task_id
stringlengths
8
10
docker_image
stringlengths
17
19
basedir
stringclasses
157 values
target_functions
listlengths
1
3
crash_type
stringclasses
85 values
project_name
stringclasses
157 values
sanitizer
stringclasses
3 values
sanitizer_output
stringlengths
1.13k
6.5M
language
stringclasses
2 values
vuln_commit
stringlengths
40
40
fix
stringlengths
69
110
vulnerability_description
stringlengths
38
824
arvo:59814
n132/arvo:59814-vul
/src/libheif
[ { "end_line": 110, "function_name": "read_plane_interleaved", "start_line": 86, "target_file": "/src/libheif/fuzzing/color_conversion_fuzzer.cc" } ]
Heap-buffer-overflow WRITE {*}
libheif
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2360416361 INFO: Loaded 1 modules (23744 inline 8-bit counters): 23744 [0x865b010, 0x8660cd0), INFO: Loaded 1 PC tables (23744 PCs): 23744 [0x8660cd0,0x868f2d0), /out/color_conversion_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =====...
cpp
a26bcb0b219cca182e7aedded4fdc1001eb36f5f
https://github.com/strukturag/libheif/commit/94e5a84d1f05fe905e91a41e8a17e29437c3c15e
An integer overflow occurs in color_conversion_fuzzer due to missing checks, leading to a security vulnerability in the fuzzer code rather than in the library.
arvo:59827
n132/arvo:59827-vul
/src/mruby
[ { "end_line": 576, "function_name": "mrb_init_kernel", "start_line": 537, "target_file": "/src/mruby/src/kernel.c" } ]
Use-of-uninitialized-value
mruby
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3606614637 INFO: Loaded 1 modules (23894 inline 8-bit counters): 23894 [0x9e7679, 0x9ed3cf), INFO: Loaded 1 PC tables (23894 PCs): 23894 [0x922d70,0x9802d0), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc fz fz fz fz fz fz fz...
c
e96d90dab2042db93c5ba8a85211226e0d48abb3
https://github.com/mruby/mruby/commit/347586e4002959bd3e6694a0174812f4f7e6d485
A security vulnerability exists in kernel.c due to the absence of a `respond_to_missing?` method, which may cause objects to incorrectly report their ability to respond to certain methods.
arvo:59862
n132/arvo:59862-vul
/src/PcapPlusPlus
[ { "end_line": 273, "function_name": "getFirstTLVRecord", "start_line": 260, "target_file": "/src/PcapPlusPlus/Packet++/header/TLVData.h" } ]
Heap-buffer-overflow READ {*}
PcapPlusPlus
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 668505433 INFO: Loaded 1 modules (35869 inline 8-bit counters): 35869 [0xab28e8, 0xabb505), INFO: Loaded 1 PC tables (35869 PCs): 35869 [0xabb508,0xb476d8), /out/FuzzTarget: Running 1 inputs 1 time(s) each. Running: /tmp/poc =======================...
cpp
65974d73c33aaede1bf3c18a353ea2209d1912a0
https://github.com/seladb/PcapPlusPlus/commit/59bb2d12ec7e0b90b6fc4746da0a44f4dc64825b
null
arvo:60003
n132/arvo:60003-vul
/src/ndpi
[ { "end_line": 111, "function_name": "ndpi_search_line", "start_line": 38, "target_file": "/src/ndpi/src/lib/protocols/line.c" } ]
Heap-buffer-overflow READ 1
ndpi
asan
================================================================= ==13134==ERROR: AddressSanitizer: use-after-poison on address 0x7f2b94cff81d at pc 0x0000005d638a bp 0x7fff7b151e10 sp 0x7fff7b151e08 READ of size 1 at 0x7f2b94cff81d thread T0 SCARINESS: 22 (1-byte-read-use-after-poison) #0 0x5d6389 in ndpi_search_l...
c
3608ab01b61bde1b7ac88baa448fe37724a313db
https://github.com/ntop/nDPI/commit/46aab35a296bfe059e60ea7aa3dc75ca6c0b88a8
null
arvo:6007
n132/arvo:6007-vul
/src/openthread
[ { "end_line": 888, "function_name": "Leader::AddService", "start_line": 859, "target_file": "/src/openthread/src/core/thread/network_data_leader_ftd.cpp" } ]
Stack-buffer-overflow READ 1
openthread
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/ip6-send-fuzzer < INPUT_FILE or /out/ip6-send-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/ip6-send-...
cpp
cc8579fb3f99130f2ce2b1aaf5c1821218b821c0
https://github.com/openthread/openthread/commit/56bf6a79f773419d21e0426915c7b3a3951d1bdf
null
arvo:60070
n132/arvo:60070-vul
/src/ndpi
[ { "end_line": 125, "function_name": "thrift_set_method", "start_line": 115, "target_file": "/src/ndpi/src/lib/protocols/thrift.c" } ]
Heap-buffer-overflow WRITE {*}
ndpi
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_ndpi_reader_alloc_fail ================================================================= ==13115==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000000418 at pc 0x00000048af8d bp 0x7fff50a9f7b0 sp 0x7fff50a9ef70 WRITE of...
c
7ef80f6b78e882129f47bb9e09e67d53690cba2f
https://github.com/ntop/nDPI/commit/3a1600ff26d02a3440186a6e8355521086a7e11f
null
arvo:60116
n132/arvo:60116-vul
/src/harfbuzz
[ { "end_line": 69, "function_name": "add", "start_line": 52, "target_file": "/src/harfbuzz/src/hb-subset-cff1.cc" } ]
Use-of-uninitialized-value
harfbuzz
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1158855375 INFO: Loaded 1 modules (87784 inline 8-bit counters): 87784 [0x11fbd44, 0x121142c), INFO: Loaded 1 PC tables (87784 PCs): 87784 [0x1211430,0x13682b0), /out/hb-subset-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==837==WARNI...
cpp
dc1b172408ae02a64cac6edefd333d3651f7e92c
https://github.com/harfbuzz/harfbuzz/commit/86a550dc7e182a53eb950278b42d0243b7185f73
null
arvo:60253
n132/arvo:60253-vul
/src/libjpeg-turbo.2.0.x
[ { "end_line": 634, "function_name": "encode_one_block", "start_line": 564, "target_file": "/src/libjpeg-turbo.2.0.x/jchuff.c" } ]
Use-of-uninitialized-value
libjpeg-turbo.2.1.x
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1053430275 INFO: Loaded 1 modules (8852 inline 8-bit counters): 8852 [0x82948c, 0x82b720), INFO: Loaded 1 PC tables (8852 PCs): 8852 [0x7bbdb0,0x7de6f0), /out/transform_fuzzer_2_0_x: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==3416==WARNIN...
cpp
369b84a4eeb5714b0322d352b57135fd3e3433d2
https://github.com/libjpeg-turbo/libjpeg-turbo/commit/31a301389bc94b6cac513e315cca0c621f7e1684
The C baseline Huffman encoder in jchuff.c lacks two coefficient range checks, allowing out-of-range coefficients when transforming a specially-crafted malformed arithmetic-coded JPEG source image into a baseline Huffman-coded JPEG destination image with default Huffman tables. This can cause the variable r to equal 25...
arvo:60354
n132/arvo:60354-vul
/src/PcapPlusPlus
[ { "end_line": 273, "function_name": "getFirstTLVRecord", "start_line": 260, "target_file": "/src/PcapPlusPlus/Packet++/header/TLVData.h" } ]
Use-of-uninitialized-value
PcapPlusPlus
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1224632652 INFO: Loaded 1 modules (27194 inline 8-bit counters): 27194 [0xc083a8, 0xc0ede2), INFO: Loaded 1 PC tables (27194 PCs): 27194 [0xc0ede8,0xc79188), /out/FuzzTarget: Running 1 inputs 1 time(s) each. Running: /tmp/poc Uninitialized bytes in...
cpp
65974d73c33aaede1bf3c18a353ea2209d1912a0
https://github.com/seladb/PcapPlusPlus/commit/59bb2d12ec7e0b90b6fc4746da0a44f4dc64825b
null
arvo:60456
n132/arvo:60456-vul
/src/PcapPlusPlus
[ { "end_line": 273, "function_name": "getFirstTLVRecord", "start_line": 260, "target_file": "/src/PcapPlusPlus/Packet++/header/TLVData.h" } ]
Heap-buffer-overflow READ 2
PcapPlusPlus
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1527069857 INFO: Loaded 1 modules (35869 inline 8-bit counters): 35869 [0xab28e8, 0xabb505), INFO: Loaded 1 PC tables (35869 PCs): 35869 [0xabb508,0xb476d8), /out/FuzzTarget: Running 1 inputs 1 time(s) each. Running: /tmp/poc ======================...
cpp
65974d73c33aaede1bf3c18a353ea2209d1912a0
https://github.com/seladb/PcapPlusPlus/commit/59bb2d12ec7e0b90b6fc4746da0a44f4dc64825b
null
arvo:60532
n132/arvo:60532-vul
/src/binutils-gdb
[ { "end_line": 922, "function_name": "elf_object_p", "start_line": 515, "target_file": "/src/binutils-gdb/bfd/elfcode.h" } ]
Use-of-uninitialized-value
binutils-gdb
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2697736042 INFO: Loaded 1 modules (249072 inline 8-bit counters): 249072 [0x3976e68, 0x39b3b58), INFO: Loaded 1 PC tables (249072 PCs): 249072 [0x3291c38,0x365eb38), /out/fuzz_dwarf: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==83632==WARNI...
cpp
e726bad8af9a12dc7cbc5f148523fdf0a0b3cf5a
https://github.com/bminor/binutils-gdb/commit/22e90ac5af46c01ee4972cf04e835266862bbb35
An uninitialized memory access occurs in the function offset_from_vma in elf.c when _bfd_elf_get_dynamic_symbols is called from bfd_elf32_object_p in elfcode.h. The vulnerability is triggered when attempting to load dynamic symbols for a file with no section headers before all the program headers are swapped in, partic...
arvo:60557
n132/arvo:60557-vul
/src/ndpi
[ { "end_line": 361, "function_name": "ndpi_http_check_content", "start_line": 223, "target_file": "/src/ndpi/src/lib/protocols/http.c" } ]
Heap-buffer-overflow READ 1
ndpi
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_process_packet ================================================================= ==13304==ERROR: AddressSanitizer: negative-size-param: (size=-1) SCARINESS: 10 (negative-size-param) #0 0x489cae in __interceptor_strncpy /src/llvm-pr...
c
0c5a17accb509ff950829d50c2af0b031bcbe3a5
https://github.com/ntop/nDPI/commit/bd0fcb2e62e5fa1fb3f4342e605e15f1f4920efc
A heap-buffer-overflow vulnerability exists in the HTTP protocol handling code in src/lib/protocols/http.c, specifically in the ndpi_http_check_content, check_content_type_and_change_protocol, process_response, ndpi_check_http_tcp, and ndpi_search_http_tcp functions. The issue occurs due to an out-of-bounds read in str...
arvo:60605
n132/arvo:60605-vul
/src/ndpi
[ { "end_line": 364, "function_name": "ndpi_http_check_content", "start_line": 223, "target_file": "/src/ndpi/src/lib/protocols/http.c" } ]
Negative-size-param
ndpi
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3635496528 INFO: Loaded 1 modules (21014 inline 8-bit counters): 21014 [0x1105510, 0x110a726), INFO: Loaded 1 PC tables (21014 PCs): 21014 [0x110a728,0x115c888), /out/fuzz_ndpi_reader: Running 1 inputs 1 time(s) each. Running: /tmp/poc ============...
c
2bbde5bad3ca309141df7522da1b20bb0a506ec2
https://github.com/ntop/nDPI/commit/5267858b3d09fbc6a70c4bdcabdd176ea26ee72c
A memory access vulnerability exists in the HTTP protocol implementation in http.c, specifically in the ndpi_http_check_content function. The issue involves a negative-size parameter being passed to strncpy, leading to an AddressSanitizer error (negative-size-param: size=-1). This can result in invalid memory access du...
arvo:60616
n132/arvo:60616-vul
/src/opensc
[ { "end_line": 363, "function_name": "sc_pkcs15_decode_pukdf_entry", "start_line": 199, "target_file": "/src/opensc/src/libopensc/pkcs15-pubkey.c" } ]
Heap-double-free
opensc
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_decode ================================================================= ==42060==ERROR: AddressSanitizer: attempting double-free on 0x6060000000e0 in thread T0: SCARINESS: 42 (double-free) #0 0x4a10d2 in __interceptor_free ...
c
02b37bf38d5cfbe68088de647553c36e00b5b02e
https://github.com/OpenSC/OpenSC/commit/638a5007a5d240d6fa901aa822cfeef94fe36e85
A double-free vulnerability exists in pkcs15-pubkey.c, where memory is freed more than once, potentially leading to security issues.
arvo:60650
n132/arvo:60650-vul
/src/opensc
[ { "end_line": 752, "function_name": "cosm_create_key", "start_line": 705, "target_file": "/src/opensc/src/pkcs15init/pkcs15-oberthur.c" } ]
Heap-buffer-overflow READ 1
opensc
asan
Reading 110 bytes from /tmp/poc ================================================================= ==42074==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6150000025fe at pc 0x000000bb3390 bp 0x7ffe6ef81370 sp 0x7ffe6ef81368 READ of size 1 at 0x6150000025fe thread T0 SCARINESS: 12 (1-byte-read-heap-buffer-ov...
c
1634adab29757ecbb5b9b5635e0a66ef92fa56ce
https://github.com/OpenSC/OpenSC/commit/41d61da8481582e12710b5858f8b635e0a71ab5e
null
arvo:60670
n132/arvo:60670-vul
/src/selinux
[ { "end_line": 239, "function_name": "cil_resolve_classpermissionset", "start_line": 201, "target_file": "/src/selinux/libsepol/cil/src/cil_resolve_ast.c" } ]
Heap-use-after-free READ 8
selinux
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/secilc-fuzzer ================================================================= ==587==ERROR: AddressSanitizer: heap-use-after-free on address 0x6030000039b0 at pc 0x000000574f97 bp 0x7ffcb9a1af30 sp 0x7ffcb9a1af28 READ of size 8 at 0x60300...
c
9b7d560a4a8770377cdac233243b369c5916b642
https://github.com/SELinuxProject/selinux/commit/903e8cf26e2ab874618e0fdaef537bc3d9a8b69d
A vulnerability exists in libsepol/cil where an anonymous classpermission can be passed into a macro that uses a classpermissionset rule. When this occurs, there is no way to distinguish between the anonymous classpermission that needs to be destroyed and the classpermission in the classpermissionset rule, which is des...
arvo:60672
n132/arvo:60672-vul
/src/opensc
[ { "end_line": 381, "function_name": "setcos_create_key", "start_line": 323, "target_file": "/src/opensc/src/pkcs15init/pkcs15-setcos.c" } ]
Heap-buffer-overflow READ 1
opensc
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 539235604 INFO: Loaded 1 modules (42194 inline 8-bit counters): 42194 [0xf71670, 0xf7bb42), INFO: Loaded 1 PC tables (42194 PCs): 42194 [0xd97800,0xe3c520), /out/fuzz_pkcs15init: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==================...
c
ce7fcdaa35196706a83fe982900228e15464f928
https://github.com/OpenSC/OpenSC/commit/440ca666eff10cc7011901252d20f3fc4ea23651
A buffer underflow occurs in the setcos function.
arvo:60723
n132/arvo:60723-vul
/src/liblouis
[ { "end_line": 489, "function_name": "swapReplace", "start_line": 435, "target_file": "/src/liblouis/liblouis/lou_translateString.c" } ]
Negative-size-param
liblouis
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 231861375 INFO: Loaded 1 modules (6182 inline 8-bit counters): 6182 [0x67d5d0, 0x67edf6), INFO: Loaded 1 PC tables (6182 PCs): 6182 [0x67edf8,0x697058), /out/fuzz_translate_generic: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===============...
c
2e9409c1b4f32e2c752bf22686c8e752ffd868e2
https://github.com/liblouis/liblouis/commit/878ef436e6cf401e5134899d70d5a8c0815cd549
A security vulnerability exists where the size parameter passed to memcpy is not checked for negativity, potentially allowing negative values. This can lead to undefined behavior or security issues if memcpy is called with a negative size parameter.
arvo:60728
n132/arvo:60728-vul
/src/libraw
[ { "end_line": 433, "function_name": "LibRaw::xtrans_interpolate", "start_line": 25, "target_file": "/src/libraw/src/demosaic/xtrans_demosaic.cpp" } ]
Stack-buffer-overflow WRITE 4
libraw
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 352218031 INFO: Loaded 1 modules (21924 inline 8-bit counters): 21924 [0x93ac90, 0x940234), INFO: Loaded 1 PC tables (21924 PCs): 21924 [0x81af20,0x870960), /out/libraw_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc unknown file: data c...
cpp
eaf63bf5f7b98a607c2d3d0849827669c1b443ea
https://github.com/libraw/libraw/commit/3baa51068767ae2070c4661e00a3b77d5c3139b7
A vulnerability exists where invalid patterns in the xtrans_interpolate function are not properly skipped.
arvo:6091
n132/arvo:6091-vul
/src/imagemagick
[ { "end_line": 1826, "function_name": "FxGetSymbol", "start_line": 1242, "target_file": "/src/imagemagick/MagickCore/fx.c" } ]
Use-of-uninitialized-value
imagemagick
msan
INFO: Seed: 308977120 INFO: Loaded 1 modules (52651 inline 8-bit counters): 52651 [0x16dff38, 0x16ecce3), INFO: Loaded 1 PC tables (52651 PCs): 52651 [0x1343d70,0x1411820), /out/encoder_label_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Uninitialized bytes in __interceptor_strlen at offset 0 inside [0...
cpp
5f68b29b843b3c57f61b34e1db8f3144af458614
https://github.com/imagemagick/imagemagick/commit/5d3171ffa3c79bf1aee47bb9678ce04a4fc6e05a
null
arvo:6096
n132/arvo:6096-vul
/src/imagemagick
[ { "end_line": 2949, "function_name": "FxEvaluateSubexpression", "start_line": 2085, "target_file": "/src/imagemagick/MagickCore/fx.c" } ]
Stack-buffer-overflow WRITE 1
imagemagick
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/encoder_label_fuzzer < INPUT_FILE or /out/encoder_label_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out...
cpp
091f337c2f0d50420199df26be44f2d47df98fe3
https://github.com/imagemagick/imagemagick/commit/69c4513a4fb5f71421a21643edb53de53d3864a6
null
arvo:60971
n132/arvo:60971-vul
/src/opensc
[ { "end_line": 529, "function_name": "test_verify", "start_line": 460, "target_file": "/src/opensc/src/tests/fuzzing/fuzz_pkcs11.c" } ]
Heap-buffer-overflow READ {*}
opensc
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3011393249 INFO: Loaded 1 modules (47199 inline 8-bit counters): 47199 [0x108b050, 0x10968af), INFO: Loaded 1 PC tables (47199 PCs): 47199 [0xe7a3e0,0xf329d0), /out/fuzz_pkcs11: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===================...
c
04be2e6799cd33dcdad9d88df76493d5e80440b3
https://github.com/OpenSC/OpenSC/commit/ffbff25ec6c6d0ad3f8df76f57210698f7947fc3
The vulnerability in fuzz_pkcs11.c occurs when invalid data is used for the verify operation, which can lead to unexpected behavior or security issues.
arvo:60983
n132/arvo:60983-vul
/src/libraw
[ { "end_line": 53, "function_name": "LibRaw::sony_arq_load_raw", "start_line": 22, "target_file": "/src/libraw/src/decoders/decoders_libraw.cpp" } ]
Heap-buffer-overflow WRITE {*}
libraw
asan
Reading 61381 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/libraw_raf_fuzzer < INPUT_FILE or /out/libraw_raf_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this:...
cpp
47d9dd8e288e4638d52bc17afad400378ef6f371
https://github.com/libraw/libraw/commit/17294b5fd82bff80463c21386d3847142a37549d
A security vulnerability exists in the arq_load_raw function due to insufficient metadata validation.
arvo:61237
n132/arvo:61237-vul
/src/mupdf
[ { "end_line": 1347, "function_name": "fz_load_bmp_subimage_count", "start_line": 1306, "target_file": "/src/mupdf/source/fitz/load-bmp.c" } ]
Use-of-uninitialized-value
mupdf
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 213002324 INFO: Loaded 1 modules (160618 inline 8-bit counters): 160618 [0x4268c11, 0x428ff7b), INFO: Loaded 1 PC tables (160618 PCs): 160618 [0x1f2cdf0,0x21a0490), /out/pdf_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==300==WARNING:...
cpp
9975bc4e0403e71e6105efe2847a2b2ff956d682
https://github.com/ArtifexSoftware/mupdf/commit/6b113a67bd016538478b24dd585a3ab6c479a5ec
A vulnerability exists where the code prints a possibly invalid bitmap signature, which may result in the output of useless or malformed data.
arvo:61285
n132/arvo:61285-vul
/src/oss-fuzz-example
[ { "end_line": 115, "function_name": "parse_complex_format", "start_line": 75, "target_file": "/src/oss-fuzz-example/char_lib.c" } ]
Heap-buffer-overflow READ 1
oss-fuzz-example
asan
================================================================= ==134==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60b000000162 at pc 0x0000004dce72 bp 0x7ffdcd859860 sp 0x7ffdcd859858 READ of size 1 at 0x60b000000162 thread T0 SCARINESS: 12 (1-byte-read-heap-buffer-overflow) #0 0x4dce71 in get_the...
c
c5d2a988f0f66ff3a20519d9b389aeb563305485
https://github.com/AdaLogics/oss-fuzz-example/commit/61e234fde0dbc8fc03b3586ffe085654723acd33
null
arvo:61675
n132/arvo:61675-vul
/src/exiv2
[ { "end_line": 235, "function_name": "BmffImage::brotliUncompress", "start_line": 196, "target_file": "/src/exiv2/src/bmffimage.cpp" } ]
Container-overflow WRITE {*}
exiv2
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz-read-print-write ================================================================= ==5885==ERROR: AddressSanitizer: container-overflow on address 0x7f4057d3a802 at pc 0x00000047f5c1 bp 0x7ffd239c4420 sp 0x7ffd239c3be8 WRITE of size 655...
cpp
78642f786a35c79a4eeca695fc0f2b7c4e012ec1
https://github.com/Exiv2/exiv2/commit/a1f254358de167af9a619523ca7ba6492bd89959
An integer overflow occurs in the calculation of available_out.
arvo:61677
n132/arvo:61677-vul
/src/binutils-gdb
[ { "end_line": 1191, "function_name": "print_insn_kvx", "start_line": 1012, "target_file": "/src/binutils-gdb/opcodes/kvx-dis.c" } ]
Global-buffer-overflow READ 4
binutils-gdb
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3145618121 INFO: Loaded 1 modules (233489 inline 8-bit counters): 233489 [0x3834300, 0x386d311), INFO: Loaded 1 PC tables (233489 PCs): 233489 [0x29d4850,0x2d64960), /out/fuzz_disassemble: Running 1 inputs 1 time(s) each. Running: /tmp/poc ========...
c
476dd29dc60b6dc3aec0e29ce2150202cf85f7a8
https://github.com/bminor/binutils-gdb/commit/f1917fc63166d73a9d0930d96468e486a49c666d
A vulnerability exists in kvx_reassemble_bundle where an index 8 out of bounds error can occur due to improper loop conditions in opcodes/kvx-dis.c, specifically in the print_insn_kvx and decode_prologue_epilogue_bundle functions, where wordcount is not always less than KVXMAXBUNDLEWORDS.
arvo:61691
n132/arvo:61691-vul
/src/libxaac
[ { "end_line": 741, "function_name": "ixheaacd_cplx_anal_qmffilt", "start_line": 590, "target_file": "/src/libxaac/decoder/generic/ixheaacd_qmf_dec_generic.c" } ]
Use-of-uninitialized-value
libxaac
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2840636434 INFO: Loaded 1 modules (44721 inline 8-bit counters): 44721 [0xff8410, 0x10032c1), INFO: Loaded 1 PC tables (44721 PCs): 44721 [0xee38d0,0xf923e0), /out/xaac_dec_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==2093==WARNING:...
cpp
cd91e1af765486ea6aad21e258b3a23294fa291d
https://github.com/ittiam-systems/libxaac/commit/e3f38372d0e16b33369e0b56e116fedaf055936a
A use of uninitialized value vulnerability exists in the function ixheaacd_cos_sin_mod, where a local buffer in the complex analysis QMF filter block is not initialized, leading to uninitialized memory access.
arvo:61718
n132/arvo:61718-vul
/src/libheif
[ { "end_line": 1016, "function_name": "HeifContext::interpret_heif_file", "start_line": 534, "target_file": "/src/libheif/libheif/context.cc" } ]
Heap-buffer-overflow READ 4
libheif
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 926728692 INFO: Loaded 1 modules (24381 inline 8-bit counters): 24381 [0x8fbc50, 0x901b8d), INFO: Loaded 1 PC tables (24381 PCs): 24381 [0x901b90,0x960f60), /out/file_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ======================...
cpp
4a3327b5b73c94a26b2deed91d0cae82d53db24a
https://github.com/strukturag/libheif/commit/6c4016fd3d944a8903bdd3e6be8fcdd1bc73ca79
A vulnerability exists where invalid mask region image references are not detected.
arvo:6175
n132/arvo:6175-vul
/src/yara
[ { "end_line": 664, "function_name": "load_encoded_method", "start_line": 486, "target_file": "/src/yara/libyara/modules/dex.c" } ]
UNKNOWN READ
yara
msan
INFO: Seed: 955672617 INFO: Loaded 1 modules (6417 inline 8-bit counters): 6417 [0xada128, 0xadba39), INFO: Loaded 1 PC tables (6417 PCs): 6417 [0x858260,0x871370), /out/dex_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc MemorySanitizer:DEADLYSIGNAL ==34141==ERROR: MemorySanitizer: SEGV on unknown addre...
cpp
9a9c40efd5856a228663bc4a41873f5d34cc945b
https://github.com/VirusTotal/yara/commit/105054bc1bab9ac19ec9bdaa9163b8383fe72a07
null
arvo:61750
n132/arvo:61750-vul
/src/opensc
[ { "end_line": 328, "function_name": "idprime_process_containermap", "start_line": 268, "target_file": "/src/opensc/src/libopensc/card-idprime.c" } ]
Stack-buffer-overflow READ {*}
opensc
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1794849488 INFO: Loaded 1 modules (42973 inline 8-bit counters): 42973 [0xf98970, 0xfa314d), INFO: Loaded 1 PC tables (42973 PCs): 42973 [0xdb7340,0xe5f110), /out/fuzz_pkcs15_crypt: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===============...
c
78be048f478c40f49a970342261229ffa2c78817
https://github.com/OpenSC/OpenSC/commit/fa8ad362852dbefad5b6796c32f2a33859b8a8e0
A vulnerability exists in idprime where the container guid is not stored as a string.
arvo:61778
n132/arvo:61778-vul
/src/binutils-gdb
[ { "end_line": 1062, "function_name": "fill_comdat_hash", "start_line": 864, "target_file": "/src/binutils-gdb/bfd/coffcode.h" } ]
Heap-buffer-overflow READ {*}
binutils-gdb
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2805370777 INFO: Loaded 1 modules (252734 inline 8-bit counters): 252734 [0x3a6fba0, 0x3aad6de), INFO: Loaded 1 PC tables (252734 PCs): 252734 [0x2b6c4d0,0x2f478b0), /out/fuzz_dwarf: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==============...
cpp
9cadc5fa8d2ed0310f182b4524367635730d7f73
https://github.com/bminor/binutils-gdb/commit/398f1ddf5e89e066aeee242ea854dcbaa8eb9539
A vulnerability exists due to insufficient sanity checking of aux entries used by PE to extend a C_FILE name in coffswap.h:coff_swap_aux_in. The existing check only accounts for cases where n_numaux == 1, potentially allowing improper handling of other values. This affects the fill_comdat_hash function in coffcode.h.
arvo:61797
n132/arvo:61797-vul
/src/opensc
[ { "end_line": 257, "function_name": "iasecc_crt_parse", "start_line": 206, "target_file": "/src/opensc/src/libopensc/iasecc-sdo.c" } ]
Stack-buffer-overflow READ 1
opensc
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15init ================================================================= ==42053==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f49c46f11b0 at pc 0x0000008f5cd5 bp 0x7ffd3b7b10b0 sp 0x7ffd3b7b10a8 READ of size 1 at 0...
c
fa8ad362852dbefad5b6796c32f2a33859b8a8e0
https://github.com/OpenSC/OpenSC/commit/2a4921ab23fd0853f327517636c50de947548161
A vulnerability exists in the iasecc module where the length of data is not checked when parsing crt, potentially leading to security issues.
arvo:61800
n132/arvo:61800-vul
/src/librawspeed
[ { "end_line": 297, "function_name": "DngDecoder::parseColorMatrix", "start_line": 262, "target_file": "/src/librawspeed/src/librawspeed/decoders/DngDecoder.cpp" } ]
Heap-buffer-overflow READ 4
librawspeed
asan
================================================================= ==5073==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000090 at pc 0x000000512cd6 bp 0x7ffd762f3c80 sp 0x7ffd762f3c78 READ of size 4 at 0x603000000090 thread T0 SCARINESS: 17 (4-byte-read-heap-buffer-overflow) #0 0x512cd5 in rawspe...
cpp
8d37641f8a3d548f1ebb7deb9ee7a18b13f39d45
https://github.com/darktable-org/rawspeed/commit/b79d3f2ab9df07be675d262474a70f59eae55a66
null
arvo:61820
n132/arvo:61820-vul
/src/PcapPlusPlus
[ { "end_line": 118, "function_name": "assign", "start_line": 115, "target_file": "/src/PcapPlusPlus/Packet++/header/NflogLayer.h" } ]
Use-of-uninitialized-value
PcapPlusPlus
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1930782043 INFO: Loaded 1 modules (27421 inline 8-bit counters): 27421 [0xc0f888, 0xc163a5), INFO: Loaded 1 PC tables (27421 PCs): 27421 [0xc163a8,0xc81578), /out/FuzzTarget: Running 1 inputs 1 time(s) each. Running: /tmp/poc MemorySanitizer:DEADLY...
cpp
843765f594a3d0c494c2c64e5c2b786f02122ccc
https://github.com/seladb/PcapPlusPlus/commit/6986e81f6fa441a56c4effe2bf2f177ca892255e
null
arvo:61822
n132/arvo:61822-vul
/src/binutils-gdb
[ { "end_line": 1086, "function_name": "fill_comdat_hash", "start_line": 888, "target_file": "/src/binutils-gdb/bfd/coffcode.h" } ]
Stack-buffer-overflow WRITE {*}
binutils-gdb
asan
================================================================= ==79022==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fde7cb70328 at pc 0x00000049ef4c bp 0x7ffdd0b9e9f0 sp 0x7ffdd0b9e1c0 WRITE of size 640 at 0x7fde7cb70328 thread T0 SCARINESS: 60 (multi-byte-write-stack-buffer-overflow) #0 0x49ef4...
cpp
f5362c933e2280398d7aea3cc0748bec8f66a1ab
https://github.com/bminor/binutils-gdb/commit/54d57acf610e5db2e70afa234fd4018207606774
A memory leak occurs in comdat_hash due to a missed field that requires freeing. Additionally, a C_FILE symbol using multiple auxents for a long file name can overflow the single auxent buffer. In coffcode.h, the comdat_delf function does not free comdat_name, and fill_comdat_hash does not restrict processing to symbol...
arvo:61825
n132/arvo:61825-vul
/src/libxaac
[ { "end_line": 3287, "function_name": "iusace_process", "start_line": 2738, "target_file": "/src/libxaac/encoder/ixheaace_api.c" } ]
Heap-buffer-overflow READ 1
libxaac
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2601008757 INFO: Loaded 1 modules (23407 inline 8-bit counters): 23407 [0x87882f0, 0x878de5f), INFO: Loaded 1 PC tables (23407 PCs): 23407 [0x86dc294,0x8709e0c), /out/xaac_enc_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =============...
cpp
5285d1921d3a1d002eb07b2269f18ebeb64d4136
https://github.com/ittiam-systems/libxaac/commit/cd91e1af765486ea6aad21e258b3a23294fa291d
A heap-buffer-overflow occurs in the function ixheaace_process due to not considering the bits used by the SBR encoder for USAC mono streams.
arvo:61882
n132/arvo:61882-vul
/src/ndpi
[ { "end_line": 3422, "function_name": "ndpi_match_custom_category", "start_line": 3395, "target_file": "/src/ndpi/src/lib/ndpi_main.c" }, { "end_line": 3609, "function_name": "ndpi_exit_detection_module", "start_line": 3484, "target_file": "/src/ndpi/src/lib/ndpi_main.c" } ]
Heap-buffer-overflow READ 2
ndpi
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1110124534 INFO: Loaded 1 modules (26368 inline 8-bit counters): 26368 [0xbb12a8, 0xbb79a8), INFO: Loaded 1 PC tables (26368 PCs): 26368 [0xbb79a8,0xc1e9a8), /out/fuzz_process_packet: Running 1 inputs 1 time(s) each. Running: /tmp/poc =============...
c
16b0ce37100242b6cbaafe65d05ee4940b5aab3f
https://github.com/ntop/nDPI/commit/19381f330ae735d361d9e765148be5e14478256d
null
arvo:61901
n132/arvo:61901-vul
/src/libredwg
[ { "end_line": 218, "function_name": "LLVMFuzzerTestOneInput", "start_line": 68, "target_file": "/src/libredwg/examples/llvmfuzz.c" } ]
Heap-buffer-overflow READ 1
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1906578877 INFO: Loaded 1 modules (644963 inline 8-bit counters): 644963 [0x52bfee0, 0x535d643), INFO: Loaded 1 PC tables (644963 PCs): 644963 [0x463dd98,0x50153c8), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
c
5ec283f560643e4aa19ede6f025e7bb9247cabda
https://github.com/LibreDWG/libredwg/commit/b01634c896c29bb3a778daeef9e13ef115995610
null
arvo:61902
n132/arvo:61902-vul
/src/libxaac
[ { "end_line": 1705, "function_name": "iusace_estimate_scfs_chan", "start_line": 1550, "target_file": "/src/libxaac/encoder/ixheaace_fd_qc_adjthr.c" } ]
Global-buffer-overflow READ 4
libxaac
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/xaac_enc_fuzzer ================================================================= ==2090==ERROR: AddressSanitizer: global-buffer-overflow on address 0x0000008d9868 at pc 0x0000006c0b36 bp 0x7fff63882df0 sp 0x7fff63882de8 READ of size 4 at 0...
cpp
1ac90c8ac361ea0ff0dd796017534e00658638e6
https://github.com/ittiam-systems/libxaac/commit/112fe0d0dba0531cf540eaeefc21397982ad47da
A global buffer overflow vulnerability exists in the function iusace_estimate_scfs_chan, triggered when the value of the scalefactor band form factor becomes zero. This leads to a runtime error due to reading beyond the buffer boundary.
arvo:61998
n132/arvo:61998-vul
/src/libxaac
[ { "end_line": 1707, "function_name": "iusace_estimate_scfs_chan", "start_line": 1551, "target_file": "/src/libxaac/encoder/ixheaace_fd_qc_adjthr.c" } ]
Global-buffer-overflow READ 4
libxaac
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2554465745 INFO: Loaded 1 modules (23411 inline 8-bit counters): 23411 [0xb06a40, 0xb0c5b3), INFO: Loaded 1 PC tables (23411 PCs): 23411 [0xa4b060,0xaa6790), /out/xaac_enc_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =================...
cpp
58acdb87a1485393925277efb630d536ac3be8fe
https://github.com/ittiam-systems/libxaac/commit/62c8372f6b2506bf96f962f09497f88491d0d96e
A global buffer overflow vulnerability exists in the function iusace_estimate_scfs_chan, where a runtime error occurs if the value of the scalefactor band form factor becomes zero. This issue affects USAC and is also present in AAC, due to missing bound checks for the gain value.
arvo:62033
n132/arvo:62033-vul
/src/serenity
[ { "end_line": 321, "function_name": "decode_bmhd_chunk", "start_line": 295, "target_file": "/src/serenity/Userland/Libraries/LibGfx/ImageFormats/ILBMLoader.cpp" } ]
Heap-buffer-overflow READ {*}
serenity
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1575056391 INFO: Loaded 1 modules (53268 inline 8-bit counters): 53268 [0xe42fa0, 0xe4ffb4), INFO: Loaded 1 PC tables (53268 PCs): 53268 [0xe4ffb8,0xf200f8), /out/FuzzILBMLoader: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==================...
cpp
f2b7224d93da1fd70729da18a96fa37e5dfa6bd5
https://github.com/SerenityOS/serenity/commit/9e3ee0e2b589ec8b28b27a72232a76e5d57e294b
A buffer overrun occurs in LibGfx/ILBM when reading the header chunk.
arvo:6214
n132/arvo:6214-vul
/src/imagemagick
[ { "end_line": 1638, "function_name": "GetEXIFProperty", "start_line": 823, "target_file": "/src/imagemagick/MagickCore/property.c" } ]
Use-of-uninitialized-value
imagemagick
msan
INFO: Seed: 99666836 INFO: Loaded 1 modules (52766 inline 8-bit counters): 52766 [0x16eab78, 0x16f7996), INFO: Loaded 1 PC tables (52766 PCs): 52766 [0x13468a0,0x1414a80), /out/encoder_mpc_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==62790==WARNING: MemorySanitizer: use-of-uninitialized-value #0...
cpp
a35998ba55eb17d9811b4aa2169978329ac87dc6
https://github.com/imagemagick/imagemagick/commit/48eca15747e47be25b244c6a2b572e5f0ebd0d15
null
arvo:62183
n132/arvo:62183-vul
/src/libxaac
[ { "end_line": 297, "function_name": "impd_drc_enc_init", "start_line": 230, "target_file": "/src/libxaac/encoder/drc_src/impd_drc_api.c" }, { "end_line": 513, "function_name": "impd_drc_stft_drc_gain_calc_init", "start_line": 324, "target_file": "/src/libxaac/encoder/drc_src/impd...
Heap-buffer-overflow READ 1
libxaac
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2319600890 INFO: Loaded 1 modules (23437 inline 8-bit counters): 23437 [0xb07a40, 0xb0d5cd), INFO: Loaded 1 PC tables (23437 PCs): 23437 [0xa4c060,0xaa7930), /out/xaac_enc_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =================...
cpp
f39922ae991f3fdd66da1e02d2fdebe6619ae28e
https://github.com/ittiam-systems/libxaac/commit/ccdced7d6a30828a9988616f199cea014150175d
A divide-by-zero vulnerability exists in the function impd_drc_stft_drc_gain_calc_init, which occurs when the DRC gain coordinates are identical or the slope is perpendicular to the gain value. This can lead to a runtime error.
arvo:62222
n132/arvo:62222-vul
/src/ndpi
[ { "end_line": 527, "function_name": "binary_fuse16_allocate", "start_line": 501, "target_file": "/src/ndpi/src/lib/third_party/include/binaryfusefilter.h" } ]
Use-of-uninitialized-value
ndpi
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1830623459 INFO: Loaded 1 modules (29381 inline 8-bit counters): 29381 [0xac5a72, 0xaccd37), INFO: Loaded 1 PC tables (29381 PCs): 29381 [0xaccd38,0xb3f988), /out/fuzz_ndpi_reader: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==13473==WARNING...
c
805df2e5ceebf9252248ac4514d47ba8756c4042
https://github.com/ntop/nDPI/commit/2b883b93be5feef26469fb07ca126b7c13b2fd21
null
arvo:62290
n132/arvo:62290-vul
/src/libavc
[ { "end_line": 203, "function_name": "isvcd_interlyr_motion_mode_pred", "start_line": 104, "target_file": "/src/libavc/decoder/svc/isvcd_process_epslice.c" } ]
Null-dereference READ
libavc
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/svc_dec_fuzzer AddressSanitizer:DEADLYSIGNAL ================================================================= ==3315==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000000000000 bp 0x7ffe35ff0410 sp 0x7ffe35ff0158 T0...
cpp
37beb9729249a1cde472545e2a19d80660e40edc
https://github.com/ittiam-systems/libavc/commit/82f4e69094b7d6e4200d14ba64ac9937f337710d
A vulnerability exists in the inter-layer prediction functions of svcdec where NULL dereferencing can occur due to improper tracking of resolution level initialization.
arvo:62313
n132/arvo:62313-vul
/src/serenity
[ { "end_line": 725, "function_name": "Lexer::reduce_start", "start_line": 529, "target_file": "/src/serenity/Userland/Shell/PosixLexer.cpp" } ]
Stack-buffer-overflow WRITE {*}
serenity
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 419639594 INFO: Loaded 1 modules (77724 inline 8-bit counters): 77724 [0xff1270, 0x100420c), INFO: Loaded 1 PC tables (77724 PCs): 77724 [0x1004210,0x1133bd0), /out/FuzzShellPosix: Running 1 inputs 1 time(s) each. Running: /tmp/poc VERIFICATION FAI...
cpp
21ea9cedff4f945a691950900b7f3b99c08b9e3a
https://github.com/SerenityOS/serenity/commit/9e978c6cd1bf3b2692e44f246b904927b4982d03
null
arvo:62375
n132/arvo:62375-vul
/src/WasmEdge
[ { "end_line": 148, "function_name": "SharedLibrary::load", "start_line": 79, "target_file": "/src/WasmEdge/lib/loader/shared_library.cpp" } ]
Segv on unknown address
WasmEdge
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 134574151 INFO: Loaded 2 modules (57394 inline 8-bit counters): 57393 [0x7f4c7f65fbe0, 0x7f4c7f66dc11), 1 [0x3f44d0, 0x3f44d1), INFO: Loaded 2 PC tables (57394 PCs): 57393 [0x7f4c7f66dc18,0x7f4c7f74df28), 1 [0x3f44d8,0x3f44e8), /out/wasmedge-fuzzto...
cpp
e63e8ee0ed40d25504ab90934bdca50de9295f59
https://github.com/WasmEdge/WasmEdge/commit/7d4213b3abd5360c88e9120c3bc68ffd9b8a6870
null
arvo:62388
n132/arvo:62388-vul
/src/libxaac
[ { "end_line": 1096, "function_name": "impd_drc_set_preselection", "start_line": 686, "target_file": "/src/libxaac/decoder/drc_src/impd_drc_selection_process_drcset_selection.c" } ]
Use-of-uninitialized-value
libxaac
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1804295156 INFO: Loaded 1 modules (45236 inline 8-bit counters): 45236 [0x1009410, 0x10144c4), INFO: Loaded 1 PC tables (45236 PCs): 45236 [0xef28e0,0xfa3420), /out/xaac_dec_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==2093==WARNING...
cpp
d5356896efdec2f38750bb24da0f95919cf2c5bb
https://github.com/ittiam-systems/libxaac/commit/5b0bee231b0a1e5ce0e87b2681147fb35bc5518a
A use-of-uninitialized-value vulnerability exists in the function impd_drc_set_preselection, where one of the buffers is not initialized correctly, leading to a runtime error.
arvo:62389
n132/arvo:62389-vul
/src/mongoose
[ { "end_line": 2217, "function_name": "getchunk", "start_line": 2206, "target_file": "/src/mongoose/mongoose.c" } ]
Negative-size-param
mongoose
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2872651130 INFO: Loaded 1 modules (4203 inline 8-bit counters): 4203 [0x65a260, 0x65b2cb), INFO: Loaded 1 PC tables (4203 PCs): 4203 [0x5fdeb0,0x60e560), /out/fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================...
c
9055a83b4fd1eac5ae88b7189ff7f8e95b91553f
https://github.com/cesanta/mongoose/commit/d1204e8a66437b9c7a665d2da878c1bbf52f7f93
null
arvo:62435
n132/arvo:62435-vul
/src/lldpd
[ { "end_line": 54, "function_name": "LLVMFuzzerTestOneInput", "start_line": 26, "target_file": "/src/lldpd/tests/fuzz_edp.c" } ]
Use-of-uninitialized-value
lldpd
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2160388719 INFO: Loaded 1 modules (7662 inline 8-bit counters): 7662 [0x558939617549, 0x558939619337), INFO: Loaded 1 PC tables (7662 PCs): 7662 [0x558939619338,0x558939637218), /out/fuzz_edp: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==24...
c
83f0eddcfb7fb1d0a825136e3929f8847cd85a62
https://github.com/lldpd/lldpd/commit/145d654803ffcfb4ccbf28b692465194fb538dda
null
arvo:62561
n132/arvo:62561-vul
/src/libredwg
[ { "end_line": 12261, "function_name": "dxf_entities_read", "start_line": 12172, "target_file": "/src/libredwg/src/in_dxf.c" } ]
Heap-double-free
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1157169671 INFO: Loaded 1 modules (639114 inline 8-bit counters): 639114 [0x522ec60, 0x52cacea), INFO: Loaded 1 PC tables (639114 PCs): 639114 [0x45c3958,0x4f841f8), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
c
6d082fd0b2c6c33914cbdc943370b9a0a5dd3ef0
https://github.com/LibreDWG/libredwg/commit/37bbf357cec24cd90df2ba3b5c105baa66c6b9ea
null
arvo:62609
n132/arvo:62609-vul
/src/mongoose
[ { "end_line": 2217, "function_name": "getchunk", "start_line": 2206, "target_file": "/src/mongoose/mongoose.c" } ]
UNKNOWN READ
mongoose
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3593610208 INFO: Loaded 1 modules (5756 inline 8-bit counters): 5756 [0x5aa3a8, 0x5aba24), INFO: Loaded 1 PC tables (5756 PCs): 5756 [0x549be0,0x5603a0), /out/fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSanitizer:DEADL...
c
9055a83b4fd1eac5ae88b7189ff7f8e95b91553f
https://github.com/cesanta/mongoose/commit/d1204e8a66437b9c7a665d2da878c1bbf52f7f93
null
arvo:62613
n132/arvo:62613-vul
/src/opensc
[ { "end_line": 752, "function_name": "cosm_create_key", "start_line": 705, "target_file": "/src/opensc/src/pkcs15init/pkcs15-oberthur.c" } ]
Heap-buffer-overflow READ 1
opensc
asan
Reading 110 bytes from /tmp/poc ================================================================= ==42075==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6150000025fe at pc 0x000000bb3390 bp 0x7ffe16a7e150 sp 0x7ffe16a7e148 READ of size 1 at 0x6150000025fe thread T0 SCARINESS: 12 (1-byte-read-heap-buffer-ov...
c
1634adab29757ecbb5b9b5635e0a66ef92fa56ce
https://github.com/OpenSC/OpenSC/commit/41d61da8481582e12710b5858f8b635e0a71ab5e
null
arvo:62707
n132/arvo:62707-vul
/src/libxaac
[ { "end_line": 202, "function_name": "ixheaacd_parse_extension_config", "start_line": 74, "target_file": "/src/libxaac/decoder/ixheaacd_mps_bitdec.c" } ]
Index-out-of-bounds
libxaac
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4112695653 INFO: Loaded 1 modules (72776 inline 8-bit counters): 72776 [0xab23d0, 0xac4018), INFO: Loaded 1 PC tables (72776 PCs): 72776 [0x8ac280,0x9c8700), /out/xaac_dec_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc /src/libxaac/deco...
cpp
11669841e31d156074f4ae5bab2a44033fb92153
https://github.com/ittiam-systems/libxaac/commit/3c8329953cd596b4f5b2163910be223fb6a52e3c
An index-out-of-bounds runtime error occurs in the function ixheaacd_res_ctns_apply when the value of the residual sampling frequency index exceeds the maximum residual sampling frequency index.
arvo:62822
n132/arvo:62822-vul
/src/mruby
[ { "end_line": 947, "function_name": "unpack_bstr", "start_line": 917, "target_file": "/src/mruby/mrbgems/mruby-pack/src/pack.c" } ]
Heap-buffer-overflow READ 1
mruby
asan
================================================================= ==2372==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62f00000c420 at pc 0x0000006a03d2 bp 0x7ffd06c0b210 sp 0x7ffd06c0b208 READ of size 1 at 0x62f00000c420 thread T0 SCARINESS: 12 (1-byte-read-heap-buffer-overflow) #0 0x6a03d1 in unpack...
c
861f8bdfa9fe06eda6cf1257658a1aff03ee47df
https://github.com/mruby/mruby/commit/097681b4d458899dff945138ea39ae125df3e16a
The unpack "b/B" functions in mruby-pack do not limit the result size.
arvo:62837
n132/arvo:62837-vul
/src/libxml2
[ { "end_line": 8869, "function_name": "xmlParseQNameHashed", "start_line": 8828, "target_file": "/src/libxml2/parser.c" } ]
Use-of-uninitialized-value
libxml2
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2087219996 INFO: Loaded 1 modules (39374 inline 8-bit counters): 39374 [0xb22437, 0xb2be05), INFO: Loaded 1 PC tables (39374 PCs): 39374 [0xa263c8,0xac00a8), /out/xslt: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==18105==WARNING: MemorySani...
c
6dd87f5eefe42b8771d0f1b26d9ea5bd077ddaa3
https://gitlab.gnome.org/GNOME/libxml2/-/commit/fc49679316e067d667b71b8e0b987f0b704abce6
null
arvo:62855
n132/arvo:62855-vul
/src/libxml2
[ { "end_line": 8869, "function_name": "xmlParseQNameHashed", "start_line": 8828, "target_file": "/src/libxml2/parser.c" } ]
Use-of-uninitialized-value
libxml2
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2523058485 INFO: Loaded 1 modules (51668 inline 8-bit counters): 51668 [0xce79c7, 0xcf439b), INFO: Loaded 1 PC tables (51668 PCs): 51668 [0xbaf370,0xc790b0), /out/valid: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==10583==WARNING: MemorySan...
c
6dd87f5eefe42b8771d0f1b26d9ea5bd077ddaa3
https://gitlab.gnome.org/GNOME/libxml2/-/commit/fc49679316e067d667b71b8e0b987f0b704abce6
null
arvo:62859
n132/arvo:62859-vul
/src/libxml2
[ { "end_line": 8869, "function_name": "xmlParseQNameHashed", "start_line": 8828, "target_file": "/src/libxml2/parser.c" } ]
Use-of-uninitialized-value
libxml2
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2481286142 INFO: Loaded 1 modules (51668 inline 8-bit counters): 51668 [0xce79c7, 0xcf439b), INFO: Loaded 1 PC tables (51668 PCs): 51668 [0xbaf370,0xc790b0), /out/valid: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==10583==WARNING: MemorySan...
c
6dd87f5eefe42b8771d0f1b26d9ea5bd077ddaa3
https://gitlab.gnome.org/GNOME/libxml2/-/commit/fc49679316e067d667b71b8e0b987f0b704abce6
null
arvo:62954
n132/arvo:62954-vul
/src/libxml2
[ { "end_line": 8869, "function_name": "xmlParseQNameHashed", "start_line": 8828, "target_file": "/src/libxml2/parser.c" } ]
Use-of-uninitialized-value
libxml2
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 657155371 INFO: Loaded 1 modules (39374 inline 8-bit counters): 39374 [0xb22437, 0xb2be05), INFO: Loaded 1 PC tables (39374 PCs): 39374 [0xa263c8,0xac00a8), /out/xslt: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==18106==WARNING: MemorySanit...
c
6dd87f5eefe42b8771d0f1b26d9ea5bd077ddaa3
https://gitlab.gnome.org/GNOME/libxml2/-/commit/fc49679316e067d667b71b8e0b987f0b704abce6
null
arvo:62996
n132/arvo:62996-vul
/src/libxml2
[ { "end_line": 13097, "function_name": "xmlParseBalancedChunkMemoryInternal", "start_line": 12902, "target_file": "/src/libxml2/parser.c" } ]
Heap-use-after-free READ 4
libxml2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1881577773 INFO: Loaded 1 modules (51632 inline 8-bit counters): 51632 [0x8735f90, 0x8742940), INFO: Loaded 1 PC tables (51632 PCs): 51632 [0x8628b9c,0x868d91c), /out/xml: Running 1 inputs 1 time(s) each. Running: /tmp/poc =========================...
c
b8e03e13ed2441ef98538b75a80da816c5511028
https://gitlab.gnome.org/GNOME/libxml2/-/commit/97e99f411228fe4f65ebb60e4f2c56f9ee9cdb1c
Entities that reference out-of-scope namespaces in xmlParseBalancedChunkMemoryInternal are broken, as the function attempts to reuse currently in-scope namespaces, but these namespaces are ignored by the SAX handler. Different namespaces may be in scope when expanding the entity again, leading to inconsistent behavior....
arvo:63034
n132/arvo:63034-vul
/src/glog
[ { "end_line": 625, "function_name": "ParseNumber", "start_line": 589, "target_file": "/src/glog/src/demangle.cc" } ]
UNKNOWN READ
glog
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1063491032 INFO: Loaded 1 modules (1149 inline 8-bit counters): 1149 [0x6b3a38, 0x6b3eb5), INFO: Loaded 1 PC tables (1149 PCs): 1149 [0x6b3eb8,0x6b8688), /out/fuzz_demangle: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:DEADLY...
cpp
27bf2b2fd396dae160b0449224bc227eb3edbc31
https://github.com/google/glog/commit/7ba2f7bc02cdbab9314f3804c698ec78e20c441e
null
arvo:63051
n132/arvo:63051-vul
/src/mongoose
[ { "end_line": 2829, "function_name": "skip_chunk", "start_line": 2817, "target_file": "/src/mongoose/mongoose.c" } ]
UNKNOWN READ
mongoose
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2552118746 INFO: Loaded 1 modules (4330 inline 8-bit counters): 4330 [0x65f2e0, 0x6603ca), INFO: Loaded 1 PC tables (4330 PCs): 4330 [0x602130,0x612fd0), /out/fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:DEADLYSIGNAL ==...
c
3965aecfd473cbd70027b636492bb19b615eadd4
https://github.com/cesanta/mongoose/commit/744df7b2443032e9d342055da12c634150b17c29
null
arvo:63057
n132/arvo:63057-vul
/src/libredwg
[ { "end_line": 1333, "function_name": "json_HEADER", "start_line": 1147, "target_file": "/src/libredwg/src/in_json.c" } ]
Heap-buffer-overflow WRITE 2
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4124881322 INFO: Loaded 1 modules (645227 inline 8-bit counters): 645227 [0x52c3260, 0x5360acb), INFO: Loaded 1 PC tables (645227 PCs): 645227 [0x463f378,0x5017a28), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
c
90532ce047dfe7008ee1bc722a06ddb19b8e3016
https://github.com/LibreDWG/libredwg/commit/f522359c08d49e0f1a059ad6cc8566ddeb7a37ed
The vulnerability occurs in injson where the code does not fail when an array is provided but a primitive is expected. This can lead to incorrect parsing or processing of JSON input.
arvo:63079
n132/arvo:63079-vul
/src/libxml2
[ { "end_line": 5188, "function_name": "xmlParseComment", "start_line": 5026, "target_file": "/src/libxml2/parser.c" } ]
Use-of-uninitialized-value
libxml2
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 271681743 INFO: Loaded 1 modules (39339 inline 8-bit counters): 39339 [0xb223d7, 0xb2bd82), INFO: Loaded 1 PC tables (39339 PCs): 39339 [0xa263c8,0xabfe78), /out/xslt: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==18106==WARNING: MemorySanit...
c
36374bc9fcf6e670dc9521ac032474066521858b
https://gitlab.gnome.org/GNOME/libxml2/-/commit/4fc5340ec55a12cd6819395030d5d132a219984a
null
arvo:63082
n132/arvo:63082-vul
/src/libxml2
[ { "end_line": 5188, "function_name": "xmlParseComment", "start_line": 5026, "target_file": "/src/libxml2/parser.c" } ]
Heap-buffer-overflow WRITE 1
libxml2
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/xslt ================================================================= ==18140==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000c94 at pc 0x0000005c54b7 bp 0x7ffe2947f190 sp 0x7ffe2947f188 WRITE of size 1 at 0x602000000c...
c
36374bc9fcf6e670dc9521ac032474066521858b
https://gitlab.gnome.org/GNOME/libxml2/-/commit/4fc5340ec55a12cd6819395030d5d132a219984a
null
arvo:63084
n132/arvo:63084-vul
/src/libxml2
[ { "end_line": 5188, "function_name": "xmlParseComment", "start_line": 5026, "target_file": "/src/libxml2/parser.c" } ]
Use-of-uninitialized-value
libxml2
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2518958948 INFO: Loaded 1 modules (51625 inline 8-bit counters): 51625 [0xce5939, 0xcf22e2), INFO: Loaded 1 PC tables (51625 PCs): 51625 [0xbae370,0xc77e00), /out/schema: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==10582==WARNING: MemorySa...
c
36374bc9fcf6e670dc9521ac032474066521858b
https://gitlab.gnome.org/GNOME/libxml2/-/commit/4fc5340ec55a12cd6819395030d5d132a219984a
null
arvo:63086
n132/arvo:63086-vul
/src/libxml2
[ { "end_line": 5188, "function_name": "xmlParseComment", "start_line": 5026, "target_file": "/src/libxml2/parser.c" } ]
Heap-buffer-overflow WRITE 1
libxml2
asan
Running LLVMFuzzerInitialize ... continue... ================================================================= ==10599==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000134 at pc 0x0000005612dc bp 0x7ffca0479240 sp 0x7ffca0479238 WRITE of size 1 at 0x602000000134 thread T0 SCARINESS: 31 (1-byte-write...
c
36374bc9fcf6e670dc9521ac032474066521858b
https://gitlab.gnome.org/GNOME/libxml2/-/commit/4fc5340ec55a12cd6819395030d5d132a219984a
null
arvo:63124
n132/arvo:63124-vul
/src/libxml2
[ { "end_line": 5188, "function_name": "xmlParseComment", "start_line": 5026, "target_file": "/src/libxml2/parser.c" } ]
Heap-buffer-overflow WRITE 1
libxml2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2291526736 INFO: Loaded 1 modules (39460 inline 8-bit counters): 39460 [0x996030, 0x99fa54), INFO: Loaded 1 PC tables (39460 PCs): 39460 [0x85f470,0x8f96b0), /out/xslt: Running 1 inputs 1 time(s) each. Running: /tmp/poc ============================...
c
36374bc9fcf6e670dc9521ac032474066521858b
https://gitlab.gnome.org/GNOME/libxml2/-/commit/4fc5340ec55a12cd6819395030d5d132a219984a
null
arvo:63127
n132/arvo:63127-vul
/src/libxml2
[ { "end_line": 5188, "function_name": "xmlParseComment", "start_line": 5026, "target_file": "/src/libxml2/parser.c" } ]
Heap-buffer-overflow WRITE 1
libxml2
asan
Running LLVMFuzzerInitialize ... continue... ================================================================= ==10597==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000934 at pc 0x000000511ba8 bp 0x7ffc60357b70 sp 0x7ffc60357b68 WRITE of size 1 at 0x602000000934 thread T0 SCARINESS: 31 (1-byte-write...
c
36374bc9fcf6e670dc9521ac032474066521858b
https://gitlab.gnome.org/GNOME/libxml2/-/commit/4fc5340ec55a12cd6819395030d5d132a219984a
null
arvo:63137
n132/arvo:63137-vul
/src/libredwg
[ { "end_line": 218, "function_name": "LLVMFuzzerTestOneInput", "start_line": 68, "target_file": "/src/libredwg/examples/llvmfuzz.c" } ]
Heap-buffer-overflow READ 1
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3156628203 INFO: Loaded 1 modules (644963 inline 8-bit counters): 644963 [0x52bfee0, 0x535d643), INFO: Loaded 1 PC tables (644963 PCs): 644963 [0x463dd98,0x50153c8), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
c
5ec283f560643e4aa19ede6f025e7bb9247cabda
https://github.com/LibreDWG/libredwg/commit/b01634c896c29bb3a778daeef9e13ef115995610
null
arvo:63157
n132/arvo:63157-vul
/src/libxml2
[ { "end_line": 1060, "function_name": "xmlBufDump", "start_line": 463, "target_file": "/src/libxml2/buf.c" }, { "end_line": 1030, "function_name": "xmlBufResetInput", "start_line": 1018, "target_file": "/src/libxml2/buf.c" } ]
Heap-use-after-free READ 1
libxml2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3890507033 INFO: Loaded 1 modules (51594 inline 8-bit counters): 51594 [0xabf270, 0xacbbfa), INFO: Loaded 1 PC tables (51594 PCs): 51594 [0x94b2b0,0xa14b50), /out/xml: Running 1 inputs 1 time(s) each. Running: /tmp/poc =============================...
c
514ab399550a9bfcd4a5eb60e921d06a1d38af9e
https://gitlab.gnome.org/GNOME/libxml2/-/commit/fef12ed81619c79729bf66a906701308a02d6b2b
A vulnerability exists in buf where input is not reset in error cases, potentially leading to dangling pointers if memory allocation fails. This can cause a use-after-free due to recent changes.
arvo:63179
n132/arvo:63179-vul
/src/ndpi
[ { "end_line": 1527, "function_name": "ndpi_serialize_string_int32", "start_line": 1491, "target_file": "/src/ndpi/src/lib/ndpi_serializer.c" } ]
Heap-buffer-overflow WRITE 11
ndpi
asan
================================================================= ==14166==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000001330 at pc 0x0000004402ee bp 0x7ffd5e9b55b0 sp 0x7ffd5e9b4d50 WRITE of size 11 at 0x619000001330 thread T0 SCARINESS: 45 (multi-byte-write-heap-buffer-overflow) #0 0x4402ed i...
cpp
304747f1fac02038c64dca004a80768db43eeb65
https://github.com/ntop/nDPI/commit/30fc89e556e5c09bf62b9548862cc3d924b9ec81
A buffer overflow exists in the serialization process.
arvo:63186
n132/arvo:63186-vul
/src/bind9
[ { "end_line": 2007, "function_name": "add_link", "start_line": 1997, "target_file": "/src/bind9/lib/dns/qp.c" } ]
Index-out-of-bounds
bind9
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1944377542 INFO: Loaded 1 modules (95767 inline 8-bit counters): 95767 [0xda6ca8, 0xdbe2bf), INFO: Loaded 1 PC tables (95767 PCs): 95767 [0xdbe2c0,0xf34430), /out/dns_message_checksig_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc qp.c:...
c
a87436d3d5dfb63b770e2de2a89c281da5774225
https://gitlab.isc.org/isc-projects/bind9.git3a206da456723cc38a8a27e1edde1e48da33489a
A vulnerability exists where the chain length is not checked to be nonzero before examining the last entry in add_link(). It is possible to reach add_link() without visiting an intermediate node first, and the check for a duplicate entry can then cause a crash.
arvo:63357
n132/arvo:63357-vul
/src/serenity
[ { "end_line": 940, "function_name": "decode_bmp_dib", "start_line": 810, "target_file": "/src/serenity/Userland/Libraries/LibGfx/ImageFormats/BMPLoader.cpp" } ]
Heap-buffer-overflow READ 1
serenity
asan
================================================================= ==65656==ERROR: AddressSanitizer: use-after-poison on address 0x7f86e9aff83f at pc 0x000000827c59 bp 0x7ffc70a44110 sp 0x7ffc70a44108 READ of size 1 at 0x7f86e9aff83f thread T0 SCARINESS: 22 (1-byte-read-use-after-poison) #0 0x827c58 in Gfx::InputStr...
cpp
4e0a9267374314a777d40bb11ff445958268ceec
https://github.com/SerenityOS/serenity/commit/8ec26f3b549c338ccbaf3e16889863efcf5143a2
A vulnerability exists in LibGfx/BMPLoader where the header size is not accounted for when checking DIB bounds.
arvo:63537
n132/arvo:63537-vul
/src/libredwg
[ { "end_line": 12335, "function_name": "dxf_objects_read", "start_line": 12292, "target_file": "/src/libredwg/src/in_dxf.c" } ]
Heap-double-free
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3570571834 INFO: Loaded 1 modules (644833 inline 8-bit counters): 644833 [0x52bcee0, 0x535a5c1), INFO: Loaded 1 PC tables (644833 PCs): 644833 [0x463abd8,0x50119e8), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
c
8027830aac4625a96b70b645fbbb4ccb625f781e
https://github.com/LibreDWG/libredwg/commit/9801c8580ecabfd5770f927e5d71b0d1d184a55c
A double-free vulnerability exists in the dxfname function in indxf, similar to the issue in dxf_entities_read.
arvo:63564
n132/arvo:63564-vul
/src/libxaac
[ { "end_line": 208, "function_name": "ixheaacd_parse_extension_config", "start_line": 76, "target_file": "/src/libxaac/decoder/ixheaacd_mps_bitdec.c" } ]
Index-out-of-bounds
libxaac
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3494565501 INFO: Loaded 1 modules (72788 inline 8-bit counters): 72788 [0xab3370, 0xac4fc4), INFO: Loaded 1 PC tables (72788 PCs): 72788 [0x8ad270,0x9c97b0), /out/xaac_dec_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc /src/libxaac/deco...
cpp
947ad9f32b9378a637b6f3cf733fa80eb3f5dc90
https://github.com/ittiam-systems/libxaac/commit/60b65345813bfd0c07f9646e4924ec18e15aa8a9
An index-out-of-bounds runtime error occurs in the function ixheaacd_smooth_m1m2 when the value of arbitrary downmix residual bands is greater than or equal to the number of parameter bands.
arvo:63587
n132/arvo:63587-vul
/src/opensc
[ { "end_line": 388, "function_name": "iasecc_parse_size", "start_line": 371, "target_file": "/src/opensc/src/libopensc/iasecc-sdo.c" } ]
Heap-buffer-overflow READ 1
opensc
asan
Reading 82 bytes from /tmp/poc ================================================================= ==42077==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000531 at pc 0x0000008fc844 bp 0x7ffcd06314e0 sp 0x7ffcd06314d8 READ of size 1 at 0x602000000531 thread T0 SCARINESS: 12 (1-byte-read-heap-buffer-ove...
c
12e01b8e3a263efa3f55c67a433ebfb711479dbb
https://github.com/OpenSC/OpenSC/commit/fbda61d0d276dc98b9d1d1e6810bbd21d19e3859
A buffer overflow occurs in the iasecc component when processing invalid data.
arvo:63754
n132/arvo:63754-vul
/src/ndpi
[ { "end_line": 4174, "function_name": "ndpi_add_ip_risk_mask", "start_line": 4134, "target_file": "/src/ndpi/src/lib/ndpi_main.c" } ]
Use-of-uninitialized-value
ndpi
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1763427911 INFO: Loaded 1 modules (20614 inline 8-bit counters): 20614 [0xa4ca22, 0xa51aa8), INFO: Loaded 1 PC tables (20614 PCs): 20614 [0xa51aa8,0xaa2308), /out/fuzz_filecfg_protocols: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==14471==W...
c
50006516b3816a67f264728455b3a295f79bcac6
https://github.com/ntop/nDPI/commit/cd59485f7e2b99889f279b0dff7daca857079fa3
A use-of-uninitialized-value vulnerability exists in the ndpi_patricia_lookup function in ndpi_patricia.c, which is called from add_to_ptree, ndpi_add_ip_risk_mask, ndpi_handle_rule, and ndpi_load_protocols_file_fd in ndpi_main.c. This issue occurs due to a missing check in custom rules, leading to the use of uninitial...
arvo:63777
n132/arvo:63777-vul
/src/serenity
[ { "end_line": 570, "function_name": "Font::try_load_from_offset", "start_line": 385, "target_file": "/src/serenity/Userland/Libraries/LibGfx/Font/OpenType/Font.cpp" } ]
Heap-buffer-overflow READ 1
serenity
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3140190546 INFO: Loaded 1 modules (53129 inline 8-bit counters): 53129 [0xe468c0, 0xe53849), INFO: Loaded 1 PC tables (53129 PCs): 53129 [0xe53850,0xf230e0), /out/FuzzTTF: Running 1 inputs 1 time(s) each. Running: /tmp/poc =========================...
cpp
49d21619d45fc194af162fa1654cf5bdc5ed7a8e
https://github.com/SerenityOS/serenity/commit/a6f9ad60124c4dd355084240019abc1e7d62baba
LibGfx/OpenType allows offsets that are equal to the file size, which causes a crash. Offsets are not strictly checked to be less than the file size.
arvo:63885
n132/arvo:63885-vul
/src/WasmEdge
[ { "end_line": 51, "function_name": "FuzzTool", "start_line": 14, "target_file": "/src/WasmEdge/lib/driver/fuzzTool.cpp" } ]
Segv on unknown address
WasmEdge
asan
AddressSanitizer:DEADLYSIGNAL ================================================================= ==7627==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x7facfe8e354c bp 0x7ffc8d9a0670 sp 0x7ffc8d9a0610 T0) ==7627==The signal is caused by a READ memory access. ==7627==Hint: this fault was caused by a dereference o...
cpp
fa8103ad6c471d7d584958dd77fa0fd44aa5de0e
https://github.com/WasmEdge/WasmEdge/commit/9ba5f8faeacc35ea41033a4e384bef9cc18e9f5c
null
arvo:63949
n132/arvo:63949-vul
/src/opensc
[ { "end_line": 71, "function_name": "iasecc_parse_acls", "start_line": 42, "target_file": "/src/opensc/src/libopensc/iasecc-sdo.c" } ]
Heap-buffer-overflow READ 1
opensc
asan
================================================================= ==42075==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000514 at pc 0x0000008aa992 bp 0x7ffe78fc0c00 sp 0x7ffe78fc0bf8 READ of size 1 at 0x602000000514 thread T0 SCARINESS: 12 (1-byte-read-heap-buffer-overflow) #0 0x8aa991 in iasec...
c
d9a73533c2ddf89a2056619185216d5035fd4d91
https://github.com/OpenSC/OpenSC/commit/8fc2c20c3f895569eeb58328bb882aec07325d3b
null
arvo:63972
n132/arvo:63972-vul
/src/lcms
[ { "end_line": 1159, "function_name": "CheckOne", "start_line": 1146, "target_file": "/src/lcms/src/cmsvirt.c" } ]
Index-out-of-bounds
lcms
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 433332054 INFO: Loaded 1 modules (11057 inline 8-bit counters): 11057 [0x6081d8, 0x60ad09), INFO: Loaded 1 PC tables (11057 PCs): 11057 [0x580ef0,0x5ac200), /out/cms_virtual_profile_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc cmsvirt...
c
fef7796becfa273a6b5a36697812148db05e4859
https://github.com/mm2/Little-CMS/commit/6491e2e722c893b258e07565da9e0a1233321bcb
null
arvo:64079
n132/arvo:64079-vul
/src/serenity
[ { "end_line": 737, "function_name": "MultiLocalizedUnicodeTagData::from_bytes", "start_line": 673, "target_file": "/src/serenity/Userland/Libraries/LibGfx/ICC/TagTypes.cpp" } ]
UNKNOWN READ
serenity
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2037740357 INFO: Loaded 1 modules (20869 inline 8-bit counters): 20869 [0x474f28, 0x47a0ad), INFO: Loaded 1 PC tables (20869 PCs): 20869 [0x47a0b0,0x4cb900), /out/FuzzICCProfile: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorS...
cpp
f9068c7f2e72f2aefbdb464caaa2e7ea15dc16cd
https://github.com/SerenityOS/serenity/commit/10624a2beb3b5e185cf10e6d11877555e84979ed
A vulnerability exists in LibGfx/ICC where a `MultiLocalizedUnicodeTagData` object with incorrect length or offset fields can cause a buffer overflow during creation.
arvo:64110
n132/arvo:64110-vul
/src/PcapPlusPlus
[ { "end_line": 345, "function_name": "IPv4Layer::parseNextLayer", "start_line": 240, "target_file": "/src/PcapPlusPlus/Packet++/src/IPv4Layer.cpp" } ]
Heap-buffer-overflow WRITE 2
PcapPlusPlus
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2289862487 INFO: Loaded 1 modules (37620 inline 8-bit counters): 37620 [0xae3ea8, 0xaed19c), INFO: Loaded 1 PC tables (37620 PCs): 37620 [0xaed1a0,0xb800e0), /out/FuzzTarget: Running 1 inputs 1 time(s) each. Running: /tmp/poc Read 0 packets success...
cpp
98143666674d8d50ffed878d8d91c48c9567706c
https://github.com/seladb/PcapPlusPlus/commit/a0ecc6dad71f445c95936697c7ee15997d5761b2
null
arvo:64117
n132/arvo:64117-vul
/src/PcapPlusPlus
[ { "end_line": 478, "function_name": "light_get_next_packet", "start_line": 377, "target_file": "/src/PcapPlusPlus/3rdParty/LightPcapNg/LightPcapNg/src/light_pcapng_ext.c" } ]
UNKNOWN READ
PcapPlusPlus
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2795982395 INFO: Loaded 1 modules (11605 inline 8-bit counters): 11605 [0x93fcf8, 0x942a4d), INFO: Loaded 1 PC tables (11605 PCs): 11605 [0x942a50,0x96ffa0), /out/FuzzWriterNg: Running 1 inputs 1 time(s) each. Running: /tmp/poc MemorySanitizer:DEAD...
cpp
8240a53dcdd216d0bfd938c2aefbe5a99430b94f
https://github.com/seladb/PcapPlusPlus/commit/1ff377c5de22caf9907fcc31f3f71ea138346155
null
arvo:64124
n132/arvo:64124-vul
/src/PcapPlusPlus
[ { "end_line": 1414, "function_name": "SSLClientHelloMessage::getCipherSuiteID", "start_line": 1396, "target_file": "/src/PcapPlusPlus/Packet++/src/SSLHandshake.cpp" } ]
Heap-buffer-overflow READ 2
PcapPlusPlus
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1394614891 INFO: Loaded 1 modules (37620 inline 8-bit counters): 37620 [0xae3ea8, 0xaed19c), INFO: Loaded 1 PC tables (37620 PCs): 37620 [0xaed1a0,0xb800e0), /out/FuzzTarget: Running 1 inputs 1 time(s) each. Running: /tmp/poc Read 0 packets success...
cpp
641232e657ea712d8a94b9816b2fa97f388edb5c
https://github.com/seladb/PcapPlusPlus/commit/98143666674d8d50ffed878d8d91c48c9567706c
null
arvo:64127
n132/arvo:64127-vul
/src/PcapPlusPlus
[ { "end_line": 647, "function_name": "SomeIpSdLayer::isDataValid", "start_line": 634, "target_file": "/src/PcapPlusPlus/Packet++/src/SomeIpSdLayer.cpp" } ]
Heap-buffer-overflow READ 4
PcapPlusPlus
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3204569634 INFO: Loaded 1 modules (37636 inline 8-bit counters): 37636 [0xae3ea8, 0xaed1ac), INFO: Loaded 1 PC tables (37636 PCs): 37636 [0xaed1b0,0xb801f0), /out/FuzzTarget: Running 1 inputs 1 time(s) each. Running: /tmp/poc Read 0 packets success...
cpp
5f1895a7b496fa78a2927bd5fe610ab619a3f49b
https://github.com/seladb/PcapPlusPlus/commit/6a5cb61eba4f082f7dcd4e87031520102e1babdf
null
arvo:64165
n132/arvo:64165-vul
/src/serenity
[ { "end_line": 80, "function_name": "Cmap::subtable", "start_line": 65, "target_file": "/src/serenity/Userland/Libraries/LibGfx/Font/OpenType/Cmap.cpp" } ]
Heap-buffer-overflow READ 1
serenity
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1922627486 INFO: Loaded 1 modules (55552 inline 8-bit counters): 55552 [0xe8f4f0, 0xe9cdf0), INFO: Loaded 1 PC tables (55552 PCs): 55552 [0xe9cdf0,0xf75df0), /out/FuzzTTF: Running 1 inputs 1 time(s) each. Running: /tmp/poc =========================...
cpp
10757b7787c69776a0f8a23818fd61a4877f52ee
https://github.com/SerenityOS/serenity/commit/e1b438bb1ab2e49a7a472a71efa5e2d32c4829e6
LibGfx does not properly ensure that the Cmap subtable offset is within the expected range. The previous check only verifies that the first byte of the EncodingRecord offset is within range, but the actual read is 4 bytes wide, which can lead to out-of-bounds access.
arvo:64166
n132/arvo:64166-vul
/src/lcms
[ { "end_line": 1377, "function_name": "WriteOutputLUT", "start_line": 1265, "target_file": "/src/lcms/src/cmsps2.c" } ]
Heap-buffer-overflow READ 4
lcms
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 43447606 INFO: Loaded 1 modules (8147 inline 8-bit counters): 8147 [0x835e7f0, 0x83607c3), INFO: Loaded 1 PC tables (8147 PCs): 8147 [0x82da5e8,0x82ea480), /out/cms_postscript_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =============...
c
dbb4a1a4fbb4fe3708155cfa15947ccd2c3d290b
https://github.com/mm2/Little-CMS/commit/1176e61afea4b58c5f92c6f226cdb7b1c76797d5
A vulnerability exists where wrong parameters on CRD creation are not detected, potentially allowing invalid or malicious input to be processed.
arvo:64181
n132/arvo:64181-vul
/src/opensc
[ { "end_line": 308, "function_name": "setcos_new_file", "start_line": 254, "target_file": "/src/opensc/src/pkcs15init/pkcs15-setcos.c" } ]
Invalid-free
opensc
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15init ================================================================= ==42058==ERROR: AddressSanitizer: attempting free on address which was not malloc()-ed: 0x000001000002 in thread T0 SCARINESS: 40 (bad-free) #0 0x4a10d2 i...
c
9d1662d95b5c525f12be358760c26516ac8f7998
https://github.com/OpenSC/OpenSC/commit/4013a807492568bf9907cfb3df41f130ac83c7b9
The setcos function in setcos.c writes beyond the end of the fixed 16-byte path->value buffer when attempting to append 2 more bytes. This buffer overrun writes into the ACL block and causes a crash during cleanup.
arvo:64290
n132/arvo:64290-vul
/src/wireshark
[ { "end_line": 1777, "function_name": "dissect_zcl_read_attr_struct", "start_line": 1747, "target_file": "/src/wireshark/epan/dissectors/packet-zbee-zcl.c" } ]
Global-buffer-overflow READ 4
wireshark
asan
oss-fuzzshark: disabling: udp oss-fuzzshark: disabling: udplite oss-fuzzshark: disabling: ospf oss-fuzzshark: disabling: bgp oss-fuzzshark: disabling: dhcp oss-fuzzshark: disabling: json oss-fuzzshark: disabling: snort oss-fuzzshark: configured for dissector: ip INFO: Running with entropic power schedule (0xFF, 100). I...
c
3e86238f7e6d7ab1829efb305b9098bf86deb808
https://github.com/wireshark/wireshark/commit/a9b0dc0aa7e5d6e0ddc8ee4010106fc2a44dc8d9
null
arvo:64363
n132/arvo:64363-vul
/src/wireshark
[ { "end_line": 1777, "function_name": "dissect_zcl_read_attr_struct", "start_line": 1747, "target_file": "/src/wireshark/epan/dissectors/packet-zbee-zcl.c" } ]
Global-buffer-overflow READ 4
wireshark
asan
oss-fuzzshark: disabling: ip oss-fuzzshark: disabling: udplite oss-fuzzshark: disabling: ospf oss-fuzzshark: disabling: bgp oss-fuzzshark: disabling: dhcp oss-fuzzshark: disabling: json oss-fuzzshark: disabling: snort oss-fuzzshark: configured for dissector: udp in table: ip.proto Accepting input from '/tmp/poc' Usage ...
c
3e86238f7e6d7ab1829efb305b9098bf86deb808
https://github.com/wireshark/wireshark/commit/a9b0dc0aa7e5d6e0ddc8ee4010106fc2a44dc8d9
null
arvo:64425
n132/arvo:64425-vul
/src/PcapPlusPlus
[ { "end_line": 106, "function_name": "SipLayer::parseNextLayer", "start_line": 84, "target_file": "/src/PcapPlusPlus/Packet++/src/SipLayer.cpp" } ]
UNKNOWN READ
PcapPlusPlus
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3619248014 INFO: Loaded 1 modules (29586 inline 8-bit counters): 29586 [0xc6d318, 0xc746aa), INFO: Loaded 1 PC tables (29586 PCs): 29586 [0xc746b0,0xce7fd0), /out/FuzzTarget: Running 1 inputs 1 time(s) each. Running: /tmp/poc Read 0 packets success...
cpp
c47c819e3ad013265961562e9e9f3844c5dfaa19
https://github.com/seladb/PcapPlusPlus/commit/983869a36685728a93e68f523c722ec930fb89f8
null
arvo:64431
n132/arvo:64431-vul
/src/libavc
[ { "end_line": 1620, "function_name": "isvcd_parse_sps", "start_line": 1078, "target_file": "/src/libavc/decoder/svc/isvcd_parse_headers.c" } ]
Heap-buffer-overflow WRITE 1
libavc
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2879014107 INFO: Loaded 1 modules (16794 inline 8-bit counters): 16794 [0x8a4150, 0x8a82ea), INFO: Loaded 1 PC tables (16794 PCs): 16794 [0x807228,0x848bc8), /out/svc_dec_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==================...
cpp
0d29250b990430ca0d7346459c11ca053380bbb5
https://github.com/ittiam-systems/libavc/commit/28727baf58aa7c8983769aff1ceecb3121a26ee6
null
arvo:64522
n132/arvo:64522-vul
/src/opensc
[ { "end_line": 63, "function_name": "asn1_decode_des_params", "start_line": 42, "target_file": "/src/opensc/src/libopensc/pkcs15-algo.c" } ]
Stack-buffer-overflow READ 8
opensc
asan
================================================================= ==42076==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f01a9773fb0 at pc 0x0000005e303e bp 0x7ffe51a14880 sp 0x7ffe51a14878 READ of size 8 at 0x7f01a9773fb0 thread T0 SCARINESS: 38 (8-byte-read-stack-buffer-overflow) #0 0x5e303d in asn...
c
6d1fcd9cf82c6501089898066656fbe6737f3ced
https://github.com/OpenSC/OpenSC/commit/2fb0d735b433a7d5618865be5280e41e78362b5e
A stack buffer overflow occurs in the pkcs15 module while parsing the DES initialization vector (iv).
arvo:6457
n132/arvo:6457-vul
/src/imagemagick
[ { "end_line": 1173, "function_name": "WritePCDImage", "start_line": 1084, "target_file": "/src/imagemagick/coders/pcd.c" } ]
Bad-free
imagemagick
asan
INFO: Seed: 255370699 INFO: Loaded 1 modules (53124 inline 8-bit counters): 53124 [0x1279aa8, 0x1286a2c), INFO: Loaded 1 PC tables (53124 PCs): 53124 [0xded4f0,0xebcd30), /out/encoder_pcd_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Magick: delegate library support not built-in 'none' (Freetype) @ war...
cpp
69c4513a4fb5f71421a21643edb53de53d3864a6
https://github.com/imagemagick/imagemagick/commit/4cd61940efb573150303c73c2be4079133da042f
null
arvo:64570
n132/arvo:64570-vul
/src/wolfmqtt
[ { "end_line": 855, "function_name": "MqttDecode_ConnectAck", "start_line": 801, "target_file": "/src/wolfmqtt/src/mqtt_packet.c" } ]
UNKNOWN READ
wolfmqtt
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 778291487 INFO: Loaded 1 modules (22717 inline 8-bit counters): 22717 [0x85d918, 0x8631d5), INFO: Loaded 1 PC tables (22717 PCs): 22717 [0x78fa20,0x7e85f0), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:D...
cpp
ebe65ad7fd87769eb3431a7dcef77813be9e4bd8
https://github.com/wolfSSL/wolfMQTT/commit/96c69d875b91fba9ac501f1376144bf662644252
null
arvo:64579
n132/arvo:64579-vul
/src/php-src
[ { "end_line": 3966, "function_name": "_zend_update_type_info", "start_line": 2524, "target_file": "/src/php-src/Zend/Optimizer/zend_inference.c" } ]
Heap-use-after-free READ 4
php-src
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1531525013 INFO: Loaded 2 modules (177533 inline 8-bit counters): 142915 [0x1b63e40, 0x1b86c83), 34618 [0x7f4226063670, 0x7f422606bdaa), INFO: Loaded 2 PC tables (177533 PCs): 142915 [0x1b86c88,0x1db50b8), 34618 [0x7f422606bdb0,0x7f42260f3150), /ou...
cpp
9a69bb2d582ed127fb2a82273e9f9b9d6d6e4612
https://github.com/php/php-src/commit/1e55c9760178f9d5e1de8b251537b3e8ccf44feb
null
arvo:64638
n132/arvo:64638-vul
/src/radare2
[ { "end_line": 327, "function_name": "r_bin_xcoff_init_ldsyms", "start_line": 302, "target_file": "/src/radare2/libr/bin/format/coff/coff.c" } ]
Heap-buffer-overflow READ 4
radare2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1415283906 INFO: Loaded 1 modules (264187 inline 8-bit counters): 264187 [0x2d3a280, 0x2d7aa7b), INFO: Loaded 1 PC tables (264187 PCs): 264187 [0x2d7aa80,0x3182a30), /out/ia_fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc =================...
cpp
4d3ff5ff214123d692582a48b0e3a4f04a96f08c
https://github.com/radareorg/radare2/commit/bb40f2ac075e5605970f159f5438dc001a92f9f3
null