task_id
stringlengths 8
10
| docker_image
stringlengths 17
19
| basedir
stringclasses 157
values | target_functions
listlengths 1
3
| crash_type
stringclasses 85
values | project_name
stringclasses 157
values | sanitizer
stringclasses 3
values | sanitizer_output
stringlengths 1.13k
6.5M
| language
stringclasses 2
values | vuln_commit
stringlengths 40
40
| fix
stringlengths 69
110
| vulnerability_description
stringlengths 38
824
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
arvo:8968
|
n132/arvo:8968-vul
|
/src/freetype2
|
[
{
"end_line": 229,
"function_name": "tt_face_load_cpal",
"start_line": 75,
"target_file": "/src/freetype2/src/sfnt/ttcpal.c"
}
] |
Heap-buffer-overflow READ 1
|
freetype2
|
asan
|
INFO: Seed: 566716906
INFO: Loaded 1 modules (19031 inline 8-bit counters): 19031 [0xb43c60, 0xb486b7),
INFO: Loaded 1 PC tables (19031 PCs): 19031 [0x874c50,0x8bf1c0),
/out/ftfuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==7867==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62100000a1f0 at pc 0x00000065dca1 bp 0x7ffcf98fae70 sp 0x7ffcf98fae68
READ of size 1 at 0x62100000a1f0 thread T0
SCARINESS: 22 (1-byte-read-heap-buffer-overflow-far-from-bounds)
#0 0x65dca0 in tt_face_load_cpal /src/freetype2/src/sfnt/ttcpal.c:133:28
#1 0x6528b6 in sfnt_load_face /src/freetype2/src/sfnt/sfobjs.c:1347:7
#2 0x67f42d in tt_face_init /src/freetype2/src/truetype/ttobjs.c:666:13
#3 0x5a7029 in open_face /src/freetype2/src/base/ftobjs.c:1375:15
#4 0x58e168 in ft_open_face_internal /src/freetype2/src/base/ftobjs.c:2447:19
#5 0x58f229 in FT_New_Memory_Face /src/freetype2/src/base/ftobjs.c:1465:12
#6 0x52e0d9 in LLVMFuzzerTestOneInput /src/freetype2/./src/tools/ftfuzzer/ftfuzzer.cc:313:16
#7 0x71d59c in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:526:13
#8 0x6f474a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
#9 0x6ffbd1 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9
#10 0x6f3dec in main /src/libfuzzer/FuzzerMain.cpp:20:10
#11 0x7fe9cd99183f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#12 0x41cff8 in _start (/out/ftfuzzer+0x41cff8)
DEDUP_TOKEN: tt_face_load_cpal--sfnt_load_face--tt_face_init
Address 0x62100000a1f0 is a wild pointer.
SUMMARY: AddressSanitizer: heap-buffer-overflow /src/freetype2/src/sfnt/ttcpal.c:133:28 in tt_face_load_cpal
Shadow bytes around the buggy address:
0x0c427fff93e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c427fff93f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c427fff9400: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c427fff9410: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c427fff9420: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x0c427fff9430: fa fa fa fa fa fa fa fa fa fa fa fa fa fa[fa]fa
0x0c427fff9440: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c427fff9450: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c427fff9460: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c427fff9470: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c427fff9480: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==7867==ABORTING
|
cpp
|
7915fd51f123d0adbe6a0b9ad19eb941e1733c87
|
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a6b77ba2b39e379cd9295a9376fedf574a6ba15f
|
A heap buffer overflow exists in the `tt_face_load_cpal` function in `src/sfnt/ttcpal.c` due to insufficient guarding of CPAL version 1 offsets.
|
arvo:9070
|
n132/arvo:9070-vul
|
/src/freetype2
|
[
{
"end_line": 3393,
"function_name": "tt_face_vary_cvt",
"start_line": 3089,
"target_file": "/src/freetype2/src/truetype/ttgxvar.c"
}
] |
Bad-free
|
freetype2
|
asan
|
INFO: Seed: 3073846597
INFO: Loaded 1 modules (19072 inline 8-bit counters): 19072 [0xad0ed8, 0xad5958),
INFO: Loaded 1 PC tables (19072 PCs): 19072 [0x80d6b0,0x857eb0),
/out/ftfuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==7818==ERROR: AddressSanitizer: attempting free on address which was not malloc()-ed: 0x0c0e000000b4 in thread T0
SCARINESS: 40 (bad-free)
#0 0x4eabd8 in __interceptor_cfree.localalias.1 /src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:109
#1 0x69cc6f in tt_face_vary_cvt /src/freetype2/src/truetype/ttgxvar.c:3382:5
#2 0x69aaae in tt_set_mm_blend /src/freetype2/src/truetype/ttgxvar.c:2601:17
#3 0x698800 in TT_Set_Var_Design /src/freetype2/src/truetype/ttgxvar.c:2877:13
#4 0x5d71b1 in FT_Set_Var_Design_Coordinates /src/freetype2/src/base/ftmm.c:224:17
#5 0x52f47c in setIntermediateAxis(FT_FaceRec_*) /src/freetype2/./src/tools/ftfuzzer/ftfuzzer.cc:230:10
#6 0x52e429 in LLVMFuzzerTestOneInput /src/freetype2/./src/tools/ftfuzzer/ftfuzzer.cc:389:13
#7 0x701d18 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:526:13
#8 0x6f4a84 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
#9 0x6f8907 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9
#10 0x6f47a0 in main /src/libfuzzer/FuzzerMain.cpp:20:10
#11 0x7f929ecb083f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#12 0x41cf18 in _start (/out/ftfuzzer+0x41cf18)
DEDUP_TOKEN: __interceptor_cfree.localalias.1--tt_face_vary_cvt--tt_set_mm_blend
Address 0x0c0e000000b4 is located in the high shadow area.
SUMMARY: AddressSanitizer: bad-free /src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:109 in __interceptor_cfree.localalias.1
==7818==ABORTING
|
cpp
|
a632fb547e23fe129a579fabf60a992fd7d98d02
|
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=589d1f0899343b18c3181f35451550dc1b904bef
| null |
arvo:9079
|
n132/arvo:9079-vul
|
/src/freetype2
|
[
{
"end_line": 3393,
"function_name": "tt_face_vary_cvt",
"start_line": 3089,
"target_file": "/src/freetype2/src/truetype/ttgxvar.c"
}
] |
UNKNOWN READ
|
freetype2
|
ubsan
|
INFO: Seed: 959164486
INFO: Loaded 1 modules (19295 inline 8-bit counters): 19295 [0x8a08b8, 0x8a5417),
INFO: Loaded 1 PC tables (19295 PCs): 19295 [0x5efc70,0x63b260),
/out/ftfuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitizer:DEADLYSIGNAL
==7854==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x0000000015ac (pc 0x7f06691de562 bp 0x7ffc052fc920 sp 0x7ffc052fc7f0 T7854)
==7854==The signal is caused by a READ memory access.
#0 0x7f06691de561 in cfree (/lib/x86_64-linux-gnu/libc.so.6+0x84561)
#1 0x4de6e2 in tt_face_vary_cvt /src/freetype2/src/truetype/ttgxvar.c:3382:5
#2 0x4ddb0c in tt_set_mm_blend /src/freetype2/src/truetype/ttgxvar.c:2601:17
#3 0x4dcbf6 in TT_Set_Var_Design /src/freetype2/src/truetype/ttgxvar.c:2877:13
#4 0x4825de in FT_Set_Var_Design_Coordinates /src/freetype2/src/base/ftmm.c:224:17
#5 0x430eef in setIntermediateAxis(FT_FaceRec_*) /src/freetype2/./src/tools/ftfuzzer/ftfuzzer.cc:230:10
#6 0x43077f in LLVMFuzzerTestOneInput /src/freetype2/./src/tools/ftfuzzer/ftfuzzer.cc:389:13
#7 0x510d68 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:526:13
#8 0x503ad4 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
#9 0x507957 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9
#10 0x5037f0 in main /src/libfuzzer/FuzzerMain.cpp:20:10
#11 0x7f066917a83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#12 0x406318 in _start (/out/ftfuzzer+0x406318)
DEDUP_TOKEN: cfree--tt_face_vary_cvt--tt_set_mm_blend
UndefinedBehaviorSanitizer can not provide additional info.
SUMMARY: UndefinedBehaviorSanitizer: SEGV (/lib/x86_64-linux-gnu/libc.so.6+0x84561) in cfree
==7854==ABORTING
|
cpp
|
a632fb547e23fe129a579fabf60a992fd7d98d02
|
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=589d1f0899343b18c3181f35451550dc1b904bef
| null |
arvo:9084
|
n132/arvo:9084-vul
|
/src/freetype2
|
[
{
"end_line": 3393,
"function_name": "tt_face_vary_cvt",
"start_line": 3089,
"target_file": "/src/freetype2/src/truetype/ttgxvar.c"
}
] |
UNKNOWN READ
|
freetype2
|
ubsan
|
INFO: Seed: 2421415247
INFO: Loaded 1 modules (19295 inline 8-bit counters): 19295 [0x8a08b8, 0x8a5417),
INFO: Loaded 1 PC tables (19295 PCs): 19295 [0x5efc70,0x63b260),
/out/ftfuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitizer:DEADLYSIGNAL
==7838==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x00000000140c (pc 0x0000004ecf1f bp 0x7ffe45230f90 sp 0x7ffe45230df8 T7838)
==7838==The signal is caused by a READ memory access.
#0 0x4ecf1e in TT_Load_Glyph_Header /src/freetype2/src/truetype/ttgload.c:307:26
#1 0x4e4180 in load_truetype_glyph /src/freetype2/src/truetype/ttgload.c:1631:15
#2 0x4e2fd2 in TT_Load_Glyph /src/freetype2/src/truetype/ttgload.c:2839:13
#3 0x45ae64 in FT_Load_Glyph /src/freetype2/src/base/ftobjs.c:907:15
#4 0x4307c4 in LLVMFuzzerTestOneInput /src/freetype2/./src/tools/ftfuzzer/ftfuzzer.cc:396:18
#5 0x510d68 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:526:13
#6 0x503ad4 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
#7 0x507957 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9
#8 0x5037f0 in main /src/libfuzzer/FuzzerMain.cpp:20:10
#9 0x7f7810a0983f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#10 0x406318 in _start (/out/ftfuzzer+0x406318)
DEDUP_TOKEN: TT_Load_Glyph_Header--load_truetype_glyph--TT_Load_Glyph
UndefinedBehaviorSanitizer can not provide additional info.
SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/freetype2/src/truetype/ttgload.c:307:26 in TT_Load_Glyph_Header
==7838==ABORTING
|
cpp
|
a632fb547e23fe129a579fabf60a992fd7d98d02
|
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=589d1f0899343b18c3181f35451550dc1b904bef
| null |
arvo:9124
|
n132/arvo:9124-vul
|
/src/aom
|
[
{
"end_line": 2773,
"function_name": "tile_worker_hook_init",
"start_line": 2731,
"target_file": "/src/aom/av1/decoder/decodeframe.c"
},
{
"end_line": 2810,
"function_name": "tile_worker_hook",
"start_line": 2775,
"target_file": "/src/aom/av1/decoder/decodeframe.c"
}
] |
Index-out-of-bounds
|
aom
|
ubsan
|
INFO: Seed: 3414122278
INFO: Loaded 1 modules (72394 inline 8-bit counters): 72394 [0x1299380, 0x12aae4a),
INFO: Loaded 1 PC tables (72394 PCs): 72394 [0x12aae50,0x13c5af0),
/out/av1_dec_fuzzer_threaded: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
/src/aom/av1/common/txb_common.h:675:29: runtime error: index 255 out of bounds for type 'const uint8_t [22]'
#0 0x4a2317 in get_txb_ctx /src/aom/av1/common/txb_common.h:675:29
#1 0x4a2317 in av1_read_coeffs_txb_facade /src/aom/av1/decoder/decodetxb.c:335
#2 0x47f9d7 in read_coeffs_tx_intra_block /src/aom/av1/decoder/decodeframe.c:169:5
#3 0x47f9d7 in decode_token_and_recon_block /src/aom/av1/decoder/decodeframe.c:1138
#4 0x47f9d7 in decode_block /src/aom/av1/decoder/decodeframe.c:1371
#5 0x47b5f0 in decode_partition /src/aom/av1/decoder/decodeframe.c:1464:7
#6 0x47a602 in decode_tile_sb_row /src/aom/av1/decoder/decodeframe.c:2526:5
#7 0x47a602 in decode_tile /src/aom/av1/decoder/decodeframe.c:2572
#8 0x47a0bb in tile_worker_hook /src/aom/av1/decoder/decodeframe.c:2801:7
#9 0xbf0b67 in execute /src/aom/aom_util/aom_thread.c:135:27
#10 0xbf0b67 in thread_loop /src/aom/aom_util/aom_thread.c:44
#11 0x7fc76a8296b9 in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76b9)
#12 0x7fc769f3d51c in clone (/lib/x86_64-linux-gnu/libc.so.6+0x10751c)
DEDUP_TOKEN: get_txb_ctx--av1_read_coeffs_txb_facade--read_coeffs_tx_intra_block
SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior /src/aom/av1/common/txb_common.h:675:29 in
|
cpp
|
6c5d07efa2b887fee25836e85a9f50f897c6c806
|
https://aomedia.googlesource.com/aom/+/1f68feef03dd9d5b5a4cac0a8f69b9f4cb1da915%5E%21/
| null |
arvo:9180
|
n132/arvo:9180-vul
|
/src/librawspeed
|
[
{
"end_line": 463,
"function_name": "ArwDecoder::GetWB",
"start_line": 402,
"target_file": "/src/librawspeed/src/librawspeed/decoders/ArwDecoder.cpp"
}
] |
Use-of-uninitialized-value
|
librawspeed
|
msan
|
INFO: Seed: 787102424
INFO: Loaded 1 modules (12643 inline 8-bit counters): 12643 [0xca89f0, 0xcabb53),
INFO: Loaded 1 PC tables (12643 PCs): 12643 [0xcabb58,0xcdd188),
/out/TiffDecoderFuzzer-ArwDecoder: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==6593==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x62927e in rawspeed::Buffer::getData(unsigned int, unsigned int) const /src/librawspeed/src/librawspeed/io/Buffer.h:127:9
#1 0x62927e in rawspeed::Buffer::getSubView(unsigned int, unsigned int) const /src/librawspeed/src/librawspeed/io/Buffer.h:114
#2 0x62927e in rawspeed::TiffIFD::TiffIFD(rawspeed::TiffIFD*, std::__1::set<rawspeed::Buffer, rawspeed::RangesOverlapCmp<rawspeed::Buffer>, std::__1::allocator<rawspeed::Buffer> >*, rawspeed::DataBuffer const&, unsigned int) /src/librawspeed/src/librawspeed/tiff/TiffIFD.cpp:120
#3 0x525da5 in rawspeed::TiffRootIFD::TiffRootIFD(rawspeed::TiffIFD*, std::__1::set<rawspeed::Buffer, rawspeed::RangesOverlapCmp<rawspeed::Buffer>, std::__1::allocator<rawspeed::Buffer> >*, rawspeed::DataBuffer const&, unsigned int) /src/librawspeed/src/librawspeed/tiff/TiffIFD.h:136:9
#4 0x525da5 in rawspeed::ArwDecoder::GetWB() /src/librawspeed/src/librawspeed/decoders/ArwDecoder.cpp:444
#5 0x522a99 in rawspeed::ArwDecoder::decodeMetaDataInternal(rawspeed::CameraMetaData const*) /src/librawspeed/src/librawspeed/decoders/ArwDecoder.cpp:357:7
#6 0x5b48be in rawspeed::RawDecoder::decodeMetaData(rawspeed::CameraMetaData const*) /src/librawspeed/src/librawspeed/decoders/RawDecoder.cpp:278:5
#7 0x4ec30d in LLVMFuzzerTestOneInput /src/librawspeed/fuzz/librawspeed/decoders/TiffDecoders/main.cpp:77:14
#8 0x7c2346 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:515:13
#9 0x781911 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
#10 0x795b66 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:703:9
#11 0x780a51 in main /src/libfuzzer/FuzzerMain.cpp:20:10
#12 0x7fa9b571783f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#13 0x46dcf8 in _start (/out/TiffDecoderFuzzer-ArwDecoder+0x46dcf8)
DEDUP_TOKEN: rawspeed::Buffer::getData(unsigned int, unsigned int) const--rawspeed::Buffer::getSubView(unsigned int, unsigned int) const--rawspeed::TiffIFD::TiffIFD(rawspeed::TiffIFD*, std::__1::set<rawspeed::Buffer, rawspeed::RangesOverlapCmp<rawspeed::Buffer>, std::__1::allocator<rawspeed::Buffer> >*, rawspeed::DataBuffer const&, unsigned int)
Uninitialized value was created by a heap allocation
#0 0x4aba14 in __interceptor_posix_memalign /src/llvm/projects/compiler-rt/lib/msan/msan_interceptors.cc:173
#1 0x5f9898 in rawspeed::alignedMalloc(unsigned long, unsigned long) /src/librawspeed/src/librawspeed/common/Memory.cpp:62:12
#2 0x509cb6 in unsigned char* rawspeed::alignedMalloc<unsigned char, 16ul>(unsigned long) /src/librawspeed/src/librawspeed/common/Memory.h:60:31
#3 0x509cb6 in rawspeed::Buffer::Create(unsigned int) /src/librawspeed/src/librawspeed/io/Buffer.cpp:39
#4 0x524162 in rawspeed::ArwDecoder::GetWB() /src/librawspeed/src/librawspeed/decoders/ArwDecoder.cpp:431:28
#5 0x522a99 in rawspeed::ArwDecoder::decodeMetaDataInternal(rawspeed::CameraMetaData const*) /src/librawspeed/src/librawspeed/decoders/ArwDecoder.cpp:357:7
#6 0x5b48be in rawspeed::RawDecoder::decodeMetaData(rawspeed::CameraMetaData const*) /src/librawspeed/src/librawspeed/decoders/RawDecoder.cpp:278:5
#7 0x4ec30d in LLVMFuzzerTestOneInput /src/librawspeed/fuzz/librawspeed/decoders/TiffDecoders/main.cpp:77:14
#8 0x7c2346 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:515:13
#9 0x781911 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
#10 0x795b66 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:703:9
#11 0x780a51 in main /src/libfuzzer/FuzzerMain.cpp:20:10
#12 0x7fa9b571783f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
DEDUP_TOKEN: __interceptor_posix_memalign--rawspeed::alignedMalloc(unsigned long, unsigned long)--unsigned char* rawspeed::alignedMalloc<unsigned char, 16ul>(unsigned long)
SUMMARY: MemorySanitizer: use-of-uninitialized-value /src/librawspeed/src/librawspeed/io/Buffer.h:127:9 in rawspeed::Buffer::getData(unsigned int, unsigned int) const
Unique heap origins: 91
Stack depot allocated bytes: 7160
Unique origin histories: 6
History depot allocated bytes: 144
Exiting
|
cpp
|
2c4bdfd42340ef006e330280f6d59000da6f2e8d
|
https://github.com/darktable-org/rawspeed/commit/77a1a1f0b7b7367b345afd484a22d5585ee410d6
|
The vulnerability in ArwDecoder::GetWB() occurs because the encrypted area is not rounded down to a multiple of 4, which can lead to issues detected by memory sanitizers.
|
arvo:9188
|
n132/arvo:9188-vul
|
/src/aom
|
[
{
"end_line": 1516,
"function_name": "decode_partition",
"start_line": 1404,
"target_file": "/src/aom/av1/decoder/decodeframe.c"
},
{
"end_line": 2773,
"function_name": "tile_worker_hook_init",
"start_line": 2731,
"target_file": "/src/aom/av1/decoder/decodeframe.c"
},
{
"end_line": 2810,
"function_name": "tile_worker_hook",
"start_line": 2775,
"target_file": "/src/aom/av1/decoder/decodeframe.c"
}
] |
Index-out-of-bounds
|
aom
|
ubsan
|
INFO: Seed: 1996167617
INFO: Loaded 1 modules (72394 inline 8-bit counters): 72394 [0x1299380, 0x12aae4a),
INFO: Loaded 1 PC tables (72394 PCs): 72394 [0x12aae50,0x13c5af0),
/out/av1_dec_fuzzer_threaded: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
/src/aom/av1/common/blockd.h:921:25: runtime error: index 255 out of bounds for type 'const TX_SIZE [22]'
#0 0x480aa3 in av1_get_max_uv_txsize /src/aom/av1/common/blockd.h:921:25
#1 0x480aa3 in av1_get_tx_size /src/aom/av1/common/blockd.h:930
#2 0x480aa3 in decode_token_and_recon_block /src/aom/av1/decoder/decodeframe.c:1125
#3 0x480aa3 in decode_block /src/aom/av1/decoder/decodeframe.c:1371
#4 0x47b4d5 in decode_partition /src/aom/av1/decoder/decodeframe.c:1504:9
#5 0x47b696 in decode_partition /src/aom/av1/decoder/decodeframe.c:1471:7
#6 0x47b664 in decode_partition /src/aom/av1/decoder/decodeframe.c:1469:7
#7 0x47a602 in decode_tile_sb_row /src/aom/av1/decoder/decodeframe.c:2526:5
#8 0x47a602 in decode_tile /src/aom/av1/decoder/decodeframe.c:2572
#9 0x47a0bb in tile_worker_hook /src/aom/av1/decoder/decodeframe.c:2801:7
#10 0xbf095d in execute /src/aom/aom_util/aom_thread.c:135:27
#11 0x47742b in launch_dec_workers /src/aom/av1/decoder/decodeframe.c
#12 0x47742b in decode_tiles_mt /src/aom/av1/decoder/decodeframe.c:3075
#13 0x474e8e in av1_decode_tg_tiles_and_wrapup /src/aom/av1/decoder/decodeframe.c
#14 0x4a43fc in read_one_tile_group_obu /src/aom/av1/decoder/obu.c:379:3
#15 0x4a43fc in aom_decode_frame_from_obus /src/aom/av1/decoder/obu.c:853
#16 0x49c2be in av1_receive_compressed_data /src/aom/av1/decoder/decoder.c:436:7
#17 0x46991d in frame_worker_hook /src/aom/av1/av1_dx_iface.c:343:31
#18 0xbf095d in execute /src/aom/aom_util/aom_thread.c:135:27
#19 0x466762 in decode_one /src/aom/av1/av1_dx_iface.c:500:3
#20 0x466762 in decoder_decode /src/aom/av1/av1_dx_iface.c:584
#21 0x461fa6 in aom_codec_decode /src/aom/aom/src/aom_decoder.c:111:11
#22 0x461482 in LLVMFuzzerTestOneInput /src/av1_dec_fuzzer.cc:52:33
#23 0x443f10 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:526:13
#24 0x4361fc in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
#25 0x4399a7 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9
#26 0x435f08 in main /src/libfuzzer/FuzzerMain.cpp:20:10
#27 0x7fa5dd3f383f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#28 0x40c008 in _start (/out/av1_dec_fuzzer_threaded+0x40c008)
DEDUP_TOKEN: av1_get_max_uv_txsize--av1_get_tx_size--decode_token_and_recon_block
SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior /src/aom/av1/common/blockd.h:921:25 in
|
cpp
|
6c5d07efa2b887fee25836e85a9f50f897c6c806
|
https://aomedia.googlesource.com/aom/+/1f68feef03dd9d5b5a4cac0a8f69b9f4cb1da915%5E%21/
| null |
arvo:9230
|
n132/arvo:9230-vul
|
/src/wireshark
|
[
{
"end_line": 1332,
"function_name": "expand_dns_name",
"start_line": 1153,
"target_file": "/src/wireshark/epan/dissectors/packet-dns.c"
}
] |
Heap-buffer-overflow WRITE 2
|
wireshark
|
asan
|
oss-fuzzshark: disabling: ip
oss-fuzzshark: disabling: udp
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: bgp
oss-fuzzshark: disabling: json
oss-fuzzshark: disabling: snort
oss-fuzzshark: configured for dissector: bootp in table: udp.port
INFO: Seed: 2091284779
INFO: Loaded 1 modules (319333 inline 8-bit counters): 319333 [0xcd75a10, 0xcdc3975),
INFO: Loaded 1 PC tables (319333 PCs): 319333 [0xcdc3978,0xd2a2fc8),
/out/fuzzshark_udp_port-bootp: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==9346==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000004ebf at pc 0x00000049df03 bp 0x7ffc7ad3fb20 sp 0x7ffc7ad3f2d0
WRITE of size 5 at 0x611000004ebf thread T0
SCARINESS: 37 (5-byte-write-heap-buffer-overflow)
#0 0x49df02 in __vsnprintf_chk /src/llvm/projects/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:1571
#1 0x25e975e in g_snprintf (/out/fuzzshark_udp_port-bootp+0x25e975e)
#2 0xd3ed29 in expand_dns_name /src/wireshark/epan/dissectors/packet-dns.c:1255:27
#3 0xd3ed29 in get_dns_name /src/wireshark/epan/dissectors/packet-dns.c:1342
#4 0xa2d7cc in dissect_bootpopt_dhcp_domain_search /src/wireshark/epan/dissectors/packet-bootp.c:2735:16
#5 0x5e8603 in call_dissector_through_handle /src/wireshark/epan/packet.c:692:9
#6 0x5e8603 in call_dissector_work /src/wireshark/epan/packet.c:777
#7 0x5e80b9 in dissector_try_uint_new /src/wireshark/epan/packet.c:1359:8
#8 0xa36cce in bootp_option /src/wireshark/epan/dissectors/packet-bootp.c:1996:7
#9 0xa27674 in dissect_bootp /src/wireshark/epan/dissectors/packet-bootp.c:6553:18
#10 0x5e8603 in call_dissector_through_handle /src/wireshark/epan/packet.c:692:9
#11 0x5e8603 in call_dissector_work /src/wireshark/epan/packet.c:777
#12 0x5f0561 in call_dissector_only /src/wireshark/epan/packet.c:3090:8
#13 0x5f0561 in call_all_postdissectors /src/wireshark/epan/packet.c:3465
#14 0xe97edb in dissect_frame /src/wireshark/epan/dissectors/packet-frame.c:681:5
#15 0x5e8603 in call_dissector_through_handle /src/wireshark/epan/packet.c:692:9
#16 0x5e8603 in call_dissector_work /src/wireshark/epan/packet.c:777
#17 0x5e55de in call_dissector_only /src/wireshark/epan/packet.c:3090:8
#18 0x5e55de in call_dissector_with_data /src/wireshark/epan/packet.c:3103
#19 0x5e4d9b in dissect_record /src/wireshark/epan/packet.c:566:3
#20 0x5d9383 in epan_dissect_run /src/wireshark/epan/epan.c:538:2
#21 0x52fdcc in LLVMFuzzerTestOneInput /src/wireshark/tools/oss-fuzzshark/fuzzshark.c:360:2
#22 0x55a3dc in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:526:13
#23 0x53157a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
#24 0x53ca01 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9
#25 0x530c1c in main /src/libfuzzer/FuzzerMain.cpp:20:10
#26 0x7f1680f4283f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#27 0x41f098 in _start (/out/fuzzshark_udp_port-bootp+0x41f098)
DEDUP_TOKEN: __vsnprintf_chk--g_snprintf--expand_dns_name
0x611000004ebf is located 0 bytes to the right of 255-byte region [0x611000004dc0,0x611000004ebf)
allocated by thread T0 here:
#0 0x4ecf27 in __interceptor_malloc /src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:121
#1 0x25cb328 in g_malloc (/out/fuzzshark_udp_port-bootp+0x25cb328)
#2 0xd3e97f in expand_dns_name /src/wireshark/epan/dissectors/packet-dns.c:1171:16
#3 0xd3e97f in get_dns_name /src/wireshark/epan/dissectors/packet-dns.c:1342
#4 0xa2d7cc in dissect_bootpopt_dhcp_domain_search /src/wireshark/epan/dissectors/packet-bootp.c:2735:16
#5 0x5e8603 in call_dissector_through_handle /src/wireshark/epan/packet.c:692:9
#6 0x5e8603 in call_dissector_work /src/wireshark/epan/packet.c:777
#7 0x5e80b9 in dissector_try_uint_new /src/wireshark/epan/packet.c:1359:8
#8 0xa36cce in bootp_option /src/wireshark/epan/dissectors/packet-bootp.c:1996:7
#9 0xa27674 in dissect_bootp /src/wireshark/epan/dissectors/packet-bootp.c:6553:18
#10 0x5e8603 in call_dissector_through_handle /src/wireshark/epan/packet.c:692:9
#11 0x5e8603 in call_dissector_work /src/wireshark/epan/packet.c:777
#12 0x5f0561 in call_dissector_only /src/wireshark/epan/packet.c:3090:8
#13 0x5f0561 in call_all_postdissectors /src/wireshark/epan/packet.c:3465
#14 0xe97edb in dissect_frame /src/wireshark/epan/dissectors/packet-frame.c:681:5
#15 0x5e8603 in call_dissector_through_handle /src/wireshark/epan/packet.c:692:9
#16 0x5e8603 in call_dissector_work /src/wireshark/epan/packet.c:777
#17 0x5e55de in call_dissector_only /src/wireshark/epan/packet.c:3090:8
#18 0x5e55de in call_dissector_with_data /src/wireshark/epan/packet.c:3103
#19 0x5e4d9b in dissect_record /src/wireshark/epan/packet.c:566:3
#20 0x5d9383 in epan_dissect_run /src/wireshark/epan/epan.c:538:2
#21 0x52fdcc in LLVMFuzzerTestOneInput /src/wireshark/tools/oss-fuzzshark/fuzzshark.c:360:2
#22 0x55a3dc in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:526:13
#23 0x53157a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
#24 0x53ca01 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9
#25 0x530c1c in main /src/libfuzzer/FuzzerMain.cpp:20:10
#26 0x7f1680f4283f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
DEDUP_TOKEN: __interceptor_malloc--g_malloc--expand_dns_name
SUMMARY: AddressSanitizer: heap-buffer-overflow /src/llvm/projects/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:1571 in __vsnprintf_chk
Shadow bytes around the buggy address:
0x0c227fff8980: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa
0x0c227fff8990: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c227fff89a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 07
0x0c227fff89b0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c227fff89c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c227fff89d0: 00 00 00 00 00 00 00[07]fa fa fa fa fa fa fa fa
0x0c227fff89e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff89f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff8a00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff8a10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff8a20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==9346==ABORTING
|
cpp
|
6f665e36edb3c8d748682c2702b952656c6c273b
|
https://github.com/wireshark/wireshark/commit/5a560f3f6aa2cbfad957cf6223e50c3b61ef575b
|
A buffer overflow vulnerability exists in the DNS code due to an off-by-one error when writing to a buffer. The "maxname" variable represents the size of the buffer, including the "null label" (NUL byte), but the code writes past the end of the buffer. This can result in a write buffer overflow.
|
arvo:9287
|
n132/arvo:9287-vul
|
/src/openvswitch
|
[
{
"end_line": 689,
"function_name": "ipv6_sanity_check",
"start_line": 670,
"target_file": "/src/openvswitch/lib/flow.c"
}
] |
Heap-buffer-overflow READ 1
|
openvswitch
|
asan
|
INFO: Seed: 3983540721
INFO: Loaded 1 modules (37409 inline 8-bit counters): 37409 [0xe89370, 0xe92591),
INFO: Loaded 1 PC tables (37409 PCs): 37409 [0xa65e48,0xaf8058),
/out/flow_extract_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==27556==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6110000003a7 at pc 0x000000537c16 bp 0x7ffe1155ab50 sp 0x7ffe1155ab48
READ of size 1 at 0x6110000003a7 thread T0
SCARINESS: 12 (1-byte-read-heap-buffer-overflow)
#0 0x537c15 in parse_icmpv6 /src/openvswitch/lib/flow.c:420:32
#1 0x5366e5 in miniflow_extract /src/openvswitch/lib/flow.c:987:21
#2 0x532a5c in flow_extract /src/openvswitch/lib/flow.c:623:5
#3 0x530145 in LLVMFuzzerTestOneInput /src/flow_extract_target.c:28:5
#4 0x885bcc in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:526:13
#5 0x85ca7a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
#6 0x868249 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9
#7 0x85c11c in main /src/libfuzzer/FuzzerMain.cpp:20:10
#8 0x7fa2b4ba683f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#9 0x41f4d8 in _start (/out/flow_extract_fuzzer+0x41f4d8)
DEDUP_TOKEN: parse_icmpv6--miniflow_extract--flow_extract
0x6110000003a7 is located 4 bytes to the right of 227-byte region [0x6110000002c0,0x6110000003a3)
allocated by thread T0 here:
#0 0x52bdf8 in operator new[](unsigned long) /src/llvm/projects/compiler-rt/lib/asan/asan_new_delete.cc:96
#1 0x8859d8 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:517:23
#2 0x85ca7a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
#3 0x868249 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9
#4 0x85c11c in main /src/libfuzzer/FuzzerMain.cpp:20:10
#5 0x7fa2b4ba683f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
DEDUP_TOKEN: operator new[](unsigned long)--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)
SUMMARY: AddressSanitizer: heap-buffer-overflow /src/openvswitch/lib/flow.c:420:32 in parse_icmpv6
Shadow bytes around the buggy address:
0x0c227fff8020: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa
0x0c227fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c227fff8040: 00 00 00 00 00 00 00 00 00 00 00 00 03 fa fa fa
0x0c227fff8050: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c227fff8060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c227fff8070: 00 00 00 00[03]fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff80b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==27556==ABORTING
|
cpp
|
f5129153e3b12c0b9ca6b355f9062d91a67d2942
|
https://github.com/openvswitch/ovs/commit/4fe08016068514be7a8751d86f6ad30bde344949
| null |
arvo:9294
|
n132/arvo:9294-vul
|
/src/openvswitch
|
[
{
"end_line": 689,
"function_name": "ipv6_sanity_check",
"start_line": 670,
"target_file": "/src/openvswitch/lib/flow.c"
}
] |
Heap-buffer-overflow READ 2
|
openvswitch
|
asan
|
INFO: Seed: 4267508276
INFO: Loaded 1 modules (37421 inline 8-bit counters): 37421 [0xe8a3f0, 0xe9361d),
INFO: Loaded 1 PC tables (37421 PCs): 37421 [0xa66128,0xaf83f8),
/out/ofp_print_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==27576==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6110000003e0 at pc 0x00000053086f bp 0x7ffcee4d7a90 sp 0x7ffcee4d7a88
READ of size 2 at 0x6110000003e0 thread T0
SCARINESS: 24 (2-byte-read-heap-buffer-overflow-far-from-bounds)
#0 0x53086e in ofp_packet_to_string /src/openvswitch/lib/ofp-print.c:88:49
#1 0x62b0a3 in ofputil_packet_in_private_format /src/openvswitch/lib/ofp-packet.c:1013:24
#2 0x533229 in ofp_print_packet_in /src/openvswitch/lib/ofp-print.c:131:9
#3 0x5315d7 in ofp_to_string /src/openvswitch/lib/ofp-print.c:1246:21
#4 0x532154 in ofp_print /src/openvswitch/lib/ofp-print.c:1290:28
#5 0x5301cf in LLVMFuzzerTestOneInput /src/ofp_print_target.c:53:2
#6 0x885ddc in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:526:13
#7 0x85cc8a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
#8 0x868459 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9
#9 0x85c32c in main /src/libfuzzer/FuzzerMain.cpp:20:10
#10 0x7f0cf921e83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#11 0x41f518 in _start (/out/ofp_print_fuzzer+0x41f518)
DEDUP_TOKEN: ofp_packet_to_string--ofputil_packet_in_private_format--ofp_print_packet_in
0x6110000003e0 is located 32 bytes to the right of 256-byte region [0x6110000002c0,0x6110000003c0)
allocated by thread T0 here:
#0 0x52be38 in operator new[](unsigned long) /src/llvm/projects/compiler-rt/lib/asan/asan_new_delete.cc:96
#1 0x885be8 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:517:23
#2 0x85cc8a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
#3 0x868459 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9
#4 0x85c32c in main /src/libfuzzer/FuzzerMain.cpp:20:10
#5 0x7f0cf921e83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
DEDUP_TOKEN: operator new[](unsigned long)--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)
SUMMARY: AddressSanitizer: heap-buffer-overflow /src/openvswitch/lib/ofp-print.c:88:49 in ofp_packet_to_string
Shadow bytes around the buggy address:
0x0c227fff8020: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa
0x0c227fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c227fff8040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c227fff8050: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c227fff8060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c227fff8070: 00 00 00 00 00 00 00 00 fa fa fa fa[fa]fa fa fa
0x0c227fff8080: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c227fff8090: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c227fff80a0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c227fff80b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c227fff80c0: 04 fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==27576==ABORTING
|
cpp
|
f5129153e3b12c0b9ca6b355f9062d91a67d2942
|
https://github.com/openvswitch/ovs/commit/4fe08016068514be7a8751d86f6ad30bde344949
| null |
arvo:9808
|
n132/arvo:9808-vul
|
/src/boringssl
|
[
{
"end_line": 512,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 236,
"target_file": "/src/boringssl/fuzz/ssl_ctx_api.cc"
}
] |
Heap-buffer-overflow READ 1
|
boringssl
|
asan
|
INFO: Seed: 3730282855
INFO: Loaded 1 modules (32124 inline 8-bit counters): 32124 [0xd59d68, 0xd61ae4),
INFO: Loaded 1 PC tables (32124 PCs): 32124 [0x9c86b0,0xa45e70),
/out/ssl_ctx_api: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==484==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000002b1 at pc 0x00000062e8f9 bp 0x7ffd8eb58070 sp 0x7ffd8eb58068
READ of size 1 at 0x6020000002b1 thread T0
SCARINESS: 12 (1-byte-read-heap-buffer-overflow)
#0 0x62e8f8 in parse_sigalgs_list(bssl::Array<unsigned short>*, char const*) /src/boringssl/ssl/ssl_privkey.cc:614:29
#1 0x62dabe in SSL_CTX_set1_sigalgs_list /src/boringssl/ssl/ssl_privkey.cc:763:8
#2 0x5fe7b3 in std::__1::function<void (ssl_ctx_st*, cbs_st*)>::operator()(ssl_ctx_st*, cbs_st*) const /usr/local/bin/../include/c++/v1/functional:1913:12
#3 0x5bebec in LLVMFuzzerTestOneInput /src/boringssl/fuzz/ssl_ctx_api.cc:501:5
#4 0x55a702 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:575:15
#5 0x530f9a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
#6 0x53c665 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:715:9
#7 0x53061c in main /src/libfuzzer/FuzzerMain.cpp:20:10
#8 0x7fe120f4583f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#9 0x41d368 in _start (/out/ssl_ctx_api+0x41d368)
DEDUP_TOKEN: parse_sigalgs_list(bssl::Array<unsigned short>*, char const*)--SSL_CTX_set1_sigalgs_list--std::__1::function<void (ssl_ctx_st*, cbs_st*)>::operator()(ssl_ctx_st*, cbs_st*) const
0x6020000002b1 is located 0 bytes to the right of 1-byte region [0x6020000002b0,0x6020000002b1)
allocated by thread T0 here:
#0 0x52c288 in operator new[](unsigned long) /src/llvm/projects/compiler-rt/lib/asan/asan_new_delete.cc:109
#1 0x55a4b4 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:562:23
#2 0x530f9a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
#3 0x53c665 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:715:9
#4 0x53061c in main /src/libfuzzer/FuzzerMain.cpp:20:10
#5 0x7fe120f4583f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
DEDUP_TOKEN: operator new[](unsigned long)--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)
SUMMARY: AddressSanitizer: heap-buffer-overflow /src/boringssl/ssl/ssl_privkey.cc:614:29 in parse_sigalgs_list(bssl::Array<unsigned short>*, char const*)
Shadow bytes around the buggy address:
0x0c047fff8000: fa fa 00 00 fa fa 00 02 fa fa 00 03 fa fa 00 00
0x0c047fff8010: fa fa fd fd fa fa fd fd fa fa 00 03 fa fa 00 00
0x0c047fff8020: fa fa fd fd fa fa fd fd fa fa 00 03 fa fa 00 05
0x0c047fff8030: fa fa 00 03 fa fa 00 03 fa fa 00 03 fa fa 00 03
0x0c047fff8040: fa fa 00 00 fa fa 00 fa fa fa 00 fa fa fa 00 fa
=>0x0c047fff8050: fa fa 01 fa fa fa[01]fa fa fa fa fa fa fa fa fa
0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==484==ABORTING
|
cpp
|
17dc94e87466ac8928096c4f45954989d585cfe5
|
https://boringssl.googlesource.com/boringssl/+/ddedf6d455e33d6a0b3bc40581700f3d252029d7%5E%21/
|
The SSL_CTX_set1_sigalgs_list function in its current usage expects a NUL-terminated string, but may receive a non-NUL-terminated string if not handled properly, leading to potential security issues. The function should be provided with a NUL-terminated string, such as by using GetString, to avoid this vulnerability.
|
arvo:9847
|
n132/arvo:9847-vul
|
/src/file
|
[
{
"end_line": 243,
"function_name": "json_parse_object",
"start_line": 194,
"target_file": "/src/file/src/is_json.c"
}
] |
Heap-buffer-overflow READ 1
|
file
|
asan
|
INFO: Seed: 3335381564
INFO: Loaded 1 modules (4063 inline 8-bit counters): 4063 [0x923788, 0x924767),
INFO: Loaded 1 PC tables (4063 PCs): 4063 [0x924768,0x934558),
/out/magic_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==11002==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000116 at pc 0x0000005f3938 bp 0x7fff642812d0 sp 0x7fff642812c8
READ of size 1 at 0x602000000116 thread T0
SCARINESS: 12 (1-byte-read-heap-buffer-overflow)
#0 0x5f3937 in json_parse_object /src/file/src/is_json.c:224:11
#1 0x5f2e95 in json_parse /src/file/src/is_json.c:336:8
#2 0x5f2958 in file_is_json /src/file/src/is_json.c:383:7
#3 0x5db6ff in file_buffer /src/file/src/funcs.c:251:7
#4 0x5c1065 in magic_buffer /src/file/src/magic.c:536:6
#5 0x53031f in LLVMFuzzerTestOneInput /src/magic_fuzzer.cc:52:3
#6 0x569212 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:575:15
#7 0x54145a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
#8 0x54cc35 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:715:9
#9 0x530a2c in main /src/libfuzzer/FuzzerMain.cpp:20:10
#10 0x7f403ae9083f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#11 0x41d3a8 in _start (/out/magic_fuzzer+0x41d3a8)
DEDUP_TOKEN: json_parse_object--json_parse--file_is_json
0x602000000116 is located 0 bytes to the right of 6-byte region [0x602000000110,0x602000000116)
allocated by thread T0 here:
#0 0x52bdb8 in operator new[](unsigned long) /src/llvm/projects/compiler-rt/lib/asan/asan_new_delete.cc:109
#1 0x568fc4 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:562:23
#2 0x54145a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
#3 0x54cc35 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:715:9
#4 0x530a2c in main /src/libfuzzer/FuzzerMain.cpp:20:10
#5 0x7f403ae9083f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
DEDUP_TOKEN: operator new[](unsigned long)--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)
SUMMARY: AddressSanitizer: heap-buffer-overflow /src/file/src/is_json.c:224:11 in json_parse_object
Shadow bytes around the buggy address:
0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff8000: fa fa 00 fa fa fa fd fd fa fa fd fd fa fa 00 00
0x0c047fff8010: fa fa 00 fa fa fa 00 fa fa fa 00 fa fa fa 06 fa
=>0x0c047fff8020: fa fa[06]fa fa fa fd fa fa fa fa fa fa fa fa fa
0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==11002==ABORTING
|
cpp
|
6382574724f99e4fd2e3b10580d83c9cb103ec5a
|
https://github.com/file/file/commit/473e039b48fd72660dd00f4b52a2880cc0dd5632
| null |
arvo:992
|
n132/arvo:992-vul
|
/src/file
|
[
{
"end_line": 1056,
"function_name": "cdf_read_property_info",
"start_line": 909,
"target_file": "/src/file/src/cdf.c"
}
] |
Use-of-uninitialized-value
|
file
|
msan
|
INFO: Seed: 2518427820
INFO: Loaded 1 modules (3759 guards): [0xa339e0, 0xa3749c),
/out/magic_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==10654==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x58bcb9 in cdf_file_property_info /src/file/src/readcdf.c:225:29
#1 0x588991 in cdf_file_summary_info /src/file/src/readcdf.c:345:13
#2 0x5876ca in cdf_check_summary_info /src/file/src/readcdf.c:398:18
#3 0x586732 in file_trycdf /src/file/src/readcdf.c:630:7
#4 0x57febc in file_buffer /src/file/src/funcs.c:243:7
#5 0x54ab67 in magic_buffer /src/file/src/magic.c:547:6
#6 0x498f41 in LLVMFuzzerTestOneInput /src/magic_fuzzer.cc:52:3
#7 0x4d7f29 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:451:13
#8 0x4d8b51 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:408:3
#9 0x49ad6e in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:268:6
#10 0x4a966d in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:620:9
#11 0x499eb1 in main /src/libfuzzer/FuzzerMain.cpp:20:10
#12 0x7fc6595a483f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#13 0x41f238 in _start (/out/magic_fuzzer+0x41f238)
DEDUP_TOKEN: cdf_file_property_info--cdf_file_summary_info--cdf_check_summary_info
Uninitialized value was created by a heap allocation
#0 0x44d745 in realloc /src/llvm/projects/compiler-rt/lib/msan/msan_interceptors.cc:935
#1 0x5d1cdc in cdf_grow_info /src/file/src/cdf.c:866:8
#2 0x5d0280 in cdf_read_property_info /src/file/src/cdf.c:941:8
#3 0x5d33df in cdf_unpack_summary_info /src/file/src/cdf.c:1080:6
#4 0x588820 in cdf_file_summary_info /src/file/src/readcdf.c:302:13
#5 0x5876ca in cdf_check_summary_info /src/file/src/readcdf.c:398:18
#6 0x586732 in file_trycdf /src/file/src/readcdf.c:630:7
#7 0x57febc in file_buffer /src/file/src/funcs.c:243:7
#8 0x54ab67 in magic_buffer /src/file/src/magic.c:547:6
#9 0x498f41 in LLVMFuzzerTestOneInput /src/magic_fuzzer.cc:52:3
#10 0x4d7f29 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:451:13
#11 0x4d8b51 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:408:3
#12 0x49ad6e in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:268:6
#13 0x4a966d in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:620:9
#14 0x499eb1 in main /src/libfuzzer/FuzzerMain.cpp:20:10
#15 0x7fc6595a483f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
DEDUP_TOKEN: realloc--cdf_grow_info--cdf_read_property_info
SUMMARY: MemorySanitizer: use-of-uninitialized-value /src/file/src/readcdf.c:225:29 in cdf_file_property_info
Unique heap origins: 59
Stack depot allocated bytes: 4352
Unique origin histories: 8
History depot allocated bytes: 192
Exiting
|
cpp
|
8a942980f3f705226300f43f4b49a557c0918660
|
https://github.com/file/file/commit/fd42e11948eeeece5b17558706cd2426eb447644
| null |
arvo:9922
|
n132/arvo:9922-vul
|
/src/file
|
[
{
"end_line": 167,
"function_name": "json_parse_string",
"start_line": 118,
"target_file": "/src/file/src/is_json.c"
}
] |
Heap-buffer-overflow READ 1
|
file
|
asan
|
INFO: Seed: 375800122
INFO: Loaded 1 modules (4064 inline 8-bit counters): 4064 [0x923788, 0x924768),
INFO: Loaded 1 PC tables (4064 PCs): 4064 [0x924768,0x934568),
/out/magic_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==11002==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000113 at pc 0x0000005f32ee bp 0x7ffed48d4a00 sp 0x7ffed48d49f8
READ of size 1 at 0x602000000113 thread T0
SCARINESS: 12 (1-byte-read-heap-buffer-overflow)
#0 0x5f32ed in json_parse_string /src/file/src/is_json.c:130:12
#1 0x5f2da5 in json_parse /src/file/src/is_json.c:330:8
#2 0x5f34b9 in json_parse_array /src/file/src/is_json.c:175:8
#3 0x5f2d21 in json_parse /src/file/src/is_json.c:334:8
#4 0x5f2958 in file_is_json /src/file/src/is_json.c:385:7
#5 0x5db6ff in file_buffer /src/file/src/funcs.c:251:7
#6 0x5c1065 in magic_buffer /src/file/src/magic.c:536:6
#7 0x53031f in LLVMFuzzerTestOneInput /src/magic_fuzzer.cc:52:3
#8 0x569212 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:575:15
#9 0x54145a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
#10 0x54cc35 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:715:9
#11 0x530a2c in main /src/libfuzzer/FuzzerMain.cpp:20:10
#12 0x7f76041f183f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#13 0x41d3a8 in _start (/out/magic_fuzzer+0x41d3a8)
DEDUP_TOKEN: json_parse_string--json_parse--json_parse_array
0x602000000113 is located 0 bytes to the right of 3-byte region [0x602000000110,0x602000000113)
allocated by thread T0 here:
#0 0x52bdb8 in operator new[](unsigned long) /src/llvm/projects/compiler-rt/lib/asan/asan_new_delete.cc:109
#1 0x568fc4 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:562:23
#2 0x54145a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
#3 0x54cc35 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:715:9
#4 0x530a2c in main /src/libfuzzer/FuzzerMain.cpp:20:10
#5 0x7f76041f183f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
DEDUP_TOKEN: operator new[](unsigned long)--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)
SUMMARY: AddressSanitizer: heap-buffer-overflow /src/file/src/is_json.c:130:12 in json_parse_string
Shadow bytes around the buggy address:
0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff8000: fa fa 00 fa fa fa fd fd fa fa fd fd fa fa 00 00
0x0c047fff8010: fa fa 00 fa fa fa 00 fa fa fa 00 fa fa fa 03 fa
=>0x0c047fff8020: fa fa[03]fa fa fa fd fa fa fa fa fa fa fa fa fa
0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==11002==ABORTING
|
cpp
|
473e039b48fd72660dd00f4b52a2880cc0dd5632
|
https://github.com/file/file/commit/87f27958cfbb05d262504976f66db70c24d5061f
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.