzzer/fuzzer_connect.c"
}
] | Heap-use-after-free READ 2 | usrsctp | asan | INFO: Seed: 1866118784
INFO: Loaded 1 modules (26420 inline 8-bit counters): 26420 [0xa65b60, 0xa6c294),
INFO: Loaded 1 PC tables (26420 PCs): 26420 [0x7a6af0,0x80de30),
/out/fuzzer_connect: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==1240==... | c | 34032ce33d2b3f3e87ff5bc4107c5465070763ee | https://github.com/weinrank/usrsctp/commit/118e1e8327c5b9b741302e64c9f00e56701174c0 | null |
arvo:18066 | n132/arvo:18066-vul | /src/libsass | [
{
"end_line": 140,
"function_name": "permutateAlt",
"start_line": 79,
"target_file": "/src/libsass/src/permutate.hpp"
}
] | Use-of-uninitialized-value | libsass | msan | INFO: Seed: 3850994161
INFO: Loaded 1 modules (75416 inline 8-bit counters): 75416 [0x1556270, 0x1568908),
INFO: Loaded 1 PC tables (75416 PCs): 75416 [0x1568908,0x168f288),
/out/data_context_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==964==WARNING: MemorySanitizer: use-of-uninitialized-value
#... | cpp | e1c16e09b4a953757a15149deaaf28a3fd81dc97 | https://github.com/sass/libsass/commit/4c83fdb0fe90432cc9b778d816ffd6859e34ef2d | null |
arvo:18080 | n132/arvo:18080-vul | /src/usrsctp | [
{
"end_line": 9461,
"function_name": "sctp_med_chunk_output",
"start_line": 8342,
"target_file": "/src/usrsctp/usrsctplib/netinet/sctp_output.c"
}
] | Heap-use-after-free WRITE {*} | usrsctp | asan | INFO: Seed: 1329662667
INFO: Loaded 1 modules (26472 inline 8-bit counters): 26472 [0xa65b60, 0xa6c2c8),
INFO: Loaded 1 PC tables (26472 PCs): 26472 [0x7a6230,0x80d8b0),
/out/fuzzer_connect: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==1239==... | c | ef8a35a6e7eb30e7026bf20bde89e8a2d50eb8f1 | https://github.com/weinrank/usrsctp/commit/b7e98787c4698521b7adc771ee919a74e83f28ed | null |
arvo:18136 | n132/arvo:18136-vul | /src/imagemagick | [
{
"end_line": 206,
"function_name": "IsWEBPImageLossless",
"start_line": 161,
"target_file": "/src/imagemagick/coders/webp.c"
}
] | Heap-buffer-overflow READ 1 | imagemagick | asan | INFO: Seed: 2336418501
INFO: Loaded 1 modules (176107 inline 8-bit counters): 176107 [0x9b70f10, 0x9b9befb),
INFO: Loaded 1 PC tables (176107 PCs): 176107 [0x9b9befc,0x9cf3e54),
/out/enhance_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEADLYSIGNAL
====================================... | cpp | e7db610deaacb2e5045f1e97190707c5af64f2cb | https://github.com/imagemagick/imagemagick/commit/0045f7f670077d948125a52d76a145dc878a9033 | null |
arvo:18152 | n132/arvo:18152-vul | /src/htslib | [
{
"end_line": 623,
"function_name": "bam_read1",
"start_line": 562,
"target_file": "/src/htslib/sam.c"
}
] | Heap-buffer-overflow READ {*} | htslib | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/hts_open_fuzzer < INPUT_FILE
or
/out/hts_open_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/hts_open_... | cpp | da436e53d06318e92ba99e731f6772808dcc66c3 | https://github.com/samtools/htslib/commit/d59c3645f798169f7fde53dbf5c6d3e095465e8c | The vulnerability occurs when reading BAM files, as the qname is not properly NUL terminated. This can lead to possible invalid reads when printing names. |
arvo:18166 | n132/arvo:18166-vul | /src/imagemagick | [
{
"end_line": 1140,
"function_name": "TIFFReadCustomStream",
"start_line": 1118,
"target_file": "/src/imagemagick/coders/tiff.c"
}
] | UNKNOWN READ | imagemagick | asan | INFO: Seed: 671942729
INFO: Loaded 1 modules (176152 inline 8-bit counters): 176152 [0x9b71090, 0x9b9c0a8),
INFO: Loaded 1 PC tables (176152 PCs): 176152 [0x9b9c0a8,0x9cf4168),
/out/encoder_tiff_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEADLYSIGNAL
================================... | cpp | 2fd6055901dc1e19957e8e8eb6dd07bf7f7d9eca | https://github.com/imagemagick/imagemagick/commit/43cde5755826da7ed7dfa9789e3378f7468be5cd | null |
arvo:18182 | n132/arvo:18182-vul | /src/imagemagick | [
{
"end_line": 723,
"function_name": "TIFFGetProfiles",
"start_line": 668,
"target_file": "/src/imagemagick/coders/tiff.c"
}
] | Heap-buffer-overflow READ {*} | imagemagick | asan | INFO: Seed: 1741933179
INFO: Loaded 1 modules (178593 inline 8-bit counters): 178593 [0x1f77a20, 0x1fa33c1),
INFO: Loaded 1 PC tables (178593 PCs): 178593 [0x1fa33c8,0x225cdd8),
/out/ping_ptif_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================================================================... | cpp | 0bbdf0dbc54cdd39a3ace21561db9e46af8d3bbf | https://github.com/imagemagick/imagemagick/commit/986b5dff173413fa712db27eb677cdef15f0bab6 | null |
arvo:18188 | n132/arvo:18188-vul | /src/imagemagick | [
{
"end_line": 5601,
"function_name": "DrawPrimitive",
"start_line": 5120,
"target_file": "/src/imagemagick/MagickCore/draw.c"
}
] | Use-of-uninitialized-value | imagemagick | msan | INFO: Seed: 576380954
INFO: Loaded 1 modules (178236 inline 8-bit counters): 178236 [0x2ba64e0, 0x2bd1d1c),
INFO: Loaded 1 PC tables (178236 PCs): 178236 [0x2bd1d20,0x2e8a0e0),
/out/encoder_mvg_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==159633==WARNING: MemorySanitizer: use-of-uninitialized-value
... | cpp | 0be0ea60f5e93b0b761b450c82a5ccd032622e12 | https://github.com/imagemagick/imagemagick/commit/b0d51eb0b4c081b56e13801d945d5de13afbaf7e | null |
arvo:18196 | n132/arvo:18196-vul | /src/htslib | [
{
"end_line": 2902,
"function_name": "vcf_format",
"start_line": 2798,
"target_file": "/src/htslib/vcf.c"
}
] | UNKNOWN READ | htslib | asan | INFO: Seed: 2448437634
INFO: Loaded 1 modules (16503 inline 8-bit counters): 16503 [0x9b4e80, 0x9b8ef7),
INFO: Loaded 1 PC tables (16503 PCs): 16503 [0x7085d0,0x748d40),
/out/hts_open_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
[W::vcf_parse] Contig '@SQ222' is not defined in the header. (Quick worka... | c | dd6f0b72c92591252bb77818663629cc1a129949 | https://github.com/samtools/htslib/commit/92ea05adb2478c64be571aff6fe00130fd29c252 | A read-beyond-buffer vulnerability exists in the VCF code where the write logic only checks the upper range of z->key without accounting for its signedness. |
arvo:18259 | n132/arvo:18259-vul | /src/open62541 | [
{
"end_line": 2303,
"function_name": "searchObjectForKeyRec",
"start_line": 2245,
"target_file": "/src/open62541/src/ua_types_encoding_json.c"
}
] | Heap-buffer-overflow READ 4 | open62541 | asan | INFO: Seed: 3313468625
INFO: Loaded 1 modules (10188 inline 8-bit counters): 10188 [0x9e9ad0, 0x9ec29c),
INFO: Loaded 1 PC tables (10188 PCs): 10188 [0x9ec2a0,0xa13f60),
/out/fuzz_json_decode_encode: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================... | cpp | 9e0a81f518fd46a5da8f0421b7a5ad856926002e | https://github.com/open62541/open62541/commit/cc7d2558ff2f63859ee1301b5d07b8b110f6cd6e | null |
arvo:18321 | n132/arvo:18321-vul | /src/radare2 | [
{
"end_line": 2404,
"function_name": "walk_exports",
"start_line": 2265,
"target_file": "/src/radare2/libr/bin/format/mach0/mach0.c"
}
] | Heap-buffer-overflow READ 2 | radare2 | asan | INFO: Seed: 781825729
INFO: Loaded 1 modules (164884 inline 8-bit counters): 164884 [0x26b9370, 0x26e1784),
INFO: Loaded 1 PC tables (164884 PCs): 164884 [0x26e1788,0x29658c8),
/out/ia_fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==31701=... | cpp | d62ae602a45e4e47d9fb0d3f08e87e19bf411193 | https://github.com/radare/radare2/commit/74958b8e88879302d6f61a813943b968cf03dbd5 | An out-of-bounds read occurs in the strlen function when processing certain inputs, as demonstrated by clusterfuzz-testcase-minimized-ia_fuzz-5767342952284160.dms. |
arvo:18356 | n132/arvo:18356-vul | /src/libgit2 | [
{
"end_line": 93,
"function_name": "parse_header_path_buf",
"start_line": 68,
"target_file": "/src/libgit2/src/patch_parse.c"
}
] | Heap-buffer-overflow READ {*} | libgit2 | asan | Reading 130 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/patch_parse_fuzzer < INPUT_FILE
or
/out/patch_parse_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:... | cpp | 223e7e43efffdcab4da864413e70eff40e8ada46 | https://github.com/libgit2/libgit2/commit/6c6c15e935091a33f83d8de4ee5b0640339b2b89 | The patch_parse function accepts empty path names when parsing patch headers, allowing lines like "--- \n" to be parsed as an empty filename. This is not a valid patch format and may cause NULL pointer accesses later, as git_buf_detach returns NULL in this case. |
arvo:18482 | n132/arvo:18482-vul | /src/opensc | [
{
"end_line": 355,
"function_name": "sc_pkcs15_decode_prkdf_entry",
"start_line": 170,
"target_file": "/src/opensc/src/libopensc/pkcs15-prkey.c"
}
] | Bad-free | opensc | asan | INFO: Seed: 3682930014
INFO: Loaded 1 modules (21244 inline 8-bit counters): 21244 [0xbe4da0, 0xbea09c),
INFO: Loaded 1 PC tables (21244 PCs): 21244 [0x8b46c8,0x907688),
/out/fuzz_pkcs15_decode: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==56... | c | 19f4c7e428cece9e4b6d5bf8948a09aa8a09ca42 | https://github.com/OpenSC/OpenSC/commit/6ce6152284c47ba9b1d4fe8ff9d2e6a3f5ee02c7 | A vulnerability exists in pkcs15-prkey where memory is not properly cleaned after a failure, potentially exposing sensitive data. |
arvo:18615 | n132/arvo:18615-vul | /src/binutils-gdb | [
{
"end_line": 689,
"function_name": "print_branch",
"start_line": 605,
"target_file": "/src/binutils-gdb/opcodes/tic30-dis.c"
}
] | Stack-buffer-overflow WRITE 15 | binutils-gdb | asan | INFO: Seed: 2979373751
INFO: Loaded 1 modules (186215 inline 8-bit counters): 186215 [0x36f8390, 0x3725af7),
INFO: Loaded 1 PC tables (186215 PCs): 186215 [0x28012c8,0x2ad8938),
/out/fuzz_disassemble: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================================================================... | cpp | 9adb25915092daa4096911d04fadb5d496c926a6 | https://github.com/bminor/binutils-gdb/commit/efea62b44631289f995db16faf70979d6592580b | An array overrun occurs in tic30-dis.c within the print_branch function due to an incorrect size of the operand array when disassembling corrupt TIC30 binaries. |
arvo:18633 | n132/arvo:18633-vul | /src/qpdf | [
{
"end_line": 235,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 225,
"target_file": "/src/qpdf/fuzz/qpdf_fuzzer.cc"
}
] | Use-of-uninitialized-value | qpdf | msan | INFO: Seed: 3496089256
INFO: Loaded 1 modules (35960 inline 8-bit counters): 35960 [0x10dbc50, 0x10e48c8),
INFO: Loaded 1 PC tables (35960 PCs): 35960 [0x10e48c8,0x1171048),
/out/qpdf_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
WARNING: fuzz input: can't find PDF header
WARNING: fuzz input: file is d... | cpp | c1684eae9144129027642f5069a0fd97f0559ec8 | https://github.com/qpdf/qpdf/commit/232f5fc9f3bed8e1b02bca5d10b2eca444e30f95 | null |
arvo:18733 | n132/arvo:18733-vul | /src/ndpi | [
{
"end_line": 908,
"function_name": "getSSCertificateFingerprint",
"start_line": 751,
"target_file": "/src/ndpi/src/lib/protocols/tls.c"
}
] | Heap-buffer-overflow READ 2 | ndpi | asan | INFO: Seed: 1738088505
INFO: Loaded 1 modules (13734 inline 8-bit counters): 13734 [0x9652b0, 0x968856),
INFO: Loaded 1 PC tables (13734 PCs): 13734 [0x968858,0x99e2b8),
/out/fuzz_process_packet: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==1... | c | f26096ee4cf730244b3db577259f84b0cd37e521 | https://github.com/ntop/nDPI/commit/226a9abf2235fd9e87353ffe727babad71fb7274 | null |
arvo:18798 | n132/arvo:18798-vul | /src/opensc | [
{
"end_line": 916,
"function_name": "parse_sec_attr_44",
"start_line": 764,
"target_file": "/src/opensc/src/libopensc/card-setcos.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | INFO: Seed: 196856134
INFO: Loaded 1 modules (21477 inline 8-bit counters): 21477 [0xbefd80, 0xbf5165),
INFO: Loaded 1 PC tables (21477 PCs): 21477 [0x8bdac8,0x911918),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==561... | c | c173563ad2d7a9483762c584899b9af09edb750d | https://github.com/OpenSC/OpenSC/commit/e50bc29bd9519c9f4c43e9f3cf34b5b8a9aa38da | An unsigned integer underflow occurs in card-setcos.c. |
arvo:18802 | n132/arvo:18802-vul | /src/poppler | [
{
"end_line": 4351,
"function_name": "JBIG2Stream::readSymbolDictSeg",
"start_line": 1560,
"target_file": "/src/poppler/poppler/JBIG2Stream.cc"
},
{
"end_line": 2340,
"function_name": "JBIG2Stream::readTextRegionSeg",
"start_line": 2019,
"target_file": "/src/poppler/poppler/JBIG2... | Use-of-uninitialized-value | poppler | msan | INFO: Seed: 3585653837
INFO: Loaded 1 modules (57755 inline 8-bit counters): 57755 [0x15e2140, 0x15f02db),
INFO: Loaded 1 PC tables (57755 PCs): 57755 [0x1149308,0x122acb8),
/out/pdf_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==7536==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0xbe10... | cpp | 409121ea8b65189bcc2c8541297cd4b51c69d322 | https://anongit.freedesktop.org/git/poppler/poppler.git8b4a2891d9e4ca8ac835527cc7d114ab08e89ea7 | null |
arvo:18813 | n132/arvo:18813-vul | /src/imagemagick | [
{
"end_line": 206,
"function_name": "IsWEBPImageLossless",
"start_line": 161,
"target_file": "/src/imagemagick/coders/webp.c"
}
] | Heap-buffer-overflow READ 3 | imagemagick | asan | INFO: Seed: 4199007235
INFO: Loaded 1 modules (178465 inline 8-bit counters): 178465 [0x9bd4f50, 0x9c00871),
INFO: Loaded 1 PC tables (178465 PCs): 178465 [0x9c00874,0x9d5d17c),
/out/encoder_webp_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=============================================================... | cpp | 18caefb9d10e7fb22c5873977d303252327e8ce2 | https://github.com/imagemagick/imagemagick/commit/e0ed80ff26dd9d8859697014d9d0c95edd78dad5 | null |
arvo:18868 | n132/arvo:18868-vul | /src/opensc | [
{
"end_line": 1090,
"function_name": "coolkey_get_life_cycle",
"start_line": 1050,
"target_file": "/src/opensc/src/libopensc/card-coolkey.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | INFO: Seed: 3901272795
INFO: Loaded 1 modules (21474 inline 8-bit counters): 21474 [0xbefd80, 0xbf5162),
INFO: Loaded 1 PC tables (21474 PCs): 21474 [0x8bda68,0x911888),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==56... | c | e6a24b71abee5c4277541a086e2e40b7ae3f5458 | https://github.com/OpenSC/OpenSC/commit/ef3e2239173cd8ab9714171f122aed24eb93b577 | The vulnerability occurs in coolkey where empty answers are incorrectly interpreted as success. |
arvo:18877 | n132/arvo:18877-vul | /src/librawspeed | [
{
"end_line": 79,
"function_name": "PhaseOneDecompressor::prepareStrips",
"start_line": 57,
"target_file": "/src/librawspeed/src/librawspeed/decompressors/PhaseOneDecompressor.cpp"
}
] | Use-of-uninitialized-value | librawspeed | msan | INFO: Seed: 1114500998
INFO: Loaded 1 modules (1660 inline 8-bit counters): 1660 [0x6047d8, 0x604e54),
INFO: Loaded 1 PC tables (1660 PCs): 1660 [0x604e58,0x60b618),
/out/PhaseOneDecompressorFuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialized bytes in __msan_check_mem_is_initialized at offset 0... | cpp | c3d747236b9285193cec74c59408669e141422d5 | https://github.com/darktable-org/rawspeed/commit/3753c84ea46eeb86a0daf8da8c088342515b10dd | The PhaseOneDecompressor::prepareStrips() function does not properly validate that per-row slice values are monotonically increasing, which can lead to incorrect processing of image data. |
arvo:18882 | n132/arvo:18882-vul | /src/libgit2 | [
{
"end_line": 842,
"function_name": "parse_patch_binary_side",
"start_line": 762,
"target_file": "/src/libgit2/src/patch_parse.c"
}
] | Heap-buffer-overflow READ 1 | libgit2 | asan | INFO: Seed: 931241711
INFO: Loaded 1 modules (33701 inline 8-bit counters): 33701 [0xe06b80, 0xe0ef25),
INFO: Loaded 1 PC tables (33701 PCs): 33701 [0xace830,0xb52280),
/out/patch_parse_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==339... | c | 7f20778ba68d3f2c3fe9f523e24bead57392960d | https://github.com/libgit2/libgit2/commit/7f6fdb8293a94267fead2424c90450de228db157 | The patch_parse function in patch_parse.c contains a vulnerability where integer underflow can lead to out-of-bounds reads. |
arvo:18890 | n132/arvo:18890-vul | /src/opensc | [
{
"end_line": 380,
"function_name": "sc_pkcs15_decode_pukdf_entry",
"start_line": 211,
"target_file": "/src/opensc/src/libopensc/pkcs15-pubkey.c"
}
] | Heap-double-free | opensc | asan | INFO: Seed: 1559678197
INFO: Loaded 1 modules (21266 inline 8-bit counters): 21266 [0xbe4ea0, 0xbea1b2),
INFO: Loaded 1 PC tables (21266 PCs): 21266 [0x8b4c08,0x907d28),
/out/fuzz_pkcs15_decode: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==56... | c | b79db82ae7b65b0847ea8fb286d203fae0a0ceb5 | https://github.com/OpenSC/OpenSC/commit/5557f34f5ef86cbf2d2de0ff39b591d4c836defb | null |
arvo:18939 | n132/arvo:18939-vul | /src/opensc | [
{
"end_line": 1109,
"function_name": "coolkey_get_cplc_data",
"start_line": 1094,
"target_file": "/src/opensc/src/libopensc/card-coolkey.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | INFO: Seed: 1862513438
INFO: Loaded 1 modules (21480 inline 8-bit counters): 21480 [0xbefb80, 0xbf4f68),
INFO: Loaded 1 PC tables (21480 PCs): 21480 [0x8bd868,0x9116e8),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==56... | c | bec794fbee14fb726cf1a4e572b261ed96f3bab7 | https://github.com/OpenSC/OpenSC/commit/2d02de4233a70fdad4cbf0862c83f03d9ba85d78 | null |
arvo:18963 | n132/arvo:18963-vul | /src/opensc | [
{
"end_line": 1109,
"function_name": "coolkey_get_cplc_data",
"start_line": 1094,
"target_file": "/src/opensc/src/libopensc/card-coolkey.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | INFO: Seed: 3171845117
INFO: Loaded 1 modules (21480 inline 8-bit counters): 21480 [0xbefb80, 0xbf4f68),
INFO: Loaded 1 PC tables (21480 PCs): 21480 [0x8bd868,0x9116e8),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==56... | c | bec794fbee14fb726cf1a4e572b261ed96f3bab7 | https://github.com/OpenSC/OpenSC/commit/2d02de4233a70fdad4cbf0862c83f03d9ba85d78 | null |
arvo:18982 | n132/arvo:18982-vul | /src/opensc | [
{
"end_line": 1109,
"function_name": "coolkey_get_cplc_data",
"start_line": 1094,
"target_file": "/src/opensc/src/libopensc/card-coolkey.c"
}
] | Heap-double-free | opensc | asan | INFO: Seed: 100153880
INFO: Loaded 1 modules (21480 inline 8-bit counters): 21480 [0xbefb80, 0xbf4f68),
INFO: Loaded 1 PC tables (21480 PCs): 21480 [0x8bd868,0x9116e8),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==561... | c | bec794fbee14fb726cf1a4e572b261ed96f3bab7 | https://github.com/OpenSC/OpenSC/commit/2d02de4233a70fdad4cbf0862c83f03d9ba85d78 | null |
arvo:18988 | n132/arvo:18988-vul | /src/lwan | [
{
"end_line": 72,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 57,
"target_file": "/src/lwan/src/bin/fuzz/template_fuzzer.cc"
}
] | Global-buffer-overflow WRITE 1 | lwan | asan | INFO: Seed: 1378597543
INFO: Loaded 1 modules (3106 inline 8-bit counters): 3106 [0x822a30, 0x823652),
INFO: Loaded 1 PC tables (3106 PCs): 3106 [0x823658,0x82f878),
/out/template_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==381==ERRO... | cpp | f7b91535da39550693214dbe7ae2c16d83d70a4f | https://github.com/lpereira/lwan/commit/d7fc0d27fbea5c68d61444033517d0e962e822e6 | A buffer overflow exists in the template parser harness. |
arvo:18990 | n132/arvo:18990-vul | /src/opensc | [
{
"end_line": 1109,
"function_name": "coolkey_get_cplc_data",
"start_line": 1094,
"target_file": "/src/opensc/src/libopensc/card-coolkey.c"
}
] | Heap-buffer-overflow READ {*} | opensc | asan | INFO: Seed: 1772777461
INFO: Loaded 1 modules (21480 inline 8-bit counters): 21480 [0xbefb80, 0xbf4f68),
INFO: Loaded 1 PC tables (21480 PCs): 21480 [0x8bd868,0x9116e8),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==56... | c | bec794fbee14fb726cf1a4e572b261ed96f3bab7 | https://github.com/OpenSC/OpenSC/commit/2d02de4233a70fdad4cbf0862c83f03d9ba85d78 | null |
arvo:18991 | n132/arvo:18991-vul | /src/libhevc | [
{
"end_line": 1169,
"function_name": "ihevcd_iquant_itrans_recon_ctb",
"start_line": 530,
"target_file": "/src/libhevc/decoder/ihevcd_iquant_itrans_recon_ctb.c"
}
] | Use-of-uninitialized-value | libhevc | msan | INFO: Seed: 4246005449
INFO: Loaded 1 modules (9717 inline 8-bit counters): 9717 [0xab05f8, 0xab2bed),
INFO: Loaded 1 PC tables (9717 PCs): 9717 [0x83b7d8,0x861728),
/out/hevc_dec_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==1213==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x75b73f ... | c | 3fac63c9b78796d97bdd7c33b238f4e099460051 | https://android.googlesource.com/platform/external/libhevc/+/445e0d8d5ec10fcb8e43117c01ec6a671246ce69%5E%21/ | A misplaced local array on the stack in libhevcdec causes color artifacts in decoded YUV for chroma planes. The array luma_nbr_flags_4x4[] is always allocated at the same address, which preserves values from previous iterations, leading to incorrect behavior. |
arvo:19031 | n132/arvo:19031-vul | /src/opensc | [
{
"end_line": 754,
"function_name": "coolkey_compare_id",
"start_line": 747,
"target_file": "/src/opensc/src/libopensc/card-coolkey.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | INFO: Seed: 4010734081
INFO: Loaded 1 modules (21485 inline 8-bit counters): 21485 [0xbf0bc0, 0xbf5fad),
INFO: Loaded 1 PC tables (21485 PCs): 21485 [0x8bdc68,0x911b38),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==56... | c | 249e9281761fc861bab93f76baf6cdcefb1774ee | https://github.com/OpenSC/OpenSC/commit/aa6d3e1d36969aa0f955b11faf9142666145a72b | null |
arvo:19032 | n132/arvo:19032-vul | /src/opensc | [
{
"end_line": 754,
"function_name": "coolkey_compare_id",
"start_line": 747,
"target_file": "/src/opensc/src/libopensc/card-coolkey.c"
}
] | Heap-buffer-overflow READ {*} | opensc | asan | INFO: Seed: 1883253031
INFO: Loaded 1 modules (21485 inline 8-bit counters): 21485 [0xbf0bc0, 0xbf5fad),
INFO: Loaded 1 PC tables (21485 PCs): 21485 [0x8bdc68,0x911b38),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==56... | c | 249e9281761fc861bab93f76baf6cdcefb1774ee | https://github.com/OpenSC/OpenSC/commit/aa6d3e1d36969aa0f955b11faf9142666145a72b | null |
arvo:19039 | n132/arvo:19039-vul | /src/opensc | [
{
"end_line": 121,
"function_name": "gp_get_cplc_data",
"start_line": 93,
"target_file": "/src/opensc/src/libopensc/gp.c"
}
] | UNKNOWN READ | opensc | ubsan | INFO: Seed: 909135527
INFO: Loaded 1 modules (24292 inline 8-bit counters): 24292 [0x905770, 0x90b654),
INFO: Loaded 1 PC tables (24292 PCs): 24292 [0x64a2e0,0x6a9120),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitizer:DEADLYSIGNAL
==56191==ERROR: UndefinedBehavi... | c | 4f3d87d03c695c649d5ec877958bcd12f2ae3b5e | https://github.com/OpenSC/OpenSC/commit/249e9281761fc861bab93f76baf6cdcefb1774ee | A vulnerability exists in the gp module where the CPLC data length is not correctly checked. |
arvo:19040 | n132/arvo:19040-vul | /src/opensc | [
{
"end_line": 754,
"function_name": "coolkey_compare_id",
"start_line": 747,
"target_file": "/src/opensc/src/libopensc/card-coolkey.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader
=================================================================
==56321==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000067f at pc 0x0000005c9562 bp 0x7ffefe5b7070 sp 0x7ffefe5b7068
READ of size 1 at... | c | 249e9281761fc861bab93f76baf6cdcefb1774ee | https://github.com/OpenSC/OpenSC/commit/aa6d3e1d36969aa0f955b11faf9142666145a72b | null |
arvo:19100 | n132/arvo:19100-vul | /src/ndpi | [
{
"end_line": 57,
"function_name": "ndpi_check_amazon_video",
"start_line": 30,
"target_file": "/src/ndpi/src/lib/protocols/amazon_video.c"
}
] | Heap-buffer-overflow READ 1 | ndpi | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_process_packet < INPUT_FILE
or
/out/fuzz_process_packet INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/f... | cpp | ae9429408bded48ad71bb15df28745cc484d23f2 | https://github.com/ntop/nDPI/commit/c7efd0892f1f9299360956b740044a798123a773 | A buffer overflow exists in the amazon video dissector. |
arvo:19175 | n132/arvo:19175-vul | /src/ndpi | [
{
"end_line": 391,
"function_name": "ndpi_search_kerberos",
"start_line": 41,
"target_file": "/src/ndpi/src/lib/protocols/kerberos.c"
}
] | UNKNOWN READ | ndpi | asan | INFO: Seed: 4076396225
INFO: Loaded 1 modules (13730 inline 8-bit counters): 13730 [0x9652b0, 0x968852),
INFO: Loaded 1 PC tables (13730 PCs): 13730 [0x968858,0x99e278),
/out/fuzz_process_packet: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==1... | c | fbc59c5f81cfbf38de063e8afe21e2fa23cc2ad7 | https://github.com/ntop/nDPI/commit/239842b821763a2afc62d859a186f673ba09b171 | null |
arvo:19190 | n132/arvo:19190-vul | /src/opensc | [
{
"end_line": 754,
"function_name": "coolkey_compare_id",
"start_line": 747,
"target_file": "/src/opensc/src/libopensc/card-coolkey.c"
}
] | Heap-buffer-overflow READ {*} | opensc | asan | INFO: Seed: 2487289523
INFO: Loaded 1 modules (21485 inline 8-bit counters): 21485 [0xbf0bc0, 0xbf5fad),
INFO: Loaded 1 PC tables (21485 PCs): 21485 [0x8bdc68,0x911b38),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==56... | c | 249e9281761fc861bab93f76baf6cdcefb1774ee | https://github.com/OpenSC/OpenSC/commit/aa6d3e1d36969aa0f955b11faf9142666145a72b | null |
arvo:19191 | n132/arvo:19191-vul | /src/opensc | [
{
"end_line": 754,
"function_name": "coolkey_compare_id",
"start_line": 747,
"target_file": "/src/opensc/src/libopensc/card-coolkey.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | INFO: Seed: 30189008
INFO: Loaded 1 modules (21485 inline 8-bit counters): 21485 [0xbf0bc0, 0xbf5fad),
INFO: Loaded 1 PC tables (21485 PCs): 21485 [0x8bdc68,0x911b38),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==5620... | c | 249e9281761fc861bab93f76baf6cdcefb1774ee | https://github.com/OpenSC/OpenSC/commit/aa6d3e1d36969aa0f955b11faf9142666145a72b | null |
arvo:19208 | n132/arvo:19208-vul | /src/opensc | [
{
"end_line": 1973,
"function_name": "coolkey_add_object",
"start_line": 1935,
"target_file": "/src/opensc/src/libopensc/card-coolkey.c"
}
] | Heap-double-free | opensc | asan | INFO: Seed: 2079627382
INFO: Loaded 1 modules (21487 inline 8-bit counters): 21487 [0xbf0c40, 0xbf602f),
INFO: Loaded 1 PC tables (21487 PCs): 21487 [0x8bde68,0x911d58),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==56... | c | 32b49894c5991a63fcb913c3e5bc6dc3af9c3c22 | https://github.com/OpenSC/OpenSC/commit/c246f6f69a749d4f68626b40795a4f69168008f4 | A vulnerability exists in coolkey where the object ID is not ensured to be unique when filling the list, potentially leading to issues with object identification. |
arvo:19222 | n132/arvo:19222-vul | /src/opensc | [
{
"end_line": 540,
"function_name": "coolkey_v0_get_attribute_data",
"start_line": 510,
"target_file": "/src/opensc/src/libopensc/card-coolkey.c"
}
] | Heap-buffer-overflow READ {*} | opensc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader
=================================================================
==56188==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6040000000f5 at pc 0x0000004961ba bp 0x7ffeb4795410 sp 0x7ffeb4794bd8
READ of size 255 ... | c | c246f6f69a749d4f68626b40795a4f69168008f4 | https://github.com/OpenSC/OpenSC/commit/4c67bbf3838aba9cf7e00697403d7b860bbae30b | A vulnerability exists in coolkey where the code addresses memory behind allocated buffers, potentially leading to out-of-bounds access. |
arvo:19269 | n132/arvo:19269-vul | /src/ndpi | [
{
"end_line": 757,
"function_name": "getTLScertificate",
"start_line": 201,
"target_file": "/src/ndpi/src/lib/protocols/tls.c"
}
] | Heap-buffer-overflow READ 6 | ndpi | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_process_packet < INPUT_FILE
or
/out/fuzz_process_packet INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/f... | cpp | 65d526d8f6ae75f8d1a3f5c8dd19bf40ec03f320 | https://github.com/ntop/nDPI/commit/6d7f3976f33b0d4fbbece60d6b7d549b13107674 | null |
arvo:19324 | n132/arvo:19324-vul | /src/ndpi | [
{
"end_line": 176,
"function_name": "ndpi_search_memcached",
"start_line": 102,
"target_file": "/src/ndpi/src/lib/protocols/memcached.c"
}
] | Heap-buffer-overflow READ 13 | ndpi | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_process_packet < INPUT_FILE
or
/out/fuzz_process_packet INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/f... | cpp | ff89a14b496f816b27d8a333bb022b3da34561d8 | https://github.com/ntop/nDPI/commit/579dd7dff9bcb973ab83d7b222d5250de5028794 | null |
arvo:19332 | n132/arvo:19332-vul | /src/ndpi | [
{
"end_line": 485,
"function_name": "ndpi_int_check_stun",
"start_line": 140,
"target_file": "/src/ndpi/src/lib/protocols/stun.c"
}
] | Heap-buffer-overflow READ 2 | ndpi | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_process_packet < INPUT_FILE
or
/out/fuzz_process_packet INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/f... | cpp | 09cd95d54ab5141795a0653b1f6a6149725dbbf7 | https://github.com/ntop/nDPI/commit/843204299c79c55c736231c06db98def2b3a6bba | A read buffer overflow exists in stun. |
arvo:19338 | n132/arvo:19338-vul | /src/openthread | [
{
"end_line": 3106,
"function_name": "MleRouter::SendChildUpdateResponse",
"start_line": 3029,
"target_file": "/src/openthread/src/core/thread/mle_router.cpp"
}
] | Stack-buffer-overflow READ 11 | openthread | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/radio-receive-done-fuzzer < INPUT_FILE
or
/out/radio-receive-done-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-f... | cpp | dff1694fe160be593dea33a7eb604b844190604a | https://github.com/openthread/openthread/commit/f49d8b7b1d33ddc0ef03d0dea822dec83fbb8722 | null |
arvo:19386 | n132/arvo:19386-vul | /src/openthread | [
{
"end_line": 1131,
"function_name": "Commissioner::GeneratePskc",
"start_line": 1101,
"target_file": "/src/openthread/src/core/meshcop/commissioner.cpp"
}
] | Stack-buffer-overflow WRITE {*} | openthread | asan | INFO: Seed: 1850123962
INFO: Loaded 1 modules (20151 inline 8-bit counters): 20151 [0xa00190, 0xa05047),
INFO: Loaded 1 PC tables (20151 PCs): 20151 [0x71af98,0x769b08),
/out/ncp-uart-received-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================================================================... | cpp | e8735f45f2015c30c8e8572506f5d462558823fc | https://github.com/openthread/openthread/commit/b8c3161281f8e15873f8decabd8eac461717aefe | null |
arvo:19466 | n132/arvo:19466-vul | /src/ndpi | [
{
"end_line": 764,
"function_name": "getTLScertificate",
"start_line": 203,
"target_file": "/src/ndpi/src/lib/protocols/tls.c"
}
] | Heap-buffer-overflow READ 6 | ndpi | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_process_packet < INPUT_FILE
or
/out/fuzz_process_packet INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/f... | cpp | 14e5adc7c2bd56cdc9d0e0e3d2e5f469945a7997 | https://github.com/ntop/nDPI/commit/ea001b439a134f4e0e4245d29988547103c047b4 | null |
arvo:19548 | n132/arvo:19548-vul | /src/opensc | [
{
"end_line": 742,
"function_name": "pgp_parse_algo_attr_blob",
"start_line": 691,
"target_file": "/src/opensc/src/libopensc/card-openpgp.c"
}
] | Stack-buffer-overflow WRITE 4 | opensc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader
=================================================================
==56192==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f055016aae0 at pc 0x00000057892e bp 0x7ffdc0871010 sp 0x7ffdc0871008
WRITE of size 4 ... | c | af42a93874132cbca201cb4fd2040498dc460285 | https://github.com/OpenSC/OpenSC/commit/333c41c5d51450177553b8fd8cb2d710a7f7dec5 | A stack-buffer-overflow occurs in the pgp code due to writing beyond the oid object. |
arvo:19647 | n132/arvo:19647-vul | /src/binutils-gdb | [
{
"end_line": 2443,
"function_name": "_bfd_vms_slurp_etir",
"start_line": 1850,
"target_file": "/src/binutils-gdb/bfd/vms-alpha.c"
}
] | Heap-buffer-overflow READ 1 | binutils-gdb | asan | Reading 288 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_bfd < INPUT_FILE
or
/out/fuzz_bfd INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-fla... | cpp | 7936714c0c5030f872ced475f848692ce835708a | https://github.com/bminor/binutils-gdb/commit/2c0e48e5b797de474ef2e19f4146349065833138 | null |
arvo:19684 | n132/arvo:19684-vul | /src/binutils-gdb | [
{
"end_line": 5950,
"function_name": "som_bfd_count_ar_symbols",
"start_line": 5875,
"target_file": "/src/binutils-gdb/bfd/som.c"
}
] | Heap-buffer-overflow READ 1 | binutils-gdb | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_bfd < INPUT_FILE
or
/out/fuzz_bfd INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/fuzz_bfd [-N]
afl-fuzz ... | cpp | cef2097a8731b04accf50d99c9b5a556cebd5f15 | https://github.com/bminor/binutils-gdb/commit/e5af216040aba59952c99d6479ba5279cee6825d | null |
arvo:19744 | n132/arvo:19744-vul | /src/imagemagick | [
{
"end_line": 1594,
"function_name": "CheckPSDChannels",
"start_line": 1548,
"target_file": "/src/imagemagick/coders/psd.c"
}
] | Heap-use-after-free WRITE 8 | imagemagick | asan | INFO: Seed: 3231472408
INFO: Loaded 1 modules (180907 inline 8-bit counters): 180907 [0x1fd9b40, 0x2005deb),
INFO: Loaded 1 PC tables (180907 PCs): 180907 [0x2005df0,0x22c88a0),
/out/encoder_psd_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEADLYSIGNAL
================================... | cpp | cd35745673de213b5367666e8801f606a667c444 | https://github.com/imagemagick/imagemagick/commit/df9e141e9a5e82b61123e1aebebc10f7a14d5a5d | null |
arvo:19746 | n132/arvo:19746-vul | /src/binutils-gdb | [
{
"end_line": 641,
"function_name": "_bfd_vms_slurp_eisd",
"start_line": 511,
"target_file": "/src/binutils-gdb/bfd/vms-alpha.c"
}
] | Heap-buffer-overflow READ 1 | binutils-gdb | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_bfd < INPUT_FILE
or
/out/fuzz_bfd INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/fuzz_bfd [-N]
afl-fuzz ... | cpp | 930be6676412ab9a13ae7614ba57fb7e86a1ce72 | https://github.com/bminor/binutils-gdb/commit/bf31e6044082986689e17af54e2ca3cc1ac8419b | null |
arvo:19902 | n132/arvo:19902-vul | /src/mruby | [
{
"end_line": 2579,
"function_name": "mrb_str_len_to_dbl",
"start_line": 2492,
"target_file": "/src/mruby/src/string.c"
}
] | Stack-buffer-overflow WRITE 1 | mruby | asan | INFO: Seed: 4071679382
INFO: Loaded 1 modules (12750 inline 8-bit counters): 12750 [0x9a0a20, 0x9a3bee),
INFO: Loaded 1 PC tables (12750 PCs): 12750 [0x6f1268,0x722f48),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==1889==ER... | c | dbba0ca517ad0c32cdd7f0bd68de9c35145e1735 | https://github.com/mruby/mruby/commit/2124b9b4c95e66e63b1eb26a8dab49753b82fd6c | A buffer overflow exists in the `mrb_str_len_to_dbl` function, which can lead to a stack-buffer-overflow when processing certain string inputs. |
arvo:19903 | n132/arvo:19903-vul | /src/imagemagick | [
{
"end_line": 2690,
"function_name": "FxEvaluateSubexpression",
"start_line": 1424,
"target_file": "/src/imagemagick/MagickCore/fx.c"
}
] | Heap-buffer-overflow WRITE 1 | imagemagick | asan | INFO: Seed: 182224827
INFO: Loaded 1 modules (178764 inline 8-bit counters): 178764 [0x9bdfb30, 0x9c0b57c),
INFO: Loaded 1 PC tables (178764 PCs): 178764 [0x9c0b57c,0x9d687dc),
/out/encoder_label_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=============================================================... | cpp | 19ae4e774b0e4f34270c2eec3f28c6aafcc6a0fd | https://github.com/imagemagick/imagemagick/commit/4a0d0200e0d95c9731bae0423463f0741b74c8f1 | null |
arvo:19910 | n132/arvo:19910-vul | /src/binutils-gdb | [
{
"end_line": 280,
"function_name": "z8k_lookup_instr",
"start_line": 190,
"target_file": "/src/binutils-gdb/opcodes/z8k-dis.c"
}
] | Index-out-of-bounds | binutils-gdb | ubsan | INFO: Seed: 4260874140
INFO: Loaded 1 modules (315830 inline 8-bit counters): 315830 [0x2c99068, 0x2ce621e),
INFO: Loaded 1 PC tables (315830 PCs): 315830 [0x1ae9db8,0x1fbb918),
/out/fuzz_disassemble: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
z8k-dis.c:220:17: runtime error: index 10 out of bounds for type... | c | 4c6ee6465acc58f0f86c44668c4e862901186239 | https://github.com/bminor/binutils-gdb/commit/030a2e78acf66c5c12e073ec3887a167da7a7195 | An out-of-bounds access occurs in z8k-dis.c due to indexing beyond the bounds of an array of type 'unsigned int const[10]', specifically with index 10. This affects functions such as z8k_lookup_instr, where nibl_index and tabl_index are involved, and can lead to undefined behavior by exceeding the bounds of byte_info. ... |
arvo:20008 | n132/arvo:20008-vul | /src/imagemagick | [
{
"end_line": 2641,
"function_name": "FxEvaluateSubexpression",
"start_line": 1424,
"target_file": "/src/imagemagick/MagickCore/fx.c"
}
] | Use-of-uninitialized-value | imagemagick | msan | INFO: Seed: 205664530
INFO: Loaded 1 modules (180644 inline 8-bit counters): 180644 [0x2c2dfa0, 0x2c5a144),
INFO: Loaded 1 PC tables (180644 PCs): 180644 [0x2c5a148,0x2f1bb88),
/out/ping_mvg_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==200882==WARNING: MemorySanitizer: use-of-uninitialized-value
... | cpp | 48aca49d708e7dbc3ff75c994252311661c2588d | https://github.com/imagemagick/imagemagick/commit/065c9cc3da0d89a7744b983a2721b3a2c29f5a01 | null |
arvo:20026 | n132/arvo:20026-vul | /src/unicorn | [
{
"end_line": 159,
"function_name": "store_reg",
"start_line": 150,
"target_file": "/src/unicorn/qemu/target-arm/translate.c"
}
] | Index-out-of-bounds | unicorn | ubsan | INFO: Seed: 1800225197
INFO: Loaded 1 modules (270402 inline 8-bit counters): 270402 [0x1750988, 0x17929ca),
INFO: Loaded 1 PC tables (270402 PCs): 270402 [0x17929d0,0x1bb2df0),
/out/fuzz_emu_arm_thumb: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
/src/unicorn/qemu/target-arm/translate.c:157:30: runtime error... | cpp | 7e4ac9e86ef286c1418ea32aaf5b48646a952ac4 | https://github.com/unicorn-engine/unicorn/commit/ec2e4544819b2ef0ecd297ba331d4f2172b77245 | null |
arvo:20060 | n132/arvo:20060-vul | /src/wavpack | [
{
"end_line": 216,
"function_name": "WavpackDeleteTagItem",
"start_line": 180,
"target_file": "/src/wavpack/src/tag_utils.c"
}
] | Use-of-uninitialized-value | wavpack | msan | INFO: Seed: 757129467
INFO: Loaded 1 modules (2091 inline 8-bit counters): 2091 [0x7de3b2, 0x7debdd),
INFO: Loaded 1 PC tables (2091 PCs): 2091 [0x5955e8,0x59d898),
/out/fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==28295==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x54238c in Wavpac... | cpp | f66e65851d45f51f9f83708f6260ca53883750a5 | https://github.com/dbry/WavPack/commit/c4e193f3a360817eb097fb54f2f9f84d5dda7112 | The code in question accesses uninitialized memory, specifically in a way where the values read are always discarded. This behavior occurs in the affected file and does not result in a vulnerability. |
arvo:20079 | n132/arvo:20079-vul | /src/unicorn | [
{
"end_line": 2657,
"function_name": "tcg_gen_code_common",
"start_line": 2525,
"target_file": "/src/unicorn/qemu/tcg/tcg.c"
},
{
"end_line": 2690,
"function_name": "tcg_gen_code",
"start_line": 2659,
"target_file": "/src/unicorn/qemu/tcg/tcg.c"
},
{
"end_line": 259,
... | UNKNOWN READ | unicorn | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_emu_arm64_arm < INPUT_FILE
or
/out/fuzz_emu_arm64_arm INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/fuz... | cpp | 393a5641fdb83a33b500e86e165ab1d5ddf9ad99 | https://github.com/unicorn-engine/unicorn/commit/c5203079596f4614bcf7b4e653b4bb8810e64a3e | null |
arvo:20089 | n132/arvo:20089-vul | /src/ndpi | [
{
"end_line": 1744,
"function_name": "ndpi_workflow_process_packet",
"start_line": 1354,
"target_file": "/src/ndpi/example/reader_util.c"
}
] | Heap-buffer-overflow READ 2 | ndpi | asan | INFO: Seed: 4157342411
INFO: Loaded 1 modules (20158 inline 8-bit counters): 20158 [0xbbea80, 0xbc393e),
INFO: Loaded 1 PC tables (20158 PCs): 20158 [0xbc3940,0xc12520),
/out/fuzz_ndpi_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==1644... | c | 98d9f524f9ff7746d0345939fe543020f8057212 | https://github.com/ntop/nDPI/commit/812505b56bb4508bc42e1615d6425ad26444d3f8 | null |
arvo:20091 | n132/arvo:20091-vul | /src/ndpi | [
{
"end_line": 1744,
"function_name": "ndpi_workflow_process_packet",
"start_line": 1354,
"target_file": "/src/ndpi/example/reader_util.c"
}
] | Heap-buffer-overflow READ 4 | ndpi | asan | INFO: Seed: 4294585470
INFO: Loaded 1 modules (20158 inline 8-bit counters): 20158 [0xbbea80, 0xbc393e),
INFO: Loaded 1 PC tables (20158 PCs): 20158 [0xbc3940,0xc12520),
/out/fuzz_ndpi_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==1644... | c | 98d9f524f9ff7746d0345939fe543020f8057212 | https://github.com/ntop/nDPI/commit/812505b56bb4508bc42e1615d6425ad26444d3f8 | null |
arvo:20113 | n132/arvo:20113-vul | /src/arrow | [
{
"end_line": 338,
"function_name": "BufferReader::DoReadAt",
"start_line": 328,
"target_file": "/src/arrow/cpp/src/arrow/io/memory.cc"
}
] | Heap-buffer-overflow READ 4 | arrow | asan | INFO: Seed: 1505833662
INFO: Loaded 1 modules (292539 inline 8-bit counters): 292539 [0x1931cd0, 0x197938b),
INFO: Loaded 1 PC tables (292539 PCs): 292539 [0x1979390,0x1deff40),
/out/arrow-ipc-stream-fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===========================================================... | cpp | 8b09ecc5c690dd270dea83490f292c2e00eef75b | https://github.com/apache/arrow/commit/724da320eaac94003a8f1229d6a820fe8c8c1816 | null |
arvo:20115 | n132/arvo:20115-vul | /src/arrow | [
{
"end_line": 338,
"function_name": "BufferReader::DoReadAt",
"start_line": 328,
"target_file": "/src/arrow/cpp/src/arrow/io/memory.cc"
}
] | UNKNOWN READ | arrow | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/arrow-ipc-stream-fuzz < INPUT_FILE
or
/out/arrow-ipc-stream-fuzz INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /o... | cpp | 8b09ecc5c690dd270dea83490f292c2e00eef75b | https://github.com/apache/arrow/commit/724da320eaac94003a8f1229d6a820fe8c8c1816 | null |
arvo:20120 | n132/arvo:20120-vul | /src/arrow | [
{
"end_line": 338,
"function_name": "BufferReader::DoReadAt",
"start_line": 328,
"target_file": "/src/arrow/cpp/src/arrow/io/memory.cc"
}
] | Heap-use-after-free READ 8 | arrow | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/arrow-ipc-stream-fuzz < INPUT_FILE
or
/out/arrow-ipc-stream-fuzz INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /o... | cpp | 8b09ecc5c690dd270dea83490f292c2e00eef75b | https://github.com/apache/arrow/commit/724da320eaac94003a8f1229d6a820fe8c8c1816 | null |
arvo:20124 | n132/arvo:20124-vul | /src/arrow | [
{
"end_line": 338,
"function_name": "BufferReader::DoReadAt",
"start_line": 328,
"target_file": "/src/arrow/cpp/src/arrow/io/memory.cc"
}
] | Segv on unknown address | arrow | asan | INFO: Seed: 3881491901
INFO: Loaded 1 modules (292539 inline 8-bit counters): 292539 [0x1931cd0, 0x197938b),
INFO: Loaded 1 PC tables (292539 PCs): 292539 [0x1979390,0x1deff40),
/out/arrow-ipc-file-fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEADLYSIGNAL
===============================... | cpp | 8b09ecc5c690dd270dea83490f292c2e00eef75b | https://github.com/apache/arrow/commit/724da320eaac94003a8f1229d6a820fe8c8c1816 | null |
arvo:20135 | n132/arvo:20135-vul | /src/arrow | [
{
"end_line": 338,
"function_name": "BufferReader::DoReadAt",
"start_line": 328,
"target_file": "/src/arrow/cpp/src/arrow/io/memory.cc"
}
] | UNKNOWN READ | arrow | asan | INFO: Seed: 2598637202
INFO: Loaded 1 modules (292539 inline 8-bit counters): 292539 [0x1931cd0, 0x197938b),
INFO: Loaded 1 PC tables (292539 PCs): 292539 [0x1979390,0x1deff40),
/out/arrow-ipc-stream-fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEADLYSIGNAL
=============================... | cpp | 8b09ecc5c690dd270dea83490f292c2e00eef75b | https://github.com/apache/arrow/commit/724da320eaac94003a8f1229d6a820fe8c8c1816 | null |
arvo:20139 | n132/arvo:20139-vul | /src/arrow | [
{
"end_line": 338,
"function_name": "BufferReader::DoReadAt",
"start_line": 328,
"target_file": "/src/arrow/cpp/src/arrow/io/memory.cc"
}
] | UNKNOWN READ | arrow | ubsan | INFO: Seed: 836697749
INFO: Loaded 1 modules (270778 inline 8-bit counters): 270778 [0x1500960, 0x1542b1a),
INFO: Loaded 1 PC tables (270778 PCs): 270778 [0x1542b20,0x19646c0),
/out/arrow-ipc-stream-fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitizer:DEADLYSIGNAL
==622==ERROR: Undefi... | cpp | 8b09ecc5c690dd270dea83490f292c2e00eef75b | https://github.com/apache/arrow/commit/724da320eaac94003a8f1229d6a820fe8c8c1816 | null |
arvo:20147 | n132/arvo:20147-vul | /src/binutils-gdb | [
{
"end_line": 10249,
"function_name": "print_insn_arm",
"start_line": 9713,
"target_file": "/src/binutils-gdb/opcodes/arm-dis.c"
}
] | Index-out-of-bounds | binutils-gdb | ubsan | INFO: Seed: 730144037
INFO: Loaded 1 modules (315704 inline 8-bit counters): 315704 [0x2c94dd8, 0x2ce1f10),
INFO: Loaded 1 PC tables (315704 PCs): 315704 [0x1ae7238,0x1fb85b8),
/out/fuzz_disassemble: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
arm-dis.c:10129:28: runtime error: index 16 out of bounds for typ... | c | cf1d9e092f871df3b34a58cfcde915c689ac9067 | https://github.com/bminor/binutils-gdb/commit/2bddb71a7421213dd9d8b8f2db133b43f5e1357e | An out-of-bounds array access occurs in the ARM disassembler, specifically in the print_insn_arm function in arm-dis.c, when disassembling certain instructions such as ".inst 0x81bdfe9f". This can result in invalid register names like "reg-names-std" being interpreted as ARM registers. |
arvo:20181 | n132/arvo:20181-vul | /src/arrow | [
{
"end_line": 330,
"function_name": "ValidateArray",
"start_line": 263,
"target_file": "/src/arrow/cpp/src/arrow/array/validate.cc"
}
] | Global-buffer-overflow READ 1 | arrow | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/arrow-ipc-stream-fuzz < INPUT_FILE
or
/out/arrow-ipc-stream-fuzz INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /o... | cpp | 92931939ac2c8c89c278c2413608c3f1d2663f91 | https://github.com/apache/arrow/commit/a6307cc8a0127a4852b7d3d2c20940a094eed0d6 | null |
arvo:20187 | n132/arvo:20187-vul | /src/opensc | [
{
"end_line": 115,
"function_name": "fuzz_reader_connect",
"start_line": 99,
"target_file": "/src/opensc/src/tests/fuzzing/fuzz_pkcs15_reader.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | INFO: Seed: 2688487734
INFO: Loaded 1 modules (21532 inline 8-bit counters): 21532 [0xbf5780, 0xbfab9c),
INFO: Loaded 1 PC tables (21532 PCs): 21532 [0x8c17a8,0x915968),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==56... | c | a487e9595e0030c1775e324b2a1bbba5f982bfe2 | https://github.com/OpenSC/OpenSC/commit/4ef7ed9ffd2acacfc5026db4fb984a1386a07bdb | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.