task_id
stringlengths
8
10
docker_image
stringlengths
17
19
basedir
stringclasses
157 values
target_functions
listlengths
1
3
crash_type
stringclasses
85 values
project_name
stringclasses
157 values
sanitizer
stringclasses
3 values
sanitizer_output
stringlengths
1.13k
6.5M
language
stringclasses
2 values
vuln_commit
stringlengths
40
40
fix
stringlengths
69
110
vulnerability_description
stringlengths
38
824
arvo:8968
n132/arvo:8968-vul
/src/freetype2
[ { "end_line": 229, "function_name": "tt_face_load_cpal", "start_line": 75, "target_file": "/src/freetype2/src/sfnt/ttcpal.c" } ]
Heap-buffer-overflow READ 1
freetype2
asan
INFO: Seed: 566716906 INFO: Loaded 1 modules (19031 inline 8-bit counters): 19031 [0xb43c60, 0xb486b7), INFO: Loaded 1 PC tables (19031 PCs): 19031 [0x874c50,0x8bf1c0), /out/ftfuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==7867==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62100000a1f0 at pc 0x00000065dca1 bp 0x7ffcf98fae70 sp 0x7ffcf98fae68 READ of size 1 at 0x62100000a1f0 thread T0 SCARINESS: 22 (1-byte-read-heap-buffer-overflow-far-from-bounds) #0 0x65dca0 in tt_face_load_cpal /src/freetype2/src/sfnt/ttcpal.c:133:28 #1 0x6528b6 in sfnt_load_face /src/freetype2/src/sfnt/sfobjs.c:1347:7 #2 0x67f42d in tt_face_init /src/freetype2/src/truetype/ttobjs.c:666:13 #3 0x5a7029 in open_face /src/freetype2/src/base/ftobjs.c:1375:15 #4 0x58e168 in ft_open_face_internal /src/freetype2/src/base/ftobjs.c:2447:19 #5 0x58f229 in FT_New_Memory_Face /src/freetype2/src/base/ftobjs.c:1465:12 #6 0x52e0d9 in LLVMFuzzerTestOneInput /src/freetype2/./src/tools/ftfuzzer/ftfuzzer.cc:313:16 #7 0x71d59c in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:526:13 #8 0x6f474a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6 #9 0x6ffbd1 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9 #10 0x6f3dec in main /src/libfuzzer/FuzzerMain.cpp:20:10 #11 0x7fe9cd99183f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #12 0x41cff8 in _start (/out/ftfuzzer+0x41cff8) DEDUP_TOKEN: tt_face_load_cpal--sfnt_load_face--tt_face_init Address 0x62100000a1f0 is a wild pointer. SUMMARY: AddressSanitizer: heap-buffer-overflow /src/freetype2/src/sfnt/ttcpal.c:133:28 in tt_face_load_cpal Shadow bytes around the buggy address: 0x0c427fff93e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff93f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff9400: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff9410: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff9420: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c427fff9430: fa fa fa fa fa fa fa fa fa fa fa fa fa fa[fa]fa 0x0c427fff9440: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff9450: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff9460: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff9470: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff9480: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==7867==ABORTING
cpp
7915fd51f123d0adbe6a0b9ad19eb941e1733c87
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=a6b77ba2b39e379cd9295a9376fedf574a6ba15f
A heap buffer overflow exists in the `tt_face_load_cpal` function in `src/sfnt/ttcpal.c` due to insufficient guarding of CPAL version 1 offsets.
arvo:9070
n132/arvo:9070-vul
/src/freetype2
[ { "end_line": 3393, "function_name": "tt_face_vary_cvt", "start_line": 3089, "target_file": "/src/freetype2/src/truetype/ttgxvar.c" } ]
Bad-free
freetype2
asan
INFO: Seed: 3073846597 INFO: Loaded 1 modules (19072 inline 8-bit counters): 19072 [0xad0ed8, 0xad5958), INFO: Loaded 1 PC tables (19072 PCs): 19072 [0x80d6b0,0x857eb0), /out/ftfuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==7818==ERROR: AddressSanitizer: attempting free on address which was not malloc()-ed: 0x0c0e000000b4 in thread T0 SCARINESS: 40 (bad-free) #0 0x4eabd8 in __interceptor_cfree.localalias.1 /src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:109 #1 0x69cc6f in tt_face_vary_cvt /src/freetype2/src/truetype/ttgxvar.c:3382:5 #2 0x69aaae in tt_set_mm_blend /src/freetype2/src/truetype/ttgxvar.c:2601:17 #3 0x698800 in TT_Set_Var_Design /src/freetype2/src/truetype/ttgxvar.c:2877:13 #4 0x5d71b1 in FT_Set_Var_Design_Coordinates /src/freetype2/src/base/ftmm.c:224:17 #5 0x52f47c in setIntermediateAxis(FT_FaceRec_*) /src/freetype2/./src/tools/ftfuzzer/ftfuzzer.cc:230:10 #6 0x52e429 in LLVMFuzzerTestOneInput /src/freetype2/./src/tools/ftfuzzer/ftfuzzer.cc:389:13 #7 0x701d18 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:526:13 #8 0x6f4a84 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6 #9 0x6f8907 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9 #10 0x6f47a0 in main /src/libfuzzer/FuzzerMain.cpp:20:10 #11 0x7f929ecb083f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #12 0x41cf18 in _start (/out/ftfuzzer+0x41cf18) DEDUP_TOKEN: __interceptor_cfree.localalias.1--tt_face_vary_cvt--tt_set_mm_blend Address 0x0c0e000000b4 is located in the high shadow area. SUMMARY: AddressSanitizer: bad-free /src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:109 in __interceptor_cfree.localalias.1 ==7818==ABORTING
cpp
a632fb547e23fe129a579fabf60a992fd7d98d02
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=589d1f0899343b18c3181f35451550dc1b904bef
null
arvo:9079
n132/arvo:9079-vul
/src/freetype2
[ { "end_line": 3393, "function_name": "tt_face_vary_cvt", "start_line": 3089, "target_file": "/src/freetype2/src/truetype/ttgxvar.c" } ]
UNKNOWN READ
freetype2
ubsan
INFO: Seed: 959164486 INFO: Loaded 1 modules (19295 inline 8-bit counters): 19295 [0x8a08b8, 0x8a5417), INFO: Loaded 1 PC tables (19295 PCs): 19295 [0x5efc70,0x63b260), /out/ftfuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSanitizer:DEADLYSIGNAL ==7854==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x0000000015ac (pc 0x7f06691de562 bp 0x7ffc052fc920 sp 0x7ffc052fc7f0 T7854) ==7854==The signal is caused by a READ memory access. #0 0x7f06691de561 in cfree (/lib/x86_64-linux-gnu/libc.so.6+0x84561) #1 0x4de6e2 in tt_face_vary_cvt /src/freetype2/src/truetype/ttgxvar.c:3382:5 #2 0x4ddb0c in tt_set_mm_blend /src/freetype2/src/truetype/ttgxvar.c:2601:17 #3 0x4dcbf6 in TT_Set_Var_Design /src/freetype2/src/truetype/ttgxvar.c:2877:13 #4 0x4825de in FT_Set_Var_Design_Coordinates /src/freetype2/src/base/ftmm.c:224:17 #5 0x430eef in setIntermediateAxis(FT_FaceRec_*) /src/freetype2/./src/tools/ftfuzzer/ftfuzzer.cc:230:10 #6 0x43077f in LLVMFuzzerTestOneInput /src/freetype2/./src/tools/ftfuzzer/ftfuzzer.cc:389:13 #7 0x510d68 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:526:13 #8 0x503ad4 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6 #9 0x507957 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9 #10 0x5037f0 in main /src/libfuzzer/FuzzerMain.cpp:20:10 #11 0x7f066917a83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #12 0x406318 in _start (/out/ftfuzzer+0x406318) DEDUP_TOKEN: cfree--tt_face_vary_cvt--tt_set_mm_blend UndefinedBehaviorSanitizer can not provide additional info. SUMMARY: UndefinedBehaviorSanitizer: SEGV (/lib/x86_64-linux-gnu/libc.so.6+0x84561) in cfree ==7854==ABORTING
cpp
a632fb547e23fe129a579fabf60a992fd7d98d02
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=589d1f0899343b18c3181f35451550dc1b904bef
null
arvo:9084
n132/arvo:9084-vul
/src/freetype2
[ { "end_line": 3393, "function_name": "tt_face_vary_cvt", "start_line": 3089, "target_file": "/src/freetype2/src/truetype/ttgxvar.c" } ]
UNKNOWN READ
freetype2
ubsan
INFO: Seed: 2421415247 INFO: Loaded 1 modules (19295 inline 8-bit counters): 19295 [0x8a08b8, 0x8a5417), INFO: Loaded 1 PC tables (19295 PCs): 19295 [0x5efc70,0x63b260), /out/ftfuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSanitizer:DEADLYSIGNAL ==7838==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x00000000140c (pc 0x0000004ecf1f bp 0x7ffe45230f90 sp 0x7ffe45230df8 T7838) ==7838==The signal is caused by a READ memory access. #0 0x4ecf1e in TT_Load_Glyph_Header /src/freetype2/src/truetype/ttgload.c:307:26 #1 0x4e4180 in load_truetype_glyph /src/freetype2/src/truetype/ttgload.c:1631:15 #2 0x4e2fd2 in TT_Load_Glyph /src/freetype2/src/truetype/ttgload.c:2839:13 #3 0x45ae64 in FT_Load_Glyph /src/freetype2/src/base/ftobjs.c:907:15 #4 0x4307c4 in LLVMFuzzerTestOneInput /src/freetype2/./src/tools/ftfuzzer/ftfuzzer.cc:396:18 #5 0x510d68 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:526:13 #6 0x503ad4 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6 #7 0x507957 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9 #8 0x5037f0 in main /src/libfuzzer/FuzzerMain.cpp:20:10 #9 0x7f7810a0983f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #10 0x406318 in _start (/out/ftfuzzer+0x406318) DEDUP_TOKEN: TT_Load_Glyph_Header--load_truetype_glyph--TT_Load_Glyph UndefinedBehaviorSanitizer can not provide additional info. SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/freetype2/src/truetype/ttgload.c:307:26 in TT_Load_Glyph_Header ==7838==ABORTING
cpp
a632fb547e23fe129a579fabf60a992fd7d98d02
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=589d1f0899343b18c3181f35451550dc1b904bef
null
arvo:9124
n132/arvo:9124-vul
/src/aom
[ { "end_line": 2773, "function_name": "tile_worker_hook_init", "start_line": 2731, "target_file": "/src/aom/av1/decoder/decodeframe.c" }, { "end_line": 2810, "function_name": "tile_worker_hook", "start_line": 2775, "target_file": "/src/aom/av1/decoder/decodeframe.c" } ]
Index-out-of-bounds
aom
ubsan
INFO: Seed: 3414122278 INFO: Loaded 1 modules (72394 inline 8-bit counters): 72394 [0x1299380, 0x12aae4a), INFO: Loaded 1 PC tables (72394 PCs): 72394 [0x12aae50,0x13c5af0), /out/av1_dec_fuzzer_threaded: Running 1 inputs 1 time(s) each. Running: /tmp/poc /src/aom/av1/common/txb_common.h:675:29: runtime error: index 255 out of bounds for type 'const uint8_t [22]' #0 0x4a2317 in get_txb_ctx /src/aom/av1/common/txb_common.h:675:29 #1 0x4a2317 in av1_read_coeffs_txb_facade /src/aom/av1/decoder/decodetxb.c:335 #2 0x47f9d7 in read_coeffs_tx_intra_block /src/aom/av1/decoder/decodeframe.c:169:5 #3 0x47f9d7 in decode_token_and_recon_block /src/aom/av1/decoder/decodeframe.c:1138 #4 0x47f9d7 in decode_block /src/aom/av1/decoder/decodeframe.c:1371 #5 0x47b5f0 in decode_partition /src/aom/av1/decoder/decodeframe.c:1464:7 #6 0x47a602 in decode_tile_sb_row /src/aom/av1/decoder/decodeframe.c:2526:5 #7 0x47a602 in decode_tile /src/aom/av1/decoder/decodeframe.c:2572 #8 0x47a0bb in tile_worker_hook /src/aom/av1/decoder/decodeframe.c:2801:7 #9 0xbf0b67 in execute /src/aom/aom_util/aom_thread.c:135:27 #10 0xbf0b67 in thread_loop /src/aom/aom_util/aom_thread.c:44 #11 0x7fc76a8296b9 in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76b9) #12 0x7fc769f3d51c in clone (/lib/x86_64-linux-gnu/libc.so.6+0x10751c) DEDUP_TOKEN: get_txb_ctx--av1_read_coeffs_txb_facade--read_coeffs_tx_intra_block SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior /src/aom/av1/common/txb_common.h:675:29 in
cpp
6c5d07efa2b887fee25836e85a9f50f897c6c806
https://aomedia.googlesource.com/aom/+/1f68feef03dd9d5b5a4cac0a8f69b9f4cb1da915%5E%21/
null
arvo:9180
n132/arvo:9180-vul
/src/librawspeed
[ { "end_line": 463, "function_name": "ArwDecoder::GetWB", "start_line": 402, "target_file": "/src/librawspeed/src/librawspeed/decoders/ArwDecoder.cpp" } ]
Use-of-uninitialized-value
librawspeed
msan
INFO: Seed: 787102424 INFO: Loaded 1 modules (12643 inline 8-bit counters): 12643 [0xca89f0, 0xcabb53), INFO: Loaded 1 PC tables (12643 PCs): 12643 [0xcabb58,0xcdd188), /out/TiffDecoderFuzzer-ArwDecoder: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==6593==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x62927e in rawspeed::Buffer::getData(unsigned int, unsigned int) const /src/librawspeed/src/librawspeed/io/Buffer.h:127:9 #1 0x62927e in rawspeed::Buffer::getSubView(unsigned int, unsigned int) const /src/librawspeed/src/librawspeed/io/Buffer.h:114 #2 0x62927e in rawspeed::TiffIFD::TiffIFD(rawspeed::TiffIFD*, std::__1::set<rawspeed::Buffer, rawspeed::RangesOverlapCmp<rawspeed::Buffer>, std::__1::allocator<rawspeed::Buffer> >*, rawspeed::DataBuffer const&, unsigned int) /src/librawspeed/src/librawspeed/tiff/TiffIFD.cpp:120 #3 0x525da5 in rawspeed::TiffRootIFD::TiffRootIFD(rawspeed::TiffIFD*, std::__1::set<rawspeed::Buffer, rawspeed::RangesOverlapCmp<rawspeed::Buffer>, std::__1::allocator<rawspeed::Buffer> >*, rawspeed::DataBuffer const&, unsigned int) /src/librawspeed/src/librawspeed/tiff/TiffIFD.h:136:9 #4 0x525da5 in rawspeed::ArwDecoder::GetWB() /src/librawspeed/src/librawspeed/decoders/ArwDecoder.cpp:444 #5 0x522a99 in rawspeed::ArwDecoder::decodeMetaDataInternal(rawspeed::CameraMetaData const*) /src/librawspeed/src/librawspeed/decoders/ArwDecoder.cpp:357:7 #6 0x5b48be in rawspeed::RawDecoder::decodeMetaData(rawspeed::CameraMetaData const*) /src/librawspeed/src/librawspeed/decoders/RawDecoder.cpp:278:5 #7 0x4ec30d in LLVMFuzzerTestOneInput /src/librawspeed/fuzz/librawspeed/decoders/TiffDecoders/main.cpp:77:14 #8 0x7c2346 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:515:13 #9 0x781911 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6 #10 0x795b66 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:703:9 #11 0x780a51 in main /src/libfuzzer/FuzzerMain.cpp:20:10 #12 0x7fa9b571783f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #13 0x46dcf8 in _start (/out/TiffDecoderFuzzer-ArwDecoder+0x46dcf8) DEDUP_TOKEN: rawspeed::Buffer::getData(unsigned int, unsigned int) const--rawspeed::Buffer::getSubView(unsigned int, unsigned int) const--rawspeed::TiffIFD::TiffIFD(rawspeed::TiffIFD*, std::__1::set<rawspeed::Buffer, rawspeed::RangesOverlapCmp<rawspeed::Buffer>, std::__1::allocator<rawspeed::Buffer> >*, rawspeed::DataBuffer const&, unsigned int) Uninitialized value was created by a heap allocation #0 0x4aba14 in __interceptor_posix_memalign /src/llvm/projects/compiler-rt/lib/msan/msan_interceptors.cc:173 #1 0x5f9898 in rawspeed::alignedMalloc(unsigned long, unsigned long) /src/librawspeed/src/librawspeed/common/Memory.cpp:62:12 #2 0x509cb6 in unsigned char* rawspeed::alignedMalloc<unsigned char, 16ul>(unsigned long) /src/librawspeed/src/librawspeed/common/Memory.h:60:31 #3 0x509cb6 in rawspeed::Buffer::Create(unsigned int) /src/librawspeed/src/librawspeed/io/Buffer.cpp:39 #4 0x524162 in rawspeed::ArwDecoder::GetWB() /src/librawspeed/src/librawspeed/decoders/ArwDecoder.cpp:431:28 #5 0x522a99 in rawspeed::ArwDecoder::decodeMetaDataInternal(rawspeed::CameraMetaData const*) /src/librawspeed/src/librawspeed/decoders/ArwDecoder.cpp:357:7 #6 0x5b48be in rawspeed::RawDecoder::decodeMetaData(rawspeed::CameraMetaData const*) /src/librawspeed/src/librawspeed/decoders/RawDecoder.cpp:278:5 #7 0x4ec30d in LLVMFuzzerTestOneInput /src/librawspeed/fuzz/librawspeed/decoders/TiffDecoders/main.cpp:77:14 #8 0x7c2346 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:515:13 #9 0x781911 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6 #10 0x795b66 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:703:9 #11 0x780a51 in main /src/libfuzzer/FuzzerMain.cpp:20:10 #12 0x7fa9b571783f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) DEDUP_TOKEN: __interceptor_posix_memalign--rawspeed::alignedMalloc(unsigned long, unsigned long)--unsigned char* rawspeed::alignedMalloc<unsigned char, 16ul>(unsigned long) SUMMARY: MemorySanitizer: use-of-uninitialized-value /src/librawspeed/src/librawspeed/io/Buffer.h:127:9 in rawspeed::Buffer::getData(unsigned int, unsigned int) const Unique heap origins: 91 Stack depot allocated bytes: 7160 Unique origin histories: 6 History depot allocated bytes: 144 Exiting
cpp
2c4bdfd42340ef006e330280f6d59000da6f2e8d
https://github.com/darktable-org/rawspeed/commit/77a1a1f0b7b7367b345afd484a22d5585ee410d6
The vulnerability in ArwDecoder::GetWB() occurs because the encrypted area is not rounded down to a multiple of 4, which can lead to issues detected by memory sanitizers.
arvo:9188
n132/arvo:9188-vul
/src/aom
[ { "end_line": 1516, "function_name": "decode_partition", "start_line": 1404, "target_file": "/src/aom/av1/decoder/decodeframe.c" }, { "end_line": 2773, "function_name": "tile_worker_hook_init", "start_line": 2731, "target_file": "/src/aom/av1/decoder/decodeframe.c" }, { "end_line": 2810, "function_name": "tile_worker_hook", "start_line": 2775, "target_file": "/src/aom/av1/decoder/decodeframe.c" } ]
Index-out-of-bounds
aom
ubsan
INFO: Seed: 1996167617 INFO: Loaded 1 modules (72394 inline 8-bit counters): 72394 [0x1299380, 0x12aae4a), INFO: Loaded 1 PC tables (72394 PCs): 72394 [0x12aae50,0x13c5af0), /out/av1_dec_fuzzer_threaded: Running 1 inputs 1 time(s) each. Running: /tmp/poc /src/aom/av1/common/blockd.h:921:25: runtime error: index 255 out of bounds for type 'const TX_SIZE [22]' #0 0x480aa3 in av1_get_max_uv_txsize /src/aom/av1/common/blockd.h:921:25 #1 0x480aa3 in av1_get_tx_size /src/aom/av1/common/blockd.h:930 #2 0x480aa3 in decode_token_and_recon_block /src/aom/av1/decoder/decodeframe.c:1125 #3 0x480aa3 in decode_block /src/aom/av1/decoder/decodeframe.c:1371 #4 0x47b4d5 in decode_partition /src/aom/av1/decoder/decodeframe.c:1504:9 #5 0x47b696 in decode_partition /src/aom/av1/decoder/decodeframe.c:1471:7 #6 0x47b664 in decode_partition /src/aom/av1/decoder/decodeframe.c:1469:7 #7 0x47a602 in decode_tile_sb_row /src/aom/av1/decoder/decodeframe.c:2526:5 #8 0x47a602 in decode_tile /src/aom/av1/decoder/decodeframe.c:2572 #9 0x47a0bb in tile_worker_hook /src/aom/av1/decoder/decodeframe.c:2801:7 #10 0xbf095d in execute /src/aom/aom_util/aom_thread.c:135:27 #11 0x47742b in launch_dec_workers /src/aom/av1/decoder/decodeframe.c #12 0x47742b in decode_tiles_mt /src/aom/av1/decoder/decodeframe.c:3075 #13 0x474e8e in av1_decode_tg_tiles_and_wrapup /src/aom/av1/decoder/decodeframe.c #14 0x4a43fc in read_one_tile_group_obu /src/aom/av1/decoder/obu.c:379:3 #15 0x4a43fc in aom_decode_frame_from_obus /src/aom/av1/decoder/obu.c:853 #16 0x49c2be in av1_receive_compressed_data /src/aom/av1/decoder/decoder.c:436:7 #17 0x46991d in frame_worker_hook /src/aom/av1/av1_dx_iface.c:343:31 #18 0xbf095d in execute /src/aom/aom_util/aom_thread.c:135:27 #19 0x466762 in decode_one /src/aom/av1/av1_dx_iface.c:500:3 #20 0x466762 in decoder_decode /src/aom/av1/av1_dx_iface.c:584 #21 0x461fa6 in aom_codec_decode /src/aom/aom/src/aom_decoder.c:111:11 #22 0x461482 in LLVMFuzzerTestOneInput /src/av1_dec_fuzzer.cc:52:33 #23 0x443f10 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:526:13 #24 0x4361fc in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6 #25 0x4399a7 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9 #26 0x435f08 in main /src/libfuzzer/FuzzerMain.cpp:20:10 #27 0x7fa5dd3f383f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #28 0x40c008 in _start (/out/av1_dec_fuzzer_threaded+0x40c008) DEDUP_TOKEN: av1_get_max_uv_txsize--av1_get_tx_size--decode_token_and_recon_block SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior /src/aom/av1/common/blockd.h:921:25 in
cpp
6c5d07efa2b887fee25836e85a9f50f897c6c806
https://aomedia.googlesource.com/aom/+/1f68feef03dd9d5b5a4cac0a8f69b9f4cb1da915%5E%21/
null
arvo:9230
n132/arvo:9230-vul
/src/wireshark
[ { "end_line": 1332, "function_name": "expand_dns_name", "start_line": 1153, "target_file": "/src/wireshark/epan/dissectors/packet-dns.c" } ]
Heap-buffer-overflow WRITE 2
wireshark
asan
oss-fuzzshark: disabling: ip oss-fuzzshark: disabling: udp oss-fuzzshark: disabling: udplite oss-fuzzshark: disabling: ospf oss-fuzzshark: disabling: bgp oss-fuzzshark: disabling: json oss-fuzzshark: disabling: snort oss-fuzzshark: configured for dissector: bootp in table: udp.port INFO: Seed: 2091284779 INFO: Loaded 1 modules (319333 inline 8-bit counters): 319333 [0xcd75a10, 0xcdc3975), INFO: Loaded 1 PC tables (319333 PCs): 319333 [0xcdc3978,0xd2a2fc8), /out/fuzzshark_udp_port-bootp: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==9346==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000004ebf at pc 0x00000049df03 bp 0x7ffc7ad3fb20 sp 0x7ffc7ad3f2d0 WRITE of size 5 at 0x611000004ebf thread T0 SCARINESS: 37 (5-byte-write-heap-buffer-overflow) #0 0x49df02 in __vsnprintf_chk /src/llvm/projects/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:1571 #1 0x25e975e in g_snprintf (/out/fuzzshark_udp_port-bootp+0x25e975e) #2 0xd3ed29 in expand_dns_name /src/wireshark/epan/dissectors/packet-dns.c:1255:27 #3 0xd3ed29 in get_dns_name /src/wireshark/epan/dissectors/packet-dns.c:1342 #4 0xa2d7cc in dissect_bootpopt_dhcp_domain_search /src/wireshark/epan/dissectors/packet-bootp.c:2735:16 #5 0x5e8603 in call_dissector_through_handle /src/wireshark/epan/packet.c:692:9 #6 0x5e8603 in call_dissector_work /src/wireshark/epan/packet.c:777 #7 0x5e80b9 in dissector_try_uint_new /src/wireshark/epan/packet.c:1359:8 #8 0xa36cce in bootp_option /src/wireshark/epan/dissectors/packet-bootp.c:1996:7 #9 0xa27674 in dissect_bootp /src/wireshark/epan/dissectors/packet-bootp.c:6553:18 #10 0x5e8603 in call_dissector_through_handle /src/wireshark/epan/packet.c:692:9 #11 0x5e8603 in call_dissector_work /src/wireshark/epan/packet.c:777 #12 0x5f0561 in call_dissector_only /src/wireshark/epan/packet.c:3090:8 #13 0x5f0561 in call_all_postdissectors /src/wireshark/epan/packet.c:3465 #14 0xe97edb in dissect_frame /src/wireshark/epan/dissectors/packet-frame.c:681:5 #15 0x5e8603 in call_dissector_through_handle /src/wireshark/epan/packet.c:692:9 #16 0x5e8603 in call_dissector_work /src/wireshark/epan/packet.c:777 #17 0x5e55de in call_dissector_only /src/wireshark/epan/packet.c:3090:8 #18 0x5e55de in call_dissector_with_data /src/wireshark/epan/packet.c:3103 #19 0x5e4d9b in dissect_record /src/wireshark/epan/packet.c:566:3 #20 0x5d9383 in epan_dissect_run /src/wireshark/epan/epan.c:538:2 #21 0x52fdcc in LLVMFuzzerTestOneInput /src/wireshark/tools/oss-fuzzshark/fuzzshark.c:360:2 #22 0x55a3dc in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:526:13 #23 0x53157a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6 #24 0x53ca01 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9 #25 0x530c1c in main /src/libfuzzer/FuzzerMain.cpp:20:10 #26 0x7f1680f4283f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #27 0x41f098 in _start (/out/fuzzshark_udp_port-bootp+0x41f098) DEDUP_TOKEN: __vsnprintf_chk--g_snprintf--expand_dns_name 0x611000004ebf is located 0 bytes to the right of 255-byte region [0x611000004dc0,0x611000004ebf) allocated by thread T0 here: #0 0x4ecf27 in __interceptor_malloc /src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:121 #1 0x25cb328 in g_malloc (/out/fuzzshark_udp_port-bootp+0x25cb328) #2 0xd3e97f in expand_dns_name /src/wireshark/epan/dissectors/packet-dns.c:1171:16 #3 0xd3e97f in get_dns_name /src/wireshark/epan/dissectors/packet-dns.c:1342 #4 0xa2d7cc in dissect_bootpopt_dhcp_domain_search /src/wireshark/epan/dissectors/packet-bootp.c:2735:16 #5 0x5e8603 in call_dissector_through_handle /src/wireshark/epan/packet.c:692:9 #6 0x5e8603 in call_dissector_work /src/wireshark/epan/packet.c:777 #7 0x5e80b9 in dissector_try_uint_new /src/wireshark/epan/packet.c:1359:8 #8 0xa36cce in bootp_option /src/wireshark/epan/dissectors/packet-bootp.c:1996:7 #9 0xa27674 in dissect_bootp /src/wireshark/epan/dissectors/packet-bootp.c:6553:18 #10 0x5e8603 in call_dissector_through_handle /src/wireshark/epan/packet.c:692:9 #11 0x5e8603 in call_dissector_work /src/wireshark/epan/packet.c:777 #12 0x5f0561 in call_dissector_only /src/wireshark/epan/packet.c:3090:8 #13 0x5f0561 in call_all_postdissectors /src/wireshark/epan/packet.c:3465 #14 0xe97edb in dissect_frame /src/wireshark/epan/dissectors/packet-frame.c:681:5 #15 0x5e8603 in call_dissector_through_handle /src/wireshark/epan/packet.c:692:9 #16 0x5e8603 in call_dissector_work /src/wireshark/epan/packet.c:777 #17 0x5e55de in call_dissector_only /src/wireshark/epan/packet.c:3090:8 #18 0x5e55de in call_dissector_with_data /src/wireshark/epan/packet.c:3103 #19 0x5e4d9b in dissect_record /src/wireshark/epan/packet.c:566:3 #20 0x5d9383 in epan_dissect_run /src/wireshark/epan/epan.c:538:2 #21 0x52fdcc in LLVMFuzzerTestOneInput /src/wireshark/tools/oss-fuzzshark/fuzzshark.c:360:2 #22 0x55a3dc in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:526:13 #23 0x53157a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6 #24 0x53ca01 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9 #25 0x530c1c in main /src/libfuzzer/FuzzerMain.cpp:20:10 #26 0x7f1680f4283f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) DEDUP_TOKEN: __interceptor_malloc--g_malloc--expand_dns_name SUMMARY: AddressSanitizer: heap-buffer-overflow /src/llvm/projects/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:1571 in __vsnprintf_chk Shadow bytes around the buggy address: 0x0c227fff8980: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa 0x0c227fff8990: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff89a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 07 0x0c227fff89b0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c227fff89c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c227fff89d0: 00 00 00 00 00 00 00[07]fa fa fa fa fa fa fa fa 0x0c227fff89e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff89f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8a00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8a10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8a20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==9346==ABORTING
cpp
6f665e36edb3c8d748682c2702b952656c6c273b
https://github.com/wireshark/wireshark/commit/5a560f3f6aa2cbfad957cf6223e50c3b61ef575b
A buffer overflow vulnerability exists in the DNS code due to an off-by-one error when writing to a buffer. The "maxname" variable represents the size of the buffer, including the "null label" (NUL byte), but the code writes past the end of the buffer. This can result in a write buffer overflow.
arvo:9287
n132/arvo:9287-vul
/src/openvswitch
[ { "end_line": 689, "function_name": "ipv6_sanity_check", "start_line": 670, "target_file": "/src/openvswitch/lib/flow.c" } ]
Heap-buffer-overflow READ 1
openvswitch
asan
INFO: Seed: 3983540721 INFO: Loaded 1 modules (37409 inline 8-bit counters): 37409 [0xe89370, 0xe92591), INFO: Loaded 1 PC tables (37409 PCs): 37409 [0xa65e48,0xaf8058), /out/flow_extract_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==27556==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6110000003a7 at pc 0x000000537c16 bp 0x7ffe1155ab50 sp 0x7ffe1155ab48 READ of size 1 at 0x6110000003a7 thread T0 SCARINESS: 12 (1-byte-read-heap-buffer-overflow) #0 0x537c15 in parse_icmpv6 /src/openvswitch/lib/flow.c:420:32 #1 0x5366e5 in miniflow_extract /src/openvswitch/lib/flow.c:987:21 #2 0x532a5c in flow_extract /src/openvswitch/lib/flow.c:623:5 #3 0x530145 in LLVMFuzzerTestOneInput /src/flow_extract_target.c:28:5 #4 0x885bcc in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:526:13 #5 0x85ca7a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6 #6 0x868249 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9 #7 0x85c11c in main /src/libfuzzer/FuzzerMain.cpp:20:10 #8 0x7fa2b4ba683f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #9 0x41f4d8 in _start (/out/flow_extract_fuzzer+0x41f4d8) DEDUP_TOKEN: parse_icmpv6--miniflow_extract--flow_extract 0x6110000003a7 is located 4 bytes to the right of 227-byte region [0x6110000002c0,0x6110000003a3) allocated by thread T0 here: #0 0x52bdf8 in operator new[](unsigned long) /src/llvm/projects/compiler-rt/lib/asan/asan_new_delete.cc:96 #1 0x8859d8 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:517:23 #2 0x85ca7a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6 #3 0x868249 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9 #4 0x85c11c in main /src/libfuzzer/FuzzerMain.cpp:20:10 #5 0x7fa2b4ba683f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) DEDUP_TOKEN: operator new[](unsigned long)--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) SUMMARY: AddressSanitizer: heap-buffer-overflow /src/openvswitch/lib/flow.c:420:32 in parse_icmpv6 Shadow bytes around the buggy address: 0x0c227fff8020: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa 0x0c227fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff8040: 00 00 00 00 00 00 00 00 00 00 00 00 03 fa fa fa 0x0c227fff8050: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c227fff8060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c227fff8070: 00 00 00 00[03]fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff80b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==27556==ABORTING
cpp
f5129153e3b12c0b9ca6b355f9062d91a67d2942
https://github.com/openvswitch/ovs/commit/4fe08016068514be7a8751d86f6ad30bde344949
null
arvo:9294
n132/arvo:9294-vul
/src/openvswitch
[ { "end_line": 689, "function_name": "ipv6_sanity_check", "start_line": 670, "target_file": "/src/openvswitch/lib/flow.c" } ]
Heap-buffer-overflow READ 2
openvswitch
asan
INFO: Seed: 4267508276 INFO: Loaded 1 modules (37421 inline 8-bit counters): 37421 [0xe8a3f0, 0xe9361d), INFO: Loaded 1 PC tables (37421 PCs): 37421 [0xa66128,0xaf83f8), /out/ofp_print_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==27576==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6110000003e0 at pc 0x00000053086f bp 0x7ffcee4d7a90 sp 0x7ffcee4d7a88 READ of size 2 at 0x6110000003e0 thread T0 SCARINESS: 24 (2-byte-read-heap-buffer-overflow-far-from-bounds) #0 0x53086e in ofp_packet_to_string /src/openvswitch/lib/ofp-print.c:88:49 #1 0x62b0a3 in ofputil_packet_in_private_format /src/openvswitch/lib/ofp-packet.c:1013:24 #2 0x533229 in ofp_print_packet_in /src/openvswitch/lib/ofp-print.c:131:9 #3 0x5315d7 in ofp_to_string /src/openvswitch/lib/ofp-print.c:1246:21 #4 0x532154 in ofp_print /src/openvswitch/lib/ofp-print.c:1290:28 #5 0x5301cf in LLVMFuzzerTestOneInput /src/ofp_print_target.c:53:2 #6 0x885ddc in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:526:13 #7 0x85cc8a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6 #8 0x868459 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9 #9 0x85c32c in main /src/libfuzzer/FuzzerMain.cpp:20:10 #10 0x7f0cf921e83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #11 0x41f518 in _start (/out/ofp_print_fuzzer+0x41f518) DEDUP_TOKEN: ofp_packet_to_string--ofputil_packet_in_private_format--ofp_print_packet_in 0x6110000003e0 is located 32 bytes to the right of 256-byte region [0x6110000002c0,0x6110000003c0) allocated by thread T0 here: #0 0x52be38 in operator new[](unsigned long) /src/llvm/projects/compiler-rt/lib/asan/asan_new_delete.cc:96 #1 0x885be8 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:517:23 #2 0x85cc8a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6 #3 0x868459 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:707:9 #4 0x85c32c in main /src/libfuzzer/FuzzerMain.cpp:20:10 #5 0x7f0cf921e83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) DEDUP_TOKEN: operator new[](unsigned long)--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) SUMMARY: AddressSanitizer: heap-buffer-overflow /src/openvswitch/lib/ofp-print.c:88:49 in ofp_packet_to_string Shadow bytes around the buggy address: 0x0c227fff8020: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa 0x0c227fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff8040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff8050: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c227fff8060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c227fff8070: 00 00 00 00 00 00 00 00 fa fa fa fa[fa]fa fa fa 0x0c227fff8080: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c227fff8090: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c227fff80a0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c227fff80b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff80c0: 04 fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==27576==ABORTING
cpp
f5129153e3b12c0b9ca6b355f9062d91a67d2942
https://github.com/openvswitch/ovs/commit/4fe08016068514be7a8751d86f6ad30bde344949
null
arvo:9808
n132/arvo:9808-vul
/src/boringssl
[ { "end_line": 512, "function_name": "LLVMFuzzerTestOneInput", "start_line": 236, "target_file": "/src/boringssl/fuzz/ssl_ctx_api.cc" } ]
Heap-buffer-overflow READ 1
boringssl
asan
INFO: Seed: 3730282855 INFO: Loaded 1 modules (32124 inline 8-bit counters): 32124 [0xd59d68, 0xd61ae4), INFO: Loaded 1 PC tables (32124 PCs): 32124 [0x9c86b0,0xa45e70), /out/ssl_ctx_api: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==484==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000002b1 at pc 0x00000062e8f9 bp 0x7ffd8eb58070 sp 0x7ffd8eb58068 READ of size 1 at 0x6020000002b1 thread T0 SCARINESS: 12 (1-byte-read-heap-buffer-overflow) #0 0x62e8f8 in parse_sigalgs_list(bssl::Array<unsigned short>*, char const*) /src/boringssl/ssl/ssl_privkey.cc:614:29 #1 0x62dabe in SSL_CTX_set1_sigalgs_list /src/boringssl/ssl/ssl_privkey.cc:763:8 #2 0x5fe7b3 in std::__1::function<void (ssl_ctx_st*, cbs_st*)>::operator()(ssl_ctx_st*, cbs_st*) const /usr/local/bin/../include/c++/v1/functional:1913:12 #3 0x5bebec in LLVMFuzzerTestOneInput /src/boringssl/fuzz/ssl_ctx_api.cc:501:5 #4 0x55a702 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:575:15 #5 0x530f9a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6 #6 0x53c665 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:715:9 #7 0x53061c in main /src/libfuzzer/FuzzerMain.cpp:20:10 #8 0x7fe120f4583f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #9 0x41d368 in _start (/out/ssl_ctx_api+0x41d368) DEDUP_TOKEN: parse_sigalgs_list(bssl::Array<unsigned short>*, char const*)--SSL_CTX_set1_sigalgs_list--std::__1::function<void (ssl_ctx_st*, cbs_st*)>::operator()(ssl_ctx_st*, cbs_st*) const 0x6020000002b1 is located 0 bytes to the right of 1-byte region [0x6020000002b0,0x6020000002b1) allocated by thread T0 here: #0 0x52c288 in operator new[](unsigned long) /src/llvm/projects/compiler-rt/lib/asan/asan_new_delete.cc:109 #1 0x55a4b4 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:562:23 #2 0x530f9a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6 #3 0x53c665 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:715:9 #4 0x53061c in main /src/libfuzzer/FuzzerMain.cpp:20:10 #5 0x7fe120f4583f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) DEDUP_TOKEN: operator new[](unsigned long)--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) SUMMARY: AddressSanitizer: heap-buffer-overflow /src/boringssl/ssl/ssl_privkey.cc:614:29 in parse_sigalgs_list(bssl::Array<unsigned short>*, char const*) Shadow bytes around the buggy address: 0x0c047fff8000: fa fa 00 00 fa fa 00 02 fa fa 00 03 fa fa 00 00 0x0c047fff8010: fa fa fd fd fa fa fd fd fa fa 00 03 fa fa 00 00 0x0c047fff8020: fa fa fd fd fa fa fd fd fa fa 00 03 fa fa 00 05 0x0c047fff8030: fa fa 00 03 fa fa 00 03 fa fa 00 03 fa fa 00 03 0x0c047fff8040: fa fa 00 00 fa fa 00 fa fa fa 00 fa fa fa 00 fa =>0x0c047fff8050: fa fa 01 fa fa fa[01]fa fa fa fa fa fa fa fa fa 0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==484==ABORTING
cpp
17dc94e87466ac8928096c4f45954989d585cfe5
https://boringssl.googlesource.com/boringssl/+/ddedf6d455e33d6a0b3bc40581700f3d252029d7%5E%21/
The SSL_CTX_set1_sigalgs_list function in its current usage expects a NUL-terminated string, but may receive a non-NUL-terminated string if not handled properly, leading to potential security issues. The function should be provided with a NUL-terminated string, such as by using GetString, to avoid this vulnerability.
arvo:9847
n132/arvo:9847-vul
/src/file
[ { "end_line": 243, "function_name": "json_parse_object", "start_line": 194, "target_file": "/src/file/src/is_json.c" } ]
Heap-buffer-overflow READ 1
file
asan
INFO: Seed: 3335381564 INFO: Loaded 1 modules (4063 inline 8-bit counters): 4063 [0x923788, 0x924767), INFO: Loaded 1 PC tables (4063 PCs): 4063 [0x924768,0x934558), /out/magic_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==11002==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000116 at pc 0x0000005f3938 bp 0x7fff642812d0 sp 0x7fff642812c8 READ of size 1 at 0x602000000116 thread T0 SCARINESS: 12 (1-byte-read-heap-buffer-overflow) #0 0x5f3937 in json_parse_object /src/file/src/is_json.c:224:11 #1 0x5f2e95 in json_parse /src/file/src/is_json.c:336:8 #2 0x5f2958 in file_is_json /src/file/src/is_json.c:383:7 #3 0x5db6ff in file_buffer /src/file/src/funcs.c:251:7 #4 0x5c1065 in magic_buffer /src/file/src/magic.c:536:6 #5 0x53031f in LLVMFuzzerTestOneInput /src/magic_fuzzer.cc:52:3 #6 0x569212 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:575:15 #7 0x54145a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6 #8 0x54cc35 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:715:9 #9 0x530a2c in main /src/libfuzzer/FuzzerMain.cpp:20:10 #10 0x7f403ae9083f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #11 0x41d3a8 in _start (/out/magic_fuzzer+0x41d3a8) DEDUP_TOKEN: json_parse_object--json_parse--file_is_json 0x602000000116 is located 0 bytes to the right of 6-byte region [0x602000000110,0x602000000116) allocated by thread T0 here: #0 0x52bdb8 in operator new[](unsigned long) /src/llvm/projects/compiler-rt/lib/asan/asan_new_delete.cc:109 #1 0x568fc4 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:562:23 #2 0x54145a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6 #3 0x54cc35 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:715:9 #4 0x530a2c in main /src/libfuzzer/FuzzerMain.cpp:20:10 #5 0x7f403ae9083f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) DEDUP_TOKEN: operator new[](unsigned long)--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) SUMMARY: AddressSanitizer: heap-buffer-overflow /src/file/src/is_json.c:224:11 in json_parse_object Shadow bytes around the buggy address: 0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff8000: fa fa 00 fa fa fa fd fd fa fa fd fd fa fa 00 00 0x0c047fff8010: fa fa 00 fa fa fa 00 fa fa fa 00 fa fa fa 06 fa =>0x0c047fff8020: fa fa[06]fa fa fa fd fa fa fa fa fa fa fa fa fa 0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==11002==ABORTING
cpp
6382574724f99e4fd2e3b10580d83c9cb103ec5a
https://github.com/file/file/commit/473e039b48fd72660dd00f4b52a2880cc0dd5632
null
arvo:992
n132/arvo:992-vul
/src/file
[ { "end_line": 1056, "function_name": "cdf_read_property_info", "start_line": 909, "target_file": "/src/file/src/cdf.c" } ]
Use-of-uninitialized-value
file
msan
INFO: Seed: 2518427820 INFO: Loaded 1 modules (3759 guards): [0xa339e0, 0xa3749c), /out/magic_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==10654==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x58bcb9 in cdf_file_property_info /src/file/src/readcdf.c:225:29 #1 0x588991 in cdf_file_summary_info /src/file/src/readcdf.c:345:13 #2 0x5876ca in cdf_check_summary_info /src/file/src/readcdf.c:398:18 #3 0x586732 in file_trycdf /src/file/src/readcdf.c:630:7 #4 0x57febc in file_buffer /src/file/src/funcs.c:243:7 #5 0x54ab67 in magic_buffer /src/file/src/magic.c:547:6 #6 0x498f41 in LLVMFuzzerTestOneInput /src/magic_fuzzer.cc:52:3 #7 0x4d7f29 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:451:13 #8 0x4d8b51 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:408:3 #9 0x49ad6e in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:268:6 #10 0x4a966d in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:620:9 #11 0x499eb1 in main /src/libfuzzer/FuzzerMain.cpp:20:10 #12 0x7fc6595a483f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #13 0x41f238 in _start (/out/magic_fuzzer+0x41f238) DEDUP_TOKEN: cdf_file_property_info--cdf_file_summary_info--cdf_check_summary_info Uninitialized value was created by a heap allocation #0 0x44d745 in realloc /src/llvm/projects/compiler-rt/lib/msan/msan_interceptors.cc:935 #1 0x5d1cdc in cdf_grow_info /src/file/src/cdf.c:866:8 #2 0x5d0280 in cdf_read_property_info /src/file/src/cdf.c:941:8 #3 0x5d33df in cdf_unpack_summary_info /src/file/src/cdf.c:1080:6 #4 0x588820 in cdf_file_summary_info /src/file/src/readcdf.c:302:13 #5 0x5876ca in cdf_check_summary_info /src/file/src/readcdf.c:398:18 #6 0x586732 in file_trycdf /src/file/src/readcdf.c:630:7 #7 0x57febc in file_buffer /src/file/src/funcs.c:243:7 #8 0x54ab67 in magic_buffer /src/file/src/magic.c:547:6 #9 0x498f41 in LLVMFuzzerTestOneInput /src/magic_fuzzer.cc:52:3 #10 0x4d7f29 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:451:13 #11 0x4d8b51 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:408:3 #12 0x49ad6e in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:268:6 #13 0x4a966d in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:620:9 #14 0x499eb1 in main /src/libfuzzer/FuzzerMain.cpp:20:10 #15 0x7fc6595a483f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) DEDUP_TOKEN: realloc--cdf_grow_info--cdf_read_property_info SUMMARY: MemorySanitizer: use-of-uninitialized-value /src/file/src/readcdf.c:225:29 in cdf_file_property_info Unique heap origins: 59 Stack depot allocated bytes: 4352 Unique origin histories: 8 History depot allocated bytes: 192 Exiting
cpp
8a942980f3f705226300f43f4b49a557c0918660
https://github.com/file/file/commit/fd42e11948eeeece5b17558706cd2426eb447644
null
arvo:9922
n132/arvo:9922-vul
/src/file
[ { "end_line": 167, "function_name": "json_parse_string", "start_line": 118, "target_file": "/src/file/src/is_json.c" } ]
Heap-buffer-overflow READ 1
file
asan
INFO: Seed: 375800122 INFO: Loaded 1 modules (4064 inline 8-bit counters): 4064 [0x923788, 0x924768), INFO: Loaded 1 PC tables (4064 PCs): 4064 [0x924768,0x934568), /out/magic_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==11002==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000113 at pc 0x0000005f32ee bp 0x7ffed48d4a00 sp 0x7ffed48d49f8 READ of size 1 at 0x602000000113 thread T0 SCARINESS: 12 (1-byte-read-heap-buffer-overflow) #0 0x5f32ed in json_parse_string /src/file/src/is_json.c:130:12 #1 0x5f2da5 in json_parse /src/file/src/is_json.c:330:8 #2 0x5f34b9 in json_parse_array /src/file/src/is_json.c:175:8 #3 0x5f2d21 in json_parse /src/file/src/is_json.c:334:8 #4 0x5f2958 in file_is_json /src/file/src/is_json.c:385:7 #5 0x5db6ff in file_buffer /src/file/src/funcs.c:251:7 #6 0x5c1065 in magic_buffer /src/file/src/magic.c:536:6 #7 0x53031f in LLVMFuzzerTestOneInput /src/magic_fuzzer.cc:52:3 #8 0x569212 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:575:15 #9 0x54145a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6 #10 0x54cc35 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:715:9 #11 0x530a2c in main /src/libfuzzer/FuzzerMain.cpp:20:10 #12 0x7f76041f183f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #13 0x41d3a8 in _start (/out/magic_fuzzer+0x41d3a8) DEDUP_TOKEN: json_parse_string--json_parse--json_parse_array 0x602000000113 is located 0 bytes to the right of 3-byte region [0x602000000110,0x602000000113) allocated by thread T0 here: #0 0x52bdb8 in operator new[](unsigned long) /src/llvm/projects/compiler-rt/lib/asan/asan_new_delete.cc:109 #1 0x568fc4 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:562:23 #2 0x54145a in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6 #3 0x54cc35 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:715:9 #4 0x530a2c in main /src/libfuzzer/FuzzerMain.cpp:20:10 #5 0x7f76041f183f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) DEDUP_TOKEN: operator new[](unsigned long)--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) SUMMARY: AddressSanitizer: heap-buffer-overflow /src/file/src/is_json.c:130:12 in json_parse_string Shadow bytes around the buggy address: 0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff8000: fa fa 00 fa fa fa fd fd fa fa fd fd fa fa 00 00 0x0c047fff8010: fa fa 00 fa fa fa 00 fa fa fa 00 fa fa fa 03 fa =>0x0c047fff8020: fa fa[03]fa fa fa fd fa fa fa fa fa fa fa fa fa 0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==11002==ABORTING
cpp
473e039b48fd72660dd00f4b52a2880cc0dd5632
https://github.com/file/file/commit/87f27958cfbb05d262504976f66db70c24d5061f
null