task_id stringlengths 8 10 | docker_image stringlengths 17 19 | basedir stringclasses 157
values | target_functions listlengths 1 3 | crash_type stringclasses 85
values | project_name stringclasses 157
values | sanitizer stringclasses 3
values | sanitizer_output stringlengths 1.13k 6.5M | language stringclasses 2
values | vuln_commit stringlengths 40 40 | fix stringlengths 69 110 | vulnerability_description stringlengths 38 824 ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
arvo:20188 | n132/arvo:20188-vul | /src/opensc | [
{
"end_line": 115,
"function_name": "fuzz_reader_connect",
"start_line": 99,
"target_file": "/src/opensc/src/tests/fuzzing/fuzz_pkcs15_reader.c"
}
] | Heap-buffer-overflow WRITE {*} | opensc | asan | INFO: Seed: 2713151264
INFO: Loaded 1 modules (21532 inline 8-bit counters): 21532 [0xbf5780, 0xbfab9c),
INFO: Loaded 1 PC tables (21532 PCs): 21532 [0x8c17a8,0x915968),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==56... | c | a487e9595e0030c1775e324b2a1bbba5f982bfe2 | https://github.com/OpenSC/OpenSC/commit/4ef7ed9ffd2acacfc5026db4fb984a1386a07bdb | null |
arvo:20199 | n132/arvo:20199-vul | /src/arrow | [
{
"end_line": 330,
"function_name": "ValidateArray",
"start_line": 263,
"target_file": "/src/arrow/cpp/src/arrow/array/validate.cc"
}
] | Heap-buffer-overflow READ 8 | arrow | asan | INFO: Seed: 2151527062
INFO: Loaded 1 modules (293490 inline 8-bit counters): 293490 [0x1940010, 0x1987a82),
INFO: Loaded 1 PC tables (293490 PCs): 293490 [0x1987a88,0x1e021a8),
/out/arrow-ipc-stream-fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===========================================================... | cpp | 92931939ac2c8c89c278c2413608c3f1d2663f91 | https://github.com/apache/arrow/commit/a6307cc8a0127a4852b7d3d2c20940a094eed0d6 | null |
arvo:20203 | n132/arvo:20203-vul | /src/arrow | [
{
"end_line": 330,
"function_name": "ValidateArray",
"start_line": 263,
"target_file": "/src/arrow/cpp/src/arrow/array/validate.cc"
}
] | Global-buffer-overflow READ 1 | arrow | asan | INFO: Seed: 3212450906
INFO: Loaded 1 modules (293490 inline 8-bit counters): 293490 [0x1940010, 0x1987a82),
INFO: Loaded 1 PC tables (293490 PCs): 293490 [0x1987a88,0x1e021a8),
/out/arrow-ipc-stream-fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===========================================================... | cpp | 92931939ac2c8c89c278c2413608c3f1d2663f91 | https://github.com/apache/arrow/commit/a6307cc8a0127a4852b7d3d2c20940a094eed0d6 | null |
arvo:20288 | n132/arvo:20288-vul | /src/imagemagick | [
{
"end_line": 2646,
"function_name": "FxEvaluateSubexpression",
"start_line": 1426,
"target_file": "/src/imagemagick/MagickCore/fx.c"
}
] | Use-of-uninitialized-value | imagemagick | msan | INFO: Seed: 3088268908
INFO: Loaded 1 modules (180839 inline 8-bit counters): 180839 [0x2c373e0, 0x2c63647),
INFO: Loaded 1 PC tables (180839 PCs): 180839 [0x2c63648,0x2f25cb8),
/out/encoder_label_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==208858==WARNING: MemorySanitizer: use-of-uninitialized-val... | cpp | 59125f0af71ea162da80e14fb4bc44ca7c4a8038 | https://github.com/imagemagick/imagemagick/commit/4bb0afabfcbf9123f95a787db9b10af791dd1dc7 | null |
arvo:20364 | n132/arvo:20364-vul | /src/wabt | [
{
"end_line": 1311,
"function_name": "BinaryReaderIR::OnFunctionSymbol",
"start_line": 1292,
"target_file": "/src/wabt/src/binary-reader-ir.cc"
}
] | UNKNOWN READ | wabt | asan | INFO: Seed: 3131135977
INFO: Loaded 1 modules (9209 inline 8-bit counters): 9209 [0x8461210, 0x8463609),
INFO: Loaded 1 PC tables (9209 PCs): 9209 [0x8354f44,0x8366f0c),
/out/wasm2wat_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEADLYSIGNAL
===========================================... | cpp | 49a78c6173e5702326c9fb033f9ca1057f2cff64 | https://github.com/WebAssembly/wabt/commit/ef0d3789f229e1176910e45fc47600336ae3aed9 | null |
arvo:20391 | n132/arvo:20391-vul | /src/qpdf | [
{
"end_line": 235,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 225,
"target_file": "/src/qpdf/fuzz/qpdf_fuzzer.cc"
}
] | Use-of-uninitialized-value | qpdf | msan | INFO: Seed: 877436314
INFO: Loaded 1 modules (35737 inline 8-bit counters): 35737 [0x10df240, 0x10e7dd9),
INFO: Loaded 1 PC tables (35737 PCs): 35737 [0x10e7de0,0x1173770),
/out/qpdf_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
WARNING: fuzz input: can't find PDF header
WARNING: fuzz input: file is da... | cpp | c1684eae9144129027642f5069a0fd97f0559ec8 | https://github.com/qpdf/qpdf/commit/232f5fc9f3bed8e1b02bca5d10b2eca444e30f95 | null |
arvo:20493 | n132/arvo:20493-vul | /src/jbig2dec | [
{
"end_line": 1104,
"function_name": "jbig2_decode_generic_template0_TPGDON",
"start_line": 906,
"target_file": "/src/jbig2dec/jbig2_generic.c"
}
] | Use-of-uninitialized-value | jbig2dec | msan | INFO: Seed: 2453089386
INFO: Loaded 1 modules (1977 inline 8-bit counters): 1977 [0x7f40b8, 0x7f4871),
INFO: Loaded 1 PC tables (1977 PCs): 1977 [0x5aab10,0x5b26a0),
/out/jbig2_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==10132==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x58042b in... | cpp | 9d1f28c1e9b8619073b36400e787eff8d84b27c3 | git://git.ghostscript.com/jbig2dec.git743d799bfd9014f9ef638634656fea21390d1444 | null |
arvo:20529 | n132/arvo:20529-vul | /src/janus-gateway | [
{
"end_line": 270,
"function_name": "janus_rtcp_incoming_transport_cc",
"start_line": 170,
"target_file": "/src/janus-gateway/rtcp.c"
}
] | Dynamic-stack-buffer-overflow READ 2 | janus-gateway | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/rtcp_fuzzer < INPUT_FILE
or
/out/rtcp_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/rtcp_fuzzer [-N]
... | cpp | 06b438119464296fb2e7f7861bbf12bc5727d211 | https://github.com/meetecho/janus-gateway/commit/03cfcd34a472e1a249221a8fb1d275784ee63ea3 | null |
arvo:20563 | n132/arvo:20563-vul | /src/ndpi | [
{
"end_line": 266,
"function_name": "ndpi_search_mail_smtp_tcp",
"start_line": 66,
"target_file": "/src/ndpi/src/lib/protocols/mail_smtp.c"
}
] | Heap-buffer-overflow READ 4 | ndpi | asan | INFO: Seed: 3564236824
INFO: Loaded 1 modules (14317 inline 8-bit counters): 14317 [0xaf9510, 0xafccfd),
INFO: Loaded 1 PC tables (14317 PCs): 14317 [0xafcd00,0xb34bd0),
/out/fuzz_process_packet: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==1... | c | 7234f369499e02f44efcbbf0efe43bae596ddc53 | https://github.com/ntop/nDPI/commit/d4ae8a5f164167ef4fcf5b76b743e92b9e76d9dd | null |
arvo:20644 | n132/arvo:20644-vul | /src/ndpi | [
{
"end_line": 1777,
"function_name": "ndpi_workflow_process_packet",
"start_line": 1379,
"target_file": "/src/ndpi/example/reader_util.c"
}
] | Heap-buffer-overflow READ 1 | ndpi | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_ndpi_reader
=================================================================
==16398==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000000108 at pc 0x0000004d4a85 bp 0x7ffc489e7630 sp 0x7ffc489e7628
READ of size 1 at 0... | c | b287dccecfecd32f114b043f395019eb3b000791 | https://github.com/ntop/nDPI/commit/bf7dcd63c3a663cd0e1e8c567511ccfd8047d24a | null |
arvo:20655 | n132/arvo:20655-vul | /src/harfbuzz | [
{
"end_line": 77,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 34,
"target_file": "/src/harfbuzz/test/fuzzing/hb-set-fuzzer.cc"
}
] | Heap-buffer-overflow READ 4 | harfbuzz | asan | INFO: Seed: 2252443695
INFO: Loaded 1 modules (28333 inline 8-bit counters): 28333 [0x85b8cd0, 0x85bfb7d),
INFO: Loaded 1 PC tables (28333 PCs): 28333 [0x84a981c,0x84e0d84),
/out/hb-set-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==188... | cpp | 7b42403c1c03e6f2f32fcc792b588ca5a42b1e19 | https://github.com/harfbuzz/harfbuzz/commit/97229244ebd2e50ec0021ecd442e3c1c27156a5c | A minor overflow issue exists in hb-set-fuzzer where the size check compares against the pointer size instead of the struct size, potentially allowing operations with insufficiently sized data. |
arvo:20712 | n132/arvo:20712-vul | /src/ndpi | [
{
"end_line": 222,
"function_name": "search_valid_dns",
"start_line": 83,
"target_file": "/src/ndpi/src/lib/protocols/dns.c"
}
] | Heap-buffer-overflow READ 2 | ndpi | asan | INFO: Seed: 1588430608
INFO: Loaded 1 modules (12046 inline 8-bit counters): 12046 [0xab8c20, 0xabbb2e),
INFO: Loaded 1 PC tables (12046 PCs): 12046 [0xabbb30,0xaeac10),
/out/fuzz_process_packet: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==1... | c | edce5a8c1fbdf7fd7362e4ca3b44da52356487fc | https://github.com/ntop/nDPI/commit/080e23e30ebc1940be5f503b84cb397fea1323cb | null |
arvo:20747 | n132/arvo:20747-vul | /src/ndpi | [
{
"end_line": 1807,
"function_name": "ndpi_workflow_process_packet",
"start_line": 1406,
"target_file": "/src/ndpi/example/reader_util.c"
}
] | UNKNOWN | ndpi | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_ndpi_reader
=================================================================
==16392==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60400000047b at pc 0x0000004da9ab bp 0x7ffff849ecd0 sp 0x7ffff849ecc8
READ of size 4 at 0... | c | fdf8dd724fc86c4d38daa66b62021ae2d34f1432 | https://github.com/ntop/nDPI/commit/3eb9907dd7bfd21be4980632761852eaee5aec81 | null |
arvo:20766 | n132/arvo:20766-vul | /src/ndpi | [
{
"end_line": 1809,
"function_name": "ndpi_workflow_process_packet",
"start_line": 1406,
"target_file": "/src/ndpi/example/reader_util.c"
}
] | Heap-buffer-overflow READ 2 | ndpi | asan | INFO: Seed: 4111652964
INFO: Loaded 1 modules (18012 inline 8-bit counters): 18012 [0xb812e0, 0xb8593c),
INFO: Loaded 1 PC tables (18012 PCs): 18012 [0xb85940,0xbcbf00),
/out/fuzz_ndpi_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==1644... | c | b2cbe76e716e628438a94d2e112acddb67ec89f2 | https://github.com/ntop/nDPI/commit/e9195589d29d86da1849ad0d195900e6567354cf | null |
arvo:20775 | n132/arvo:20775-vul | /src/openthread | [
{
"end_line": 279,
"function_name": "Leader::HandleCommissioningSet",
"start_line": 182,
"target_file": "/src/openthread/src/core/thread/network_data_leader_ftd.cpp"
}
] | Stack-buffer-overflow READ 2 | openthread | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/ip6-send-fuzzer
=================================================================
==18830==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f019577f71e at pc 0x0000004f557e bp 0x7ffe12ed7830 sp 0x7ffe12ed7828
READ of size 2 at 0... | cpp | ea09b6e0642cca442f92cc722d60ec93b22da68e | https://github.com/openthread/openthread/commit/167d616bc2eefe9e4712da5a65681502de5851c0 | A buffer overflow vulnerability exists in the HandleCommissioningSet() function in network-data, where Commissioner Dataset TLVs with extended TLV length are not properly rejected. |
arvo:20797 | n132/arvo:20797-vul | /src/ndpi | [
{
"end_line": 1231,
"function_name": "processClientServerHello",
"start_line": 705,
"target_file": "/src/ndpi/src/lib/protocols/tls.c"
}
] | Index-out-of-bounds | ndpi | ubsan | INFO: Seed: 3888275133
INFO: Loaded 1 modules (17233 inline 8-bit counters): 17233 [0x8866e0, 0x88aa31),
INFO: Loaded 1 PC tables (17233 PCs): 17233 [0x88aa38,0x8cdf48),
/out/fuzz_process_packet: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
protocols/tls.c:1178:18: runtime error: index 1026 out of bounds for ... | c | 4976d93d4e7ce5e63cb562fb7f0f916c3103e2de | https://github.com/ntop/nDPI/commit/3c05d4551dfb1181770416c4301a4f92415e41af | null |
arvo:20800 | n132/arvo:20800-vul | /src/yara | [
{
"end_line": 372,
"function_name": "pe_parse_debug_directory",
"start_line": 284,
"target_file": "/src/yara/libyara/modules/pe/pe.c"
}
] | Heap-buffer-overflow READ 4 | yara | asan | INFO: Seed: 2368957
INFO: Loaded 1 modules (8523 inline 8-bit counters): 8523 [0x8f0110, 0x8f225b),
INFO: Loaded 1 PC tables (8523 PCs): 8523 [0x665ff8,0x6874a8),
/out/pe_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==38369==ERROR: Addr... | cpp | 9616f8708ff4583ba708159577d957cbad3bb5c2 | https://github.com/VirusTotal/yara/commit/871b921f79facab9f99bf0855f7b99027671b719 | A buffer overrun occurs in the pe_parse_debug_directory function. |
arvo:20830 | n132/arvo:20830-vul | /src/ndpi | [
{
"end_line": 352,
"function_name": "ndpi_search_mail_imap_tcp",
"start_line": 38,
"target_file": "/src/ndpi/src/lib/protocols/mail_imap.c"
}
] | Index-out-of-bounds | ndpi | ubsan | INFO: Seed: 423667838
INFO: Loaded 1 modules (17234 inline 8-bit counters): 17234 [0x847dc0, 0x84c112),
INFO: Loaded 1 PC tables (17234 PCs): 17234 [0x84c118,0x88f638),
/out/fuzz_process_packet: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
protocols/mail_imap.c:167:4: runtime error: index 256 out of bounds fo... | c | 83fdfe24d09396f293f6e78ecd341526f339a995 | https://github.com/ntop/nDPI/commit/933351840dbed3646aeb4f75a359649434b001eb | An off-by-one error exists in the imap function. |
arvo:20832 | n132/arvo:20832-vul | /src/ndpi | [
{
"end_line": 222,
"function_name": "search_valid_dns",
"start_line": 83,
"target_file": "/src/ndpi/src/lib/protocols/dns.c"
}
] | Heap-buffer-overflow READ 2 | ndpi | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_process_packet < INPUT_FILE
or
/out/fuzz_process_packet INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/f... | cpp | 3c05d4551dfb1181770416c4301a4f92415e41af | https://github.com/ntop/nDPI/commit/fe513014a8f5156b243ec2eb5e6862a0506c6632 | null |
arvo:20856 | n132/arvo:20856-vul | /src/ndpi | [
{
"end_line": 90,
"function_name": "check_ymsg",
"start_line": 59,
"target_file": "/src/ndpi/src/lib/protocols/yahoo.c"
}
] | Heap-buffer-overflow READ 4 | ndpi | asan | INFO: Seed: 2467151449
INFO: Loaded 1 modules (12080 inline 8-bit counters): 12080 [0xab9ce0, 0xabcc10),
INFO: Loaded 1 PC tables (12080 PCs): 12080 [0xabcc10,0xaebf10),
/out/fuzz_process_packet: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==1... | c | e9195589d29d86da1849ad0d195900e6567354cf | https://github.com/ntop/nDPI/commit/c6acf97bfbe5ad26db3c2f5dd4d379ac674d6fb3 | null |
arvo:20920 | n132/arvo:20920-vul | /src/imagemagick | [
{
"end_line": 731,
"function_name": "TIFFGetProfiles",
"start_line": 664,
"target_file": "/src/imagemagick/coders/tiff.c"
}
] | Heap-buffer-overflow READ 16 | imagemagick | asan | INFO: Seed: 148329004
INFO: Loaded 1 modules (182204 inline 8-bit counters): 182204 [0x2005780, 0x2031f3c),
INFO: Loaded 1 PC tables (182204 PCs): 182204 [0x2031f40,0x22f9b00),
/out/encoder_tiff_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==============================================================... | cpp | 4b0098f85e7011e95cd52869fd0bacf25889a15f | https://github.com/imagemagick/imagemagick/commit/824f344ceb823e156ad6e85314d79c087933c2a0 | null |
arvo:20959 | n132/arvo:20959-vul | /src/wabt | [
{
"end_line": 1311,
"function_name": "BinaryReaderIR::OnFunctionSymbol",
"start_line": 1292,
"target_file": "/src/wabt/src/binary-reader-ir.cc"
}
] | UNKNOWN READ | wabt | asan | INFO: Seed: 1481457140
INFO: Loaded 1 modules (9225 inline 8-bit counters): 9225 [0x9dc420, 0x9de829),
INFO: Loaded 1 PC tables (9225 PCs): 9225 [0x6b1050,0x6d50e0),
/out/wasm2wat_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==2975==ERR... | cpp | 49a78c6173e5702326c9fb033f9ca1057f2cff64 | https://github.com/WebAssembly/wabt/commit/ef0d3789f229e1176910e45fc47600336ae3aed9 | null |
arvo:21000 | n132/arvo:21000-vul | /src/ndpi | [
{
"end_line": 103,
"function_name": "ndpi_search_setup_capwap",
"start_line": 39,
"target_file": "/src/ndpi/src/lib/protocols/capwap.c"
}
] | Heap-buffer-overflow READ 4 | ndpi | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_process_packet < INPUT_FILE
or
/out/fuzz_process_packet INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/f... | cpp | 1e933e8b026f6f88f27d64ec2260013f38d268d0 | https://github.com/ntop/nDPI/commit/4976d93d4e7ce5e63cb562fb7f0f916c3103e2de | A buffer overread occurs in the ndpi_search_setup_capwap function. |
arvo:21070 | n132/arvo:21070-vul | /src/openthread | [
{
"end_line": 169,
"function_name": "EnergyScanServer::HandleScanResult",
"start_line": 137,
"target_file": "/src/openthread/src/core/thread/energy_scan_server.cpp"
}
] | Index-out-of-bounds | openthread | ubsan | INFO: Seed: 1454048726
INFO: Loaded 1 modules (26796 inline 8-bit counters): 26796 [0x9bdfd0, 0x9c487c),
INFO: Loaded 1 PC tables (26796 PCs): 26796 [0x61de98,0x686958),
/out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
thread/energy_scan_server.cpp:143:9: runtime error: index 64 out of bound... | cpp | 3530fc5907eafa33064b4f23805659400bdba75d | https://github.com/openthread/openthread/commit/c77342e5cca0866fdec3ac540900f688bf841a00 | A buffer overrun occurs in the energy-scan feature when receiving energy results. |
arvo:21139 | n132/arvo:21139-vul | /src/htslib | [
{
"end_line": 2543,
"function_name": "vcf_parse_format",
"start_line": 2203,
"target_file": "/src/htslib/vcf.c"
}
] | UNKNOWN WRITE | htslib | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/hts_open_fuzzer
[W::vcf_parse] Contig '@SQ' is not defined in the header. (Quick workaround: index the file with tabix.)
[W::vcf_parse] FILTER 'AF:dx##' is not defined in the header
[W::vcf_parse] INFO 'L:SQ' is not defined in the header, a... | c | 8ff8bb328f5d4c2981933ff7847374ddc747d572 | https://github.com/samtools/htslib/commit/29c294e6842a56ba3b9a24a24a5f6de1575b0961 | null |
arvo:21165 | n132/arvo:21165-vul | /src/binutils-gdb | [
{
"end_line": 2387,
"function_name": "setup_sections",
"start_line": 2072,
"target_file": "/src/binutils-gdb/bfd/som.c"
}
] | UNKNOWN READ | binutils-gdb | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_bfd
AddressSanitizer:DEADLYSIGNAL
=================================================================
==58630==ERROR: AddressSanitizer: SEGV on unknown address 0x60703e3e3e5e (pc 0x7fbe30f877c6 bp 0x7ffff113db10 sp 0x7ffff113d2c8 T0)
==5... | c | 44f41bb7a1568dbe2e4e642e6c3c2e9ba3d47d92 | https://github.com/bminor/binutils-gdb/commit/8248d21a5b8b7bb9970163b8b327f5ac2f857f33 | A vulnerability exists in som.c within the setup_sections function, where subspace.name is not properly sanity checked, leading to a potential unknown read. |
arvo:21176 | n132/arvo:21176-vul | /src/c-ares | [
{
"end_line": 182,
"function_name": "ares_parse_soa_reply",
"start_line": 43,
"target_file": "/src/c-ares/ares_parse_soa_reply.c"
}
] | Heap-double-free | c-ares | asan | Reading 40 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/ares_parse_reply_fuzzer < INPUT_FILE
or
/out/ares_parse_reply_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz exec... | cpp | 61f06d2a58e61a48f570a614a3974b8c6d1f06e4 | https://github.com/c-ares/c-ares/commit/910df394fc40d90dda233b27bf122e50357943e6 | null |
arvo:21289 | n132/arvo:21289-vul | /src/ndpi | [
{
"end_line": 63,
"function_name": "ndpi_search_fix",
"start_line": 31,
"target_file": "/src/ndpi/src/lib/protocols/fix.c"
}
] | Heap-buffer-overflow READ 1 | ndpi | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_process_packet < INPUT_FILE
or
/out/fuzz_process_packet INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/f... | cpp | e9195589d29d86da1849ad0d195900e6567354cf | https://github.com/ntop/nDPI/commit/c6acf97bfbe5ad26db3c2f5dd4d379ac674d6fb3 | null |
arvo:21296 | n132/arvo:21296-vul | /src/ndpi | [
{
"end_line": 1234,
"function_name": "processClientServerHello",
"start_line": 705,
"target_file": "/src/ndpi/src/lib/protocols/tls.c"
}
] | Use-of-uninitialized-value | ndpi | msan | INFO: Seed: 607253689
INFO: Loaded 1 modules (18016 inline 8-bit counters): 18016 [0xaa3905, 0xaa7f65),
INFO: Loaded 1 PC tables (18016 PCs): 18016 [0xaa7f68,0xaee568),
/out/fuzz_ndpi_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==16449==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x5b... | c | c6acf97bfbe5ad26db3c2f5dd4d379ac674d6fb3 | https://github.com/ntop/nDPI/commit/2aec630202bf976e8ee978922441a414d4176cb8 | null |
arvo:21326 | n132/arvo:21326-vul | /src/binutils-gdb | [
{
"end_line": 727,
"function_name": "bfd_h8_disassemble",
"start_line": 312,
"target_file": "/src/binutils-gdb/opcodes/h8300-dis.c"
}
] | Use-of-uninitialized-value | binutils-gdb | msan | INFO: Seed: 78972752
INFO: Loaded 1 modules (187242 inline 8-bit counters): 187242 [0x3463b37, 0x34916a1),
INFO: Loaded 1 PC tables (187242 PCs): 187242 [0x2be3918,0x2ebefb8),
/out/fuzz_disassemble: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==298502==WARNING: MemorySanitizer: use-of-uninitialized-value
... | c | ff7685105468702de87b75599b1ea88cc309541c | https://github.com/bminor/binutils-gdb/commit/832a580781060f54731fcf654d76ac1332037a47 | null |
arvo:21339 | n132/arvo:21339-vul | /src/binutils-gdb | [
{
"end_line": 118,
"function_name": "msdos_object_p",
"start_line": 44,
"target_file": "/src/binutils-gdb/bfd/i386msdos.c"
}
] | Use-of-uninitialized-value | binutils-gdb | msan | INFO: Seed: 4092257321
INFO: Loaded 1 modules (146857 inline 8-bit counters): 146857 [0x22bb0c7, 0x22dee70),
INFO: Loaded 1 PC tables (146857 PCs): 146857 [0x1d17e38,0x1f558c8),
/out/fuzz_bfd: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==298501==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x... | c | 4c4addbe57711f1cdbb72305b8cbd03a68ae2e34 | https://github.com/bminor/binutils-gdb/commit/ff7685105468702de87b75599b1ea88cc309541c | An uninitialized read occurs in i386msdos.c within the msdos_object_p function due to not catching a -1 return value from bfd_bread. |
arvo:21349 | n132/arvo:21349-vul | /src/ndpi | [
{
"end_line": 1234,
"function_name": "processClientServerHello",
"start_line": 705,
"target_file": "/src/ndpi/src/lib/protocols/tls.c"
}
] | Use-of-uninitialized-value | ndpi | msan | INFO: Seed: 622911915
INFO: Loaded 1 modules (18081 inline 8-bit counters): 18081 [0xaa68a5, 0xaaaf46),
INFO: Loaded 1 PC tables (18081 PCs): 18081 [0xaaaf48,0xaf1958),
/out/fuzz_ndpi_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==16589==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x5b... | c | 81e97d75153e38ce024a308b75d64edeb4b5e9bb | https://github.com/ntop/nDPI/commit/4ec3e6c064b56f1434bd4c887bd96d0916d07f2e | null |
arvo:21354 | n132/arvo:21354-vul | /src/binutils-gdb | [
{
"end_line": 118,
"function_name": "msdos_object_p",
"start_line": 44,
"target_file": "/src/binutils-gdb/bfd/i386msdos.c"
}
] | Use-of-uninitialized-value | binutils-gdb | msan | INFO: Seed: 2582117421
INFO: Loaded 1 modules (146834 inline 8-bit counters): 146834 [0x22ba0c7, 0x22dde59),
INFO: Loaded 1 PC tables (146834 PCs): 146834 [0x1d16f98,0x1f548b8),
/out/fuzz_bfd: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==298458==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x... | c | 5935fd15306c26ead8274cbeab3287770f2ac92a | https://github.com/bminor/binutils-gdb/commit/5e737279c6e832a757f0326128e5a5f96fbdd291 | null |
arvo:21356 | n132/arvo:21356-vul | /src/ndpi | [
{
"end_line": 4705,
"function_name": "ndpi_fill_protocol_category",
"start_line": 4670,
"target_file": "/src/ndpi/src/lib/ndpi_main.c"
}
] | Use-of-uninitialized-value | ndpi | msan | INFO: Seed: 1793365683
INFO: Loaded 1 modules (12150 inline 8-bit counters): 12150 [0x9a1542, 0x9a44b8),
INFO: Loaded 1 PC tables (12150 PCs): 12150 [0x9a44b8,0x9d3c18),
/out/fuzz_process_packet: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==16591==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 ... | c | cf47ba234a59db325a382db4bbdf10187f93eb9a | https://github.com/ntop/nDPI/commit/c1f9f05d338bd8236930df60e08b7cf635790ebf | null |
arvo:21359 | n132/arvo:21359-vul | /src/binutils-gdb | [
{
"end_line": 822,
"function_name": "suffix",
"start_line": 769,
"target_file": "/src/binutils-gdb/opcodes/z80-dis.c"
}
] | Use-of-uninitialized-value | binutils-gdb | msan | INFO: Seed: 976141348
INFO: Loaded 1 modules (187234 inline 8-bit counters): 187234 [0x3463b37, 0x3491699),
INFO: Loaded 1 PC tables (187234 PCs): 187234 [0x2be3388,0x2ebe9a8),
/out/fuzz_disassemble: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==298502==WARNING: MemorySanitizer: use-of-uninitialized-value
... | c | 5ab2fbf185935f387fd5c1f8b14ba9fe04b41b39 | https://github.com/bminor/binutils-gdb/commit/a18cd0cab43f45b05e9f8bcbf8fed1d67834442d | An uninitialized memory read occurs in z80-dis.c within the suffix function when processing certain input, such as objdump -d -m ez80-adl with the bytes 0x40, 0xfd, due to the mybuf variable not being initialized. |
arvo:21414 | n132/arvo:21414-vul | /src/binutils-gdb | [
{
"end_line": 559,
"function_name": "pass_over",
"start_line": 511,
"target_file": "/src/binutils-gdb/bfd/tekhex.c"
}
] | Use-of-uninitialized-value | binutils-gdb | msan | INFO: Seed: 1728468275
INFO: Loaded 1 modules (146854 inline 8-bit counters): 146854 [0x22bb0f7, 0x22dee9d),
INFO: Loaded 1 PC tables (146854 PCs): 146854 [0x1d17d18,0x1f55778),
/out/fuzz_bfd: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==298501==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x... | c | d262797294039fc828e36f76c45e462966c5c72a | https://github.com/bminor/binutils-gdb/commit/b3b360dec78845e30e7994cd633905da5668a96c | An uninitialized read occurs in tekhex.c within the pass_over function, where the buffer is read without first checking is_eof. |
arvo:21426 | n132/arvo:21426-vul | /src/openvswitch | [
{
"end_line": 5224,
"function_name": "scan_gtpu_metadata",
"start_line": 5182,
"target_file": "/src/openvswitch/lib/odp-util.c"
}
] | Use-of-uninitialized-value | openvswitch | msan | INFO: Seed: 416563991
INFO: Loaded 1 modules (40910 inline 8-bit counters): 40910 [0xf9cb58, 0xfa6b26),
INFO: Loaded 1 PC tables (40910 PCs): 40910 [0xbdffc8,0xc7fca8),
/out/odp_target: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==27725==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x5525ee i... | c | 0ef70536eb418a13e10113a884f665d47fb732e3 | https://github.com/openvswitch/ovs/commit/1e1a15669e324e0971c46a31f3de233e3a0ba5b2 | null |
arvo:21520 | n132/arvo:21520-vul | /src/libavc | [
{
"end_line": 816,
"function_name": "ih264d_parse_sei_message",
"start_line": 751,
"target_file": "/src/libavc/decoder/ih264d_sei.c"
}
] | Heap-buffer-overflow READ 4 | libavc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/avc_dec_fuzzer
=================================================================
==1644==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7fc9e5d46000 at pc 0x000000537188 bp 0x7ffe65aed5a0 sp 0x7ffe65aed598
READ of size 4 at 0x7f... | cpp | 66aae99b3dace54afae1bc2f7fc1a78a712a1188 | https://android.googlesource.com/platform/external/libavc/+/f59c3864fe692c0191b40712e1b7a6a05a126c44%5E%21/ | null |
arvo:21571 | n132/arvo:21571-vul | /src/jbig2dec | [
{
"end_line": 1043,
"function_name": "jbig2_text_region",
"start_line": 578,
"target_file": "/src/jbig2dec/jbig2_text.c"
}
] | Use-of-uninitialized-value | jbig2dec | msan | INFO: Seed: 1174059577
INFO: Loaded 1 modules (2018 inline 8-bit counters): 2018 [0x7f5d78, 0x7f655a),
INFO: Loaded 1 PC tables (2018 PCs): 2018 [0x5ac6c0,0x5b44e0),
/out/jbig2_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
memory: limit: 3221225472 Mbyte peak usage: 136 Mbyte
jbig2 decoder FATAL ERROR:... | cpp | dc14b5a69be02341d84e2956131f93f962408af2 | git://git.ghostscript.com/jbig2dec.git778862c21165b485302010beb5fb0765f8338b96 | null |
arvo:21578 | n132/arvo:21578-vul | /src/libucl | [
{
"end_line": 1105,
"function_name": "ucl_lex_json_string",
"start_line": 1029,
"target_file": "/src/libucl/src/ucl_parser.c"
}
] | Heap-buffer-overflow READ 1 | libucl | asan | INFO: Seed: 860106432
INFO: Loaded 1 modules (2943 inline 8-bit counters): 2943 [0x8039b0, 0x80452f),
INFO: Loaded 1 PC tables (2943 PCs): 2943 [0x5b16f8,0x5bcee8),
/out/ucl_add_string_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==6652... | c | 71f16a847414eb6d9b014bdae2844c8a1134fc04 | https://github.com/vstakhov/libucl/commit/ac8d76023386fb1f1b31b47cd294e28831929c96 | A vulnerability exists in the ucl_lex_json_string function where, if a string ends with a '\', the function attempts to read the next character before performing a bounds check, leading to a potential out-of-bounds read. |
arvo:21579 | n132/arvo:21579-vul | /src/libucl | [
{
"end_line": 1937,
"function_name": "ucl_parse_value",
"start_line": 1686,
"target_file": "/src/libucl/src/ucl_parser.c"
}
] | Heap-buffer-overflow READ 1 | libucl | asan | INFO: Seed: 1827139557
INFO: Loaded 1 modules (2943 inline 8-bit counters): 2943 [0x8039b0, 0x80452f),
INFO: Loaded 1 PC tables (2943 PCs): 2943 [0x5b16f8,0x5bcee8),
/out/ucl_add_string_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==664... | c | ac8d76023386fb1f1b31b47cd294e28831929c96 | https://github.com/vstakhov/libucl/commit/08de3581e8bc1ca855cf96061583363b8570215e | An out-of-bounds read occurs in the ucl_parse_value function in cases where a string ends with a Multiline terminator without a newline. The function attempts to read the next character to check for a newline without verifying if the pointer is past the end of the buffer. |
arvo:21715 | n132/arvo:21715-vul | /src/wireshark | [
{
"end_line": 61,
"function_name": "tvb_get_ipv4_addr_with_prefix_len",
"start_line": 46,
"target_file": "/src/wireshark/epan/addr_and_mask.c"
}
] | Stack-buffer-overflow READ 4 | wireshark | asan | oss-fuzzshark: disabling: ip
oss-fuzzshark: disabling: udp
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: dhcp
oss-fuzzshark: disabling: json
oss-fuzzshark: disabling: snort
oss-fuzzshark: configured for dissector: bgp in table: tcp.port
INFO: Seed: 1463586390
INFO: Loaded 1 ... | c | 251b16bb933a61b649eadff816bd48bccaa1b6cd | https://github.com/wireshark/wireshark/commit/6d25a1062d092fdae62defeb7ed83a0807fe238a | null |
arvo:21718 | n132/arvo:21718-vul | /src/wireshark | [
{
"end_line": 61,
"function_name": "tvb_get_ipv4_addr_with_prefix_len",
"start_line": 46,
"target_file": "/src/wireshark/epan/addr_and_mask.c"
}
] | Stack-buffer-overflow READ 4 | wireshark | asan | oss-fuzzshark: disabling: udp
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: bgp
oss-fuzzshark: disabling: dhcp
oss-fuzzshark: disabling: json
oss-fuzzshark: disabling: snort
oss-fuzzshark: configured for dissector: ip
INFO: Seed: 371522154
INFO: Loaded 1 modules (355129 in... | c | 251b16bb933a61b649eadff816bd48bccaa1b6cd | https://github.com/wireshark/wireshark/commit/6d25a1062d092fdae62defeb7ed83a0807fe238a | null |
arvo:21780 | n132/arvo:21780-vul | /src/ndpi | [
{
"end_line": 62,
"function_name": "ndpi_search_oracle",
"start_line": 34,
"target_file": "/src/ndpi/src/lib/protocols/oracle.c"
}
] | Heap-buffer-overflow READ 1 | ndpi | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_process_packet < INPUT_FILE
or
/out/fuzz_process_packet INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/f... | cpp | db16a987c57c2fa097b5efabb66cef16caeddb03 | https://github.com/ntop/nDPI/commit/17235d234eb6a55fd0753ab4f3b6fc8f66eb7659 | null |
arvo:21960 | n132/arvo:21960-vul | /src/clamav-devel | [
{
"end_line": 1209,
"function_name": "cli_vba_readdir_new",
"start_line": 364,
"target_file": "/src/clamav-devel/libclamav/vba_extract.c"
}
] | Heap-buffer-overflow READ {*} | clamav-devel | asan | INFO: Seed: 1508442631
INFO: Loaded 1 modules (43948 inline 8-bit counters): 43948 [0xe66600, 0xe711ac),
INFO: Loaded 1 PC tables (43948 PCs): 43948 [0xe711b0,0xf1cc70),
/out/clamav_scanfile_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
... | cpp | 4b7a73815266f916f1b86033b806fa4ef182e6db | https://github.com/Cisco-Talos/clamav-devel/commit/a97ce0c8371162d51972d7e03e4592e7d8e8e0e3 | The vba parser lacks size checks to validate size data parsed from a VBA file, which allows a possible buffer overflow read. |
arvo:21998 | n132/arvo:21998-vul | /src/oniguruma | [
{
"end_line": 3590,
"function_name": "check_node_in_look_behind",
"start_line": 3514,
"target_file": "/src/oniguruma/src/regcomp.c"
}
] | Heap-use-after-free READ 4 | oniguruma | asan | Reading 43 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzzer < INPUT_FILE
or
/out/fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /... | cpp | 598a1bb258d849386b4e268eea80fc31e658a261 | https://github.com/kkos/oniguruma/commit/5066ddb254b830bb583e62521ea7ac838f6df121 | null |
arvo:22022 | n132/arvo:22022-vul | /src/ndpi | [
{
"end_line": 70,
"function_name": "ndpi_search_nats_tcp",
"start_line": 42,
"target_file": "/src/ndpi/src/lib/protocols/nats.c"
}
] | Heap-buffer-overflow READ 1 | ndpi | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_process_packet < INPUT_FILE
or
/out/fuzz_process_packet INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/f... | cpp | f7f705406f103a46672f73e9ffb189286ce6bacf | https://github.com/ntop/nDPI/commit/db16a987c57c2fa097b5efabb66cef16caeddb03 | null |
arvo:22026 | n132/arvo:22026-vul | /src/openvswitch | [
{
"end_line": 5224,
"function_name": "scan_gtpu_metadata",
"start_line": 5182,
"target_file": "/src/openvswitch/lib/odp-util.c"
}
] | Use-of-uninitialized-value | openvswitch | msan | INFO: Seed: 3199561460
INFO: Loaded 1 modules (40910 inline 8-bit counters): 40910 [0xf9cb58, 0xfa6b26),
INFO: Loaded 1 PC tables (40910 PCs): 40910 [0xbdffc8,0xc7fca8),
/out/odp_target: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==27740==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x53f72c ... | c | 0ef70536eb418a13e10113a884f665d47fb732e3 | https://github.com/openvswitch/ovs/commit/1e1a15669e324e0971c46a31f3de233e3a0ba5b2 | null |
arvo:22110 | n132/arvo:22110-vul | /src/leptonica | [
{
"end_line": 50,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 3,
"target_file": "/src/leptonica/prog/fuzzing/colorquant_fuzzer.cc"
}
] | Heap-use-after-free READ 8 | leptonica | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/colorquant_fuzzer < INPUT_FILE
or
/out/colorquant_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/color... | cpp | 56315e1081efde6e14b88840d53876816fb2a7ca | https://github.com/DanBloomberg/leptonica/commit/a523d9bb1aaf91e758eb8d2ece55a33a877544cb | null |
arvo:22167 | n132/arvo:22167-vul | /src/ndpi | [
{
"end_line": 5113,
"function_name": "ndpi_parse_packet_line_info",
"start_line": 4848,
"target_file": "/src/ndpi/src/lib/ndpi_main.c"
}
] | Heap-buffer-overflow READ 8 | ndpi | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_ndpi_reader < INPUT_FILE
or
/out/fuzz_ndpi_reader INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/fuzz_nd... | cpp | 4ceff1dc77bb75919f9394983529d89c604a700f | https://github.com/ntop/nDPI/commit/61066fb106efa6d3d95b67e47b662de208b2b622 | null |
arvo:22169 | n132/arvo:22169-vul | /src/ndpi | [
{
"end_line": 5102,
"function_name": "ndpi_parse_packet_line_info",
"start_line": 4838,
"target_file": "/src/ndpi/src/lib/ndpi_main.c"
}
] | Heap-buffer-overflow READ 2 | ndpi | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_ndpi_reader < INPUT_FILE
or
/out/fuzz_ndpi_reader INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/fuzz_nd... | cpp | 3874f0e0e0293dd977fda31d3f50c69ebcad4463 | https://github.com/ntop/nDPI/commit/bbbc5fdbae79c72dbe157e02dfee4ef9f18014b5 | null |
arvo:22231 | n132/arvo:22231-vul | /src/htslib | [
{
"end_line": 2759,
"function_name": "cram_decode_slice",
"start_line": 2138,
"target_file": "/src/htslib/cram/cram_decode.c"
}
] | Heap-buffer-overflow READ {*} | htslib | asan | INFO: Seed: 3292646677
INFO: Loaded 1 modules (18151 inline 8-bit counters): 18151 [0x9c7f00, 0x9cc5e7),
INFO: Loaded 1 PC tables (18151 PCs): 18151 [0x712b20,0x759990),
/out/hts_open_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==2052=... | c | fc431ebc252166f47f798e20954c5ccf8be83a8c | https://github.com/samtools/htslib/commit/382867a850b74e7285166a67ee3243560cd974ac | null |
arvo:2242 | n132/arvo:2242-vul | /src/file | [
{
"end_line": 1298,
"function_name": "mcopy",
"start_line": 1175,
"target_file": "/src/file/src/softmagic.c"
}
] | Use-of-uninitialized-value | file | msan | INFO: Seed: 3742660834
INFO: Loaded 1 modules (3851 guards): [0xa32600, 0xa3622c),
/out/magic_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialized bytes in __interceptor_memchr at offset 5 inside [0x70100000006c, 320)
==10652==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x5a0592 in ... | cpp | 1562e15149268477b395ec71309d13f8be99a83b | https://github.com/file/file/commit/55cb70a24a58fc73b7a2b9d1b2a49845668342cc | null |
arvo:22507 | n132/arvo:22507-vul | /src/mruby | [
{
"end_line": 1132,
"function_name": "mrb_str_format",
"start_line": 563,
"target_file": "/src/mruby/mrbgems/mruby-sprintf/src/sprintf.c"
}
] | Stack-buffer-overflow WRITE 1 | mruby | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/mruby_fuzzer
=================================================================
==2719==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f11ab84cb01 at pc 0x0000005f5dd4 bp 0x7ffcb31e2660 sp 0x7ffcb31e2658
WRITE of size 1 at 0x7f... | c | 69c62415c07698d45e68ad2384a5204baf9e5f4d | https://github.com/mruby/mruby/commit/15c63688e3f1a3c6067e6af70e3e9bf999d91389 | The integer format can exceed 32 characters on 64-bit platforms, due to components such as the format modifier (up to 4 characters), maximum width (up to 19 digits), period separator (1 character), maximum precision (up to 19 digits), format specifier (1 character), and NUL terminator (1 byte), resulting in a total len... |
arvo:22665 | n132/arvo:22665-vul | /src/opensc | [
{
"end_line": 2192,
"function_name": "auth_read_binary",
"start_line": 2103,
"target_file": "/src/opensc/src/libopensc/card-oberthur.c"
}
] | Heap-buffer-overflow READ {*} | opensc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader
=================================================================
==58335==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d000000c33 at pc 0x0000004961ba bp 0x7ffd99a9bd10 sp 0x7ffd99a9b4d8
READ of size 256 ... | c | 4bc03cb55dc2be4a3af9ded56ac4e481ab76beb1 | https://github.com/OpenSC/OpenSC/commit/55fd3db2b5f2ecdb8d2bc148270b75ec6ff2ed2f | null |
arvo:22864 | n132/arvo:22864-vul | /src/ndpi | [
{
"end_line": 482,
"function_name": "processCertificateElements",
"start_line": 233,
"target_file": "/src/ndpi/src/lib/protocols/tls.c"
}
] | Use-of-uninitialized-value | ndpi | msan | INFO: Seed: 2447722595
INFO: Loaded 1 modules (13104 inline 8-bit counters): 13104 [0x99b3b2, 0x99e6e2),
INFO: Loaded 1 PC tables (13104 PCs): 13104 [0x99e6e8,0x9d19e8),
/out/fuzz_process_packet: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==15807==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 ... | c | b6eef17e54999586b6aef8f545c87de4d3ec0ab3 | https://github.com/ntop/nDPI/commit/c793e16050df1de377e400eec6e2b34ccff6ca85 | null |
arvo:22912 | n132/arvo:22912-vul | /src/ndpi | [
{
"end_line": 120,
"function_name": "ndpi_check_spotify",
"start_line": 39,
"target_file": "/src/ndpi/src/lib/protocols/spotify.c"
}
] | Heap-buffer-overflow READ 7 | ndpi | asan | INFO: Seed: 2022679384
INFO: Loaded 1 modules (13107 inline 8-bit counters): 13107 [0xaaece0, 0xab2013),
INFO: Loaded 1 PC tables (13107 PCs): 13107 [0xab2018,0xae5348),
/out/fuzz_process_packet: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==1... | c | 16dc0ec29e0a6b0e12bcebdc2f5619d5d88da697 | https://github.com/ntop/nDPI/commit/241af016e9e2a43d24cbdc2378d813ba523f5126 | null |
arvo:22925 | n132/arvo:22925-vul | /src/oniguruma | [
{
"end_line": 152,
"function_name": "code_to_mbc",
"start_line": 133,
"target_file": "/src/oniguruma/src/euc_jp.c"
}
] | Index-out-of-bounds | oniguruma | ubsan | INFO: Seed: 1563330194
INFO: Loaded 1 modules (11078 inline 8-bit counters): 11078 [0x83d770, 0x8402b6),
INFO: Loaded 1 PC tables (11078 PCs): 11078 [0x591c10,0x5bd070),
/out/fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
regparse.c:8502:48: runtime error: index -400 out of bounds for type 'OnigUChar [7... | c | d59cd4c021c4723ec22cfc1311579574d6fef521 | https://github.com/kkos/oniguruma/commit/86f9fc7c620fa0e41f63b09bfd95e758d1e1f405 | null |
arvo:22967 | n132/arvo:22967-vul | /src/opensc | [
{
"end_line": 644,
"function_name": "tcos_decipher",
"start_line": 599,
"target_file": "/src/opensc/src/libopensc/card-tcos.c"
}
] | Stack-buffer-overflow WRITE {*} | opensc | asan | INFO: Seed: 1722764021
INFO: Loaded 1 modules (21943 inline 8-bit counters): 21943 [0xc093c0, 0xc0e977),
INFO: Loaded 1 PC tables (21943 PCs): 21943 [0x8d16c8,0x927238),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==58... | c | 55fd3db2b5f2ecdb8d2bc148270b75ec6ff2ed2f | https://github.com/OpenSC/OpenSC/commit/9d294de90d1cc66956389856e60b6944b27b4817 | null |
arvo:22977 | n132/arvo:22977-vul | /src/libraw | [
{
"end_line": 528,
"function_name": "LibRaw::parseCR3",
"start_line": 100,
"target_file": "/src/libraw/src/metadata/cr3_parser.cpp"
}
] | Index-out-of-bounds | libraw | ubsan | INFO: Seed: 1045785370
INFO: Loaded 1 modules (66117 inline 8-bit counters): 66117 [0xe70408, 0xe8064d),
INFO: Loaded 1 PC tables (66117 PCs): 66117 [0x915d38,0xa18188),
/out/libraw_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
src/metadata/cr3_parser.cpp:448:9: runtime error: index -1 out of bounds fo... | cpp | 6fbba37dd298bf059b45e6c68364fd92f113625f | https://github.com/libraw/libraw/commit/126ce46cd8d6d64a8031eec9164a9d388675ae77 | null |
arvo:22993 | n132/arvo:22993-vul | /src/libraw | [
{
"end_line": 1147,
"function_name": "LibRaw::identify",
"start_line": 179,
"target_file": "/src/libraw/src/metadata/identify.cpp"
}
] | Use-of-uninitialized-value | libraw | msan | INFO: Seed: 2315957164
INFO: Loaded 1 modules (18056 inline 8-bit counters): 18056 [0xba1c30, 0xba62b8),
INFO: Loaded 1 PC tables (18056 PCs): 18056 [0x8b8f98,0x8ff818),
/out/libraw_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==54043==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x74cb... | cpp | 371161a06d7f98f231a001dad4af2dfb463e270a | https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e | null |
arvo:23021 | n132/arvo:23021-vul | /src/ndpi | [
{
"end_line": 423,
"function_name": "ndpi_search_kerberos",
"start_line": 43,
"target_file": "/src/ndpi/src/lib/protocols/kerberos.c"
}
] | Heap-buffer-overflow READ 1 | ndpi | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_process_packet < INPUT_FILE
or
/out/fuzz_process_packet INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/f... | cpp | 580859a47d164b64c95de2da6df2d49332af4875 | https://github.com/ntop/nDPI/commit/7051acc0b5b8046b6415a454a2eff4fffa18396b | An off-by-one error exists in the Kerberos protocol. |
arvo:23046 | n132/arvo:23046-vul | /src/ndpi | [
{
"end_line": 4345,
"function_name": "ndpi_reset_packet_line_info",
"start_line": 4332,
"target_file": "/src/ndpi/src/lib/ndpi_main.c"
}
] | Heap-use-after-free READ 3 | ndpi | asan | INFO: Seed: 3039658789
INFO: Loaded 1 modules (18838 inline 8-bit counters): 18838 [0xb6dd00, 0xb72696),
INFO: Loaded 1 PC tables (18838 PCs): 18838 [0xb72698,0xbbbff8),
/out/fuzz_ndpi_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==1580... | c | fd0591b4fcebba93a949bcdf2ad12e9f790e68a0 | https://github.com/ntop/nDPI/commit/6a9f5e4f7c3fd5ddab3e6727b071904d76773952 | null |
arvo:23176 | n132/arvo:23176-vul | /src/libraw | [
{
"end_line": 1147,
"function_name": "LibRaw::identify",
"start_line": 179,
"target_file": "/src/libraw/src/metadata/identify.cpp"
}
] | Use-of-uninitialized-value | libraw | msan | INFO: Seed: 4179625615
INFO: Loaded 1 modules (18056 inline 8-bit counters): 18056 [0xba1c30, 0xba62b8),
INFO: Loaded 1 PC tables (18056 PCs): 18056 [0x8b8f98,0x8ff818),
/out/libraw_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==54041==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x5cf9... | cpp | 371161a06d7f98f231a001dad4af2dfb463e270a | https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e | null |
arvo:23197 | n132/arvo:23197-vul | /src/libhevc | [
{
"end_line": 3497,
"function_name": "ihevcd_sao_shift_ctb",
"start_line": 524,
"target_file": "/src/libhevc/decoder/ihevcd_sao.c"
}
] | Use-of-uninitialized-value | libhevc | msan | INFO: Seed: 3381587839
INFO: Loaded 1 modules (9462 inline 8-bit counters): 9462 [0xaba5f8, 0xabcaee),
INFO: Loaded 1 PC tables (9462 PCs): 9462 [0x845db8,0x86ad18),
/out/hevc_dec_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==1212==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x62a66e ... | cpp | 7247e6e4017e540e6b2a99f728362ee997af58b0 | https://android.googlesource.com/platform/external/libhevc/+/3cacdbc078fc3269f2273a45220f3d127e0d87e9%5E%21/ | The function ihevcd_sao_shift_ctb in the decoder has a memory uninitialized issue. |
arvo:23396 | n132/arvo:23396-vul | /src/ndpi | [
{
"end_line": 5116,
"function_name": "ndpi_parse_packet_line_info",
"start_line": 4853,
"target_file": "/src/ndpi/src/lib/ndpi_main.c"
}
] | Heap-buffer-overflow READ 1 | ndpi | asan | INFO: Seed: 2911792074
INFO: Loaded 1 modules (11739 inline 8-bit counters): 11739 [0xaa5240, 0xaa801b),
INFO: Loaded 1 PC tables (11739 PCs): 11739 [0xaa8020,0xad5dd0),
/out/fuzz_process_packet: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==1... | c | 4247dd8322c3eab5e879db75e9fc5df0189aa7c1 | https://github.com/ntop/nDPI/commit/38e4910636bd6273b62e0b195c9d45483c39cc1a | null |
arvo:23433 | n132/arvo:23433-vul | /src/leptonica | [
{
"end_line": 1096,
"function_name": "findNextBorderPixel",
"start_line": 1064,
"target_file": "/src/leptonica/src/ccbord.c"
}
] | Heap-buffer-overflow READ 4 | leptonica | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/ccbord_fuzzer
=================================================================
==76052==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x612000000324 at pc 0x0000004cc124 bp 0x7ffde8763660 sp 0x7ffde8763658
READ of size 4 at 0x61... | cpp | 20e1a048e61df966dbef86cdbdfb46e8baf25f04 | https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842 | A heap-buffer-overflow occurs in the findNextBorderPixel() function due to a missing check of the pix boundary when searching for the next pixel. |
arvo:23499 | n132/arvo:23499-vul | /src/clamav-devel | [
{
"end_line": 1052,
"function_name": "cli_codepage_to_utf8",
"start_line": 774,
"target_file": "/src/clamav-devel/libclamav/entconv.c"
}
] | Heap-buffer-overflow READ {*} | clamav-devel | asan | INFO: Seed: 3876010279
INFO: Loaded 1 modules (44110 inline 8-bit counters): 44110 [0xe6c3c0, 0xe7700e),
INFO: Loaded 1 PC tables (44110 PCs): 44110 [0xe77010,0xf234f0),
/out/clamav_scanfile_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
... | cpp | 8081a6b06cc9f3ceeb06e9a8664db8ae1cca6c16 | https://github.com/Cisco-Talos/clamav-devel/commit/20490786224f4a8256fb395deb9c05084db91708 | A null dereference and memory leaks occur in the egg utf8 conversion. |
arvo:23524 | n132/arvo:23524-vul | /src/ndpi | [
{
"end_line": 6566,
"function_name": "ndpi_check_dga_name",
"start_line": 6501,
"target_file": "/src/ndpi/src/lib/ndpi_main.c"
}
] | Use-of-uninitialized-value | ndpi | msan | INFO: Seed: 350787703
INFO: Loaded 1 modules (12622 inline 8-bit counters): 12622 [0x98d212, 0x990360),
INFO: Loaded 1 PC tables (12622 PCs): 12622 [0x990360,0x9c1840),
/out/fuzz_process_packet: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
[ndpi_main.c:6086] [NDPI] Internal error: please call ndpi_finalize_in... | c | ffd20ebdf94beffc1cb8ec56896a86e28907702c | https://github.com/ntop/nDPI/commit/46d96e7f32a799ae57400d82e4c485e4ef9771ab | null |
arvo:23529 | n132/arvo:23529-vul | /src/opensc | [
{
"end_line": 208,
"function_name": "asepcos_parse_sec_attr",
"start_line": 165,
"target_file": "/src/opensc/src/libopensc/card-asepcos.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader
=================================================================
==58334==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000005b5 at pc 0x00000060bb1e bp 0x7ffcfdc41520 sp 0x7ffcfdc41518
READ of size 1 at... | c | c4d7bb1a7ba80d155021f7a311b7fa6b1ce54e15 | https://github.com/OpenSC/OpenSC/commit/7cf8087351c821aa1e617282db93ecb33d53d918 | null |
arvo:23592 | n132/arvo:23592-vul | /src/PcapPlusPlus | [
{
"end_line": 1637,
"function_name": "SSLCertificateRequestMessage::SSLCertificateRequestMessage",
"start_line": 1609,
"target_file": "/src/PcapPlusPlus/Packet++/src/SSLHandshake.cpp"
}
] | Heap-buffer-overflow READ 1 | PcapPlusPlus | asan | INFO: Seed: 2209791217
INFO: Loaded 1 modules (16542 inline 8-bit counters): 16542 [0xa5f850, 0xa638ee),
INFO: Loaded 1 PC tables (16542 PCs): 16542 [0xa638f0,0xaa42d0),
/out/FuzzTarget: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==4908==ERRO... | cpp | 50283e891b978f202be85deff5919bac712280e3 | https://github.com/seladb/PcapPlusPlus/commit/31406a092868f87d714910e349ab0b4dc683722b | null |
arvo:23717 | n132/arvo:23717-vul | /src/c-blosc2 | [
{
"end_line": 37,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 10,
"target_file": "/src/c-blosc2/tests/fuzz/fuzz_decompress.c"
}
] | UNKNOWN READ | c-blosc2 | msan | INFO: Seed: 960694843
INFO: Loaded 1 modules (44995 inline 8-bit counters): 44995 [0xfd6f6c, 0xfe1f2f),
INFO: Loaded 1 PC tables (44995 PCs): 44995 [0xcd3860,0xd83490),
/out/decompress_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:DEADLYSIGNAL
==3241==ERROR: MemorySanitizer: SEGV on unk... | cpp | b7d25a742722e67fae7c0d8aa88e03c1c4a8c724 | https://github.com/Blosc/c-blosc2/commit/db309703091a85ad93e0658f24926bcb474309c0 | A vulnerability exists in decompress_fuzzer where header sizes are not properly validated, potentially leading to errors detected by address sanitizer (asan). |
arvo:23725 | n132/arvo:23725-vul | /src/hermes | [
{
"end_line": 1017,
"function_name": "JSLexer::consumeBracedCodePoint",
"start_line": 945,
"target_file": "/src/hermes/lib/Parser/JSLexer.cpp"
}
] | Heap-buffer-overflow READ 1 | hermes | asan | INFO: Seed: 3023245855
INFO: Loaded 1 modules (118139 inline 8-bit counters): 118139 [0x37a4c20, 0x37c199b),
INFO: Loaded 1 PC tables (118139 PCs): 118139 [0x37c19a0,0x398f150),
/out/fuzzer-jsi-entry: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================================================================... | cpp | c6c6a404e06ea5c6ccb5b549f498a1041b871b3f | https://github.com/facebook/hermes/commit/f126e71e362dad0f7f1841cbc56b5d85e16e8cc4 | A heap out of bounds read occurs in JSLexer::consumeBracedCodePoint due to continued use of the curCharPtr_ pointer after it is set to the end of the buffer. This situation arises when an invalid code point triggers a call to forceEOF in JSLexer::error, which sets curCharPtr_ to the buffer's end, but JSLexer::consumeBr... |
arvo:23764 | n132/arvo:23764-vul | /src/hoextdown | [
{
"end_line": 1818,
"function_name": "is_codefence",
"start_line": 1777,
"target_file": "/src/hoextdown/src/document.c"
}
] | Heap-buffer-overflow READ 1 | hoextdown | asan | Reading 77 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/hoedown_fuzzer < INPUT_FILE
or
/out/hoedown_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fu... | cpp | 4afac5e4db81fc93619ce139f37cb2bd8597994e | https://github.com/kjdev/hoextdown/commit/7c7dc6ac9adce5413ab54dcd604db95a9b935b05 | An out-of-bounds read occurs in code fence detection. |
arvo:23765 | n132/arvo:23765-vul | /src/libxml2 | [
{
"end_line": 5262,
"function_name": "htmlParseLookupSequence",
"start_line": 5141,
"target_file": "/src/libxml2/HTMLparser.c"
}
] | Heap-use-after-free READ 1 | libxml2 | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/html
=================================================================
==14972==ERROR: AddressSanitizer: heap-use-after-free on address 0x62100000a100 at pc 0x0000004d2979 bp 0x7ffd8b8c89f0 sp 0x7ffd8b8c89e8
READ of size 1 at 0x62100000a100... | c | f8329fdc234a43b858271acc75ea70881e35fcae | https://gitlab.gnome.org/GNOME/libxml2/-/commit/477c7f6affcb665305b333f92ce0a782325b4156 | The HTML parser exhibits a quadratic runtime vulnerability due to the removal of an important optimization that avoids repeatedly scanning the input buffer for terminating characters. This issue arises in the HTML push parser, where ctxt->checkIndex is not always written and parser state is not properly managed, leadin... |
arvo:23787 | n132/arvo:23787-vul | /src/opensc | [
{
"end_line": 595,
"function_name": "authentic_set_current_files",
"start_line": 523,
"target_file": "/src/opensc/src/libopensc/card-authentic.c"
}
] | Memcpy-param-overlap | opensc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader
=================================================================
==58342==ERROR: AddressSanitizer: memcpy-param-overlap: memory ranges [0x615000000a82,0x615000000a86) and [0x615000000a80, 0x615000000a84) overlap
SCARINES... | c | 5098cfdb4034eb2b901edb0373fb8ecf866a42cd | https://github.com/OpenSC/OpenSC/commit/05dcde508b8f5884242c6832cc2a4521fedd626f | A vulnerability exists in the authentic module where memory regions can overlap when handling paths longer than 2B, due to the use of an unsafe memory copy operation. |
arvo:23796 | n132/arvo:23796-vul | /src/aac | [
{
"end_line": 726,
"function_name": "ConcealPitchLag",
"start_line": 716,
"target_file": "/src/aac/libAACdec/src/usacdec_acelp.cpp"
}
] | Stack-buffer-overflow READ 4 | aac | asan | INFO: Seed: 1586174533
INFO: Loaded 1 modules (28937 inline 8-bit counters): 28937 [0x85bc9b0, 0x85c3ab9),
INFO: Loaded 1 PC tables (28937 PCs): 28937 [0x85057e8,0x853e030),
/out/aacDecoder_DecodeFrame: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==============================================================... | cpp | 5a83a8e5e1cafceba6bef7ac61e68a57cc93d786 | https://android.googlesource.com/platform/external/aac//+/22e70729b4bf541ea507dda074e368dd00e29d0c%5E%21/ | null |
arvo:23815 | n132/arvo:23815-vul | /src/glib | [
{
"end_line": 310,
"function_name": "uri_decoder",
"start_line": 235,
"target_file": "/src/glib/glib/guri.c"
}
] | Heap-buffer-overflow READ 1 | glib | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_uri_parse_params < INPUT_FILE
or
/out/fuzz_uri_parse_params INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /o... | cpp | 67ba5bfe601f858f8ae3266142008dc90fbbe1b5 | https://gitlab.gnome.org/GNOME/glibf9d165add1342ecae6cdde1b95e9ce63320768dd | null |
arvo:23816 | n132/arvo:23816-vul | /src/glib | [
{
"end_line": 537,
"function_name": "parse_ip_literal",
"start_line": 464,
"target_file": "/src/glib/glib/guri.c"
}
] | Heap-buffer-overflow READ 5 | glib | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_uri_parse < INPUT_FILE
or
/out/fuzz_uri_parse INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/fuzz_uri_pa... | cpp | c363c3a9a5d504621dfa07355f35ffe10d75e2a5 | https://gitlab.gnome.org/GNOME/glibb43fb9cbfb033132e970f8b587d709c582dee1a0 | A vulnerability exists in the URI scope parsing code in guri, where the parser can read past the end of a URI if it encounters an incorrect %-escaped character. This issue affects the handling of zone ID syntax as defined in RFC 6874, which amends RFC 3986. The vulnerability also impacts the correctness of network-addr... |
arvo:23818 | n132/arvo:23818-vul | /src/glib | [
{
"end_line": 310,
"function_name": "uri_decoder",
"start_line": 235,
"target_file": "/src/glib/glib/guri.c"
}
] | Heap-buffer-overflow READ 1 | glib | asan | INFO: Seed: 320464510
INFO: Loaded 1 modules (15213 inline 8-bit counters): 15213 [0xa10aa0, 0xa1460d),
INFO: Loaded 1 PC tables (15213 PCs): 15213 [0xa14610,0xa4fce0),
/out/fuzz_uri_escape: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==7508==... | cpp | 67ba5bfe601f858f8ae3266142008dc90fbbe1b5 | https://gitlab.gnome.org/GNOME/glibf9d165add1342ecae6cdde1b95e9ce63320768dd | null |
arvo:23826 | n132/arvo:23826-vul | /src/c-blosc2 | [
{
"end_line": 2198,
"function_name": "blosc2_decompress",
"start_line": 2158,
"target_file": "/src/c-blosc2/blosc/blosc2.c"
}
] | Use-of-uninitialized-value | c-blosc2 | msan | INFO: Seed: 4133444584
INFO: Loaded 1 modules (45073 inline 8-bit counters): 45073 [0xf8effc, 0xf9a00d),
INFO: Loaded 1 PC tables (45073 PCs): 45073 [0xc8aac0,0xd3abd0),
/out/decompress_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==3242==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x5... | c | c203bdd674779c25ee0342721e41e5b722ff346c | https://github.com/Blosc/c-blosc2/commit/d80b5acaf23ec4c2453a348b35096b99601fcde5 | null |
arvo:23837 | n132/arvo:23837-vul | /src/libraw | [
{
"end_line": 1147,
"function_name": "LibRaw::identify",
"start_line": 179,
"target_file": "/src/libraw/src/metadata/identify.cpp"
}
] | Index-out-of-bounds | libraw | ubsan | INFO: Seed: 3412816079
INFO: Loaded 1 modules (67793 inline 8-bit counters): 67793 [0xe56420, 0xe66cf1),
INFO: Loaded 1 PC tables (67793 PCs): 67793 [0x8f0c10,0x9f9920),
/out/libraw_raf_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
unknown file: data corrupted at 116218
src/demosaic/dht_demosaic.cpp:34... | cpp | 371161a06d7f98f231a001dad4af2dfb463e270a | https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e | null |
arvo:23848 | n132/arvo:23848-vul | /src/arrow | [
{
"end_line": 693,
"function_name": "ReadDictionary",
"start_line": 645,
"target_file": "/src/arrow/cpp/src/arrow/ipc/reader.cc"
}
] | Heap-buffer-overflow READ {*} | arrow | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/arrow-ipc-file-fuzz < INPUT_FILE
or
/out/arrow-ipc-file-fuzz INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/a... | cpp | 269bb7f3cc5ea6f6d958593a44a357f92561afdc | https://github.com/apache/arrow/commit/cb2cf2f2a4714d161535837d90b025feef5bca5c | null |
arvo:23868 | n132/arvo:23868-vul | /src/arrow | [
{
"end_line": 693,
"function_name": "ReadDictionary",
"start_line": 645,
"target_file": "/src/arrow/cpp/src/arrow/ipc/reader.cc"
}
] | Heap-buffer-overflow READ 8 | arrow | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/arrow-ipc-file-fuzz < INPUT_FILE
or
/out/arrow-ipc-file-fuzz INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/a... | cpp | 269bb7f3cc5ea6f6d958593a44a357f92561afdc | https://github.com/apache/arrow/commit/cb2cf2f2a4714d161535837d90b025feef5bca5c | null |
arvo:23870 | n132/arvo:23870-vul | /src/libraw | [
{
"end_line": 1147,
"function_name": "LibRaw::identify",
"start_line": 179,
"target_file": "/src/libraw/src/metadata/identify.cpp"
}
] | Index-out-of-bounds | libraw | ubsan | INFO: Seed: 2028567510
INFO: Loaded 1 modules (67793 inline 8-bit counters): 67793 [0xe56420, 0xe66cf1),
INFO: Loaded 1 PC tables (67793 PCs): 67793 [0x8f0c10,0x9f9920),
/out/libraw_cr2_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
src/demosaic/dht_demosaic.cpp:100:21: runtime error: index 3 out of bou... | cpp | 371161a06d7f98f231a001dad4af2dfb463e270a | https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e | null |
arvo:23916 | n132/arvo:23916-vul | /src/arrow | [
{
"end_line": 164,
"function_name": "PutOffsets",
"start_line": 133,
"target_file": "/src/arrow/cpp/src/arrow/array/concatenate.cc"
}
] | Heap-buffer-overflow READ 4 | arrow | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/arrow-ipc-stream-fuzz < INPUT_FILE
or
/out/arrow-ipc-stream-fuzz INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /o... | cpp | 2b4d682be164794a8308c269b885fd67222ceb79 | https://github.com/apache/arrow/commit/52afc10adc0c65e3c999665fad28ce78944e23b0 | null |
arvo:23979 | n132/arvo:23979-vul | /src/opensc | [
{
"end_line": 1786,
"function_name": "coolkey_rsa_op",
"start_line": 1678,
"target_file": "/src/opensc/src/libopensc/card-coolkey.c"
}
] | Stack-use-after-scope READ 8 | opensc | asan | INFO: Seed: 905504264
INFO: Loaded 1 modules (31828 inline 8-bit counters): 31828 [0xf54040, 0xf5bc94),
INFO: Loaded 1 PC tables (31828 PCs): 31828 [0xbe1c88,0xc5e1c8),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==577... | c | 8963c351897b2c28011d1e941a31c6cb8a140a8d | https://github.com/OpenSC/OpenSC/commit/cdbcb5b7db8766d6ea9da6912755ed335780f2f9 | A stack-use-after-scope vulnerability exists in coolkey, where memory on the stack is accessed after its lifetime has ended. |
arvo:23991 | n132/arvo:23991-vul | /src/binutils-gdb | [
{
"end_line": 1395,
"function_name": "print_insn_arc",
"start_line": 933,
"target_file": "/src/binutils-gdb/opcodes/arc-dis.c"
}
] | Global-buffer-overflow READ 8 | binutils-gdb | asan | INFO: Seed: 4274094732
INFO: Loaded 1 modules (195687 inline 8-bit counters): 195687 [0x35dcf90, 0x360cbf7),
INFO: Loaded 1 PC tables (195687 PCs): 195687 [0x26df238,0x29db8a8),
/out/fuzz_disassemble: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================================================================... | c | bfbd943845684ac374c41797154d2c53cc338145 | https://github.com/bminor/binutils-gdb/commit/570b0ed6d5368f4653bf019c60fa277ed7e983bf | A vulnerability exists in ARC where illegal double register pairs, specifically even-odd register combinations, can be used in certain instructions. While the GNU assembler does not permit these combinations, the disassembler (in arc-dis.c, function print_insn_arc) may encounter and process them without detection, pote... |
arvo:24016 | n132/arvo:24016-vul | /src/libraw | [
{
"end_line": 1147,
"function_name": "LibRaw::identify",
"start_line": 179,
"target_file": "/src/libraw/src/metadata/identify.cpp"
}
] | Use-of-uninitialized-value | libraw | msan | INFO: Seed: 2535845648
INFO: Loaded 1 modules (18059 inline 8-bit counters): 18059 [0xba1c30, 0xba62bb),
INFO: Loaded 1 PC tables (18059 PCs): 18059 [0x8b9168,0x8ffa18),
/out/libraw_cr2_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==54052==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x... | cpp | 371161a06d7f98f231a001dad4af2dfb463e270a | https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e | null |
arvo:24097 | n132/arvo:24097-vul | /src/htslib | [
{
"end_line": 2577,
"function_name": "vcf_parse_format",
"start_line": 2206,
"target_file": "/src/htslib/vcf.c"
}
] | UNKNOWN WRITE | htslib | ubsan | INFO: Seed: 3944442803
INFO: Loaded 1 modules (29474 inline 8-bit counters): 29474 [0x94cce8, 0x95400a),
INFO: Loaded 1 PC tables (29474 PCs): 29474 [0x601a68,0x674c88),
/out/hts_open_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
[W::vcf_parse] Contig '@SQ' is not defined in the header. (Quick workarou... | c | df31e599a3d3778804b6a7fda9bb5fdc683ee34c | https://github.com/samtools/htslib/commit/dcd4b7304941a8832fba2d0fc4c1e716e7a4e72c | The check for excessive record size in vcf_parse_format() only considers individual fields, allowing the combined size of multiple fields to exceed INT_MAX and overflow fmt_aux_t::offset. This enables a vulnerability where the total memory used by all fields in a VCF record can surpass the intended limit. |
arvo:24106 | n132/arvo:24106-vul | /src/imagemagick | [
{
"end_line": 4450,
"function_name": "RenderMVGContent",
"start_line": 2409,
"target_file": "/src/imagemagick/MagickCore/draw.c"
}
] | Heap-buffer-overflow WRITE 1 | imagemagick | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/encoder_mvg_fuzzer
=================================================================
==199796==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62100005dcff at pc 0x0000006515cc bp 0x7ffd027eac50 sp 0x7ffd027eac48
WRITE of size 1 ... | cpp | e0c34b9b125c243e2a5c8fbe35dbe7699dd8d798 | https://github.com/imagemagick/imagemagick/commit/f2d5b7615ec97abb32d24d2b021d386283d983ec | null |
arvo:24157 | n132/arvo:24157-vul | /src/ots | [
{
"end_line": 1029,
"function_name": "Font::DropVariations",
"start_line": 1016,
"target_file": "/src/ots/src/ots.cc"
}
] | Use-of-uninitialized-value | ots | msan | INFO: Seed: 3530716108
INFO: Loaded 1 modules (22487 inline 8-bit counters): 22487 [0xc60168, 0xc6593f),
INFO: Loaded 1 PC tables (22487 PCs): 22487 [0xc65940,0xcbd6b0),
/out/ots-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
ERROR at ../../src/ots/src/ots.cc:603 (ProcessGeneric)
ERROR at ../../src/ots/... | cpp | d6ade56a990cfb73b4d27d191cfa45e2426ccc92 | https://github.com/khaledhosny/ots/commit/a7d63a004b03224070cc55d78485ee8669627093 | Dropping a variation table does not remove it from m_tables. |
arvo:24164 | n132/arvo:24164-vul | /src/muparser | [
{
"end_line": 929,
"function_name": "ParserBase::ApplyIfElse",
"start_line": 887,
"target_file": "/src/muparser/src/muParserBase.cpp"
}
] | Heap-buffer-overflow READ 8 | muparser | asan | INFO: Seed: 1209813774
INFO: Loaded 1 modules (6217 inline 8-bit counters): 6217 [0x8eb4c8, 0x8ecd11),
INFO: Loaded 1 PC tables (6217 PCs): 6217 [0x667b38,0x67ffc8),
/out/set_eval_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==522==ERRO... | cpp | 381017ac752f31c417fd6be3c61f248b7ec88436 | https://github.com/beltoforion/muparser/commit/650fbf88fae47c315ac4ba1c5519423664e4119e | null |
arvo:24183 | n132/arvo:24183-vul | /src/opensc | [
{
"end_line": 216,
"function_name": "asepcos_parse_sec_attr",
"start_line": 165,
"target_file": "/src/opensc/src/libopensc/card-asepcos.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader
=================================================================
==58335==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000595 at pc 0x00000060ba47 bp 0x7ffdcd48de40 sp 0x7ffdcd48de38
READ of size 1 at... | c | 6903aebfddc466d966c7b865fae34572bf3ed23e | https://github.com/OpenSC/OpenSC/commit/978c912c7089fa4573add7140170feb9fcbe7f87 | A heap-buffer-overflow vulnerability exists due to an incomplete fix in commit 7cf8087351c821aa1e617282db93ecb33d53d918. The length of the buffer is not properly changed right before it's accessed, leading to a potential out-of-bounds read. |
arvo:24316 | n132/arvo:24316-vul | /src/opensc | [
{
"end_line": 346,
"function_name": "sc_oberthur_read_file",
"start_line": 231,
"target_file": "/src/opensc/src/libopensc/pkcs15-oberthur.c"
}
] | Heap-buffer-overflow WRITE 1 | opensc | asan | INFO: Seed: 754794754
INFO: Loaded 1 modules (21822 inline 8-bit counters): 21822 [0xc06440, 0xc0b97e),
INFO: Loaded 1 PC tables (21822 PCs): 21822 [0x8cf8c8,0x924ca8),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==583... | c | 9ffb9bae63c8b7fbababb8481a83f1b575e59a18 | https://github.com/OpenSC/OpenSC/commit/6903aebfddc466d966c7b865fae34572bf3ed23e | null |
arvo:24436 | n132/arvo:24436-vul | /src/php-src | [
{
"end_line": 2316,
"function_name": "zend_emit_jmp_null",
"start_line": 2308,
"target_file": "/src/php-src/Zend/zend_compile.c"
}
] | Heap-use-after-free READ 4 | php-src | asan | INFO: Seed: 438137261
INFO: Loaded 1 modules (129041 inline 8-bit counters): 129041 [0x193b260, 0x195aa71),
INFO: Loaded 1 PC tables (129041 PCs): 129041 [0x195aa78,0x1b52b88),
/out/php-fuzz-parser: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
... | cpp | 2dbb4ecfa1d7e32ccce6591158391a62cf4cbe2f | https://github.com/php/php-src/commit/5303bcdd32e8171399c2c60bf431e5304a66c39a | null |
arvo:24567 | n132/arvo:24567-vul | /src/php-src | [
{
"end_line": 2316,
"function_name": "zend_emit_jmp_null",
"start_line": 2308,
"target_file": "/src/php-src/Zend/zend_compile.c"
}
] | Heap-use-after-free READ 4 | php-src | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/php-fuzz-parser
=================================================================
==136338==ERROR: AddressSanitizer: heap-use-after-free on address 0x606000013820 at pc 0x000000bbdc0f bp 0x7ffcaadc5640 sp 0x7ffcaadc5638
READ of size 4 at 0x... | cpp | 2dbb4ecfa1d7e32ccce6591158391a62cf4cbe2f | https://github.com/php/php-src/commit/5303bcdd32e8171399c2c60bf431e5304a66c39a | null |
arvo:24638 | n132/arvo:24638-vul | /src/binutils-gdb | [
{
"end_line": 416,
"function_name": "vms_traverse_index",
"start_line": 244,
"target_file": "/src/binutils-gdb/bfd/vms-lib.c"
}
] | Stack-buffer-overflow READ 1 | binutils-gdb | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_bfd
=================================================================
==291280==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fdf7166f220 at pc 0x0000004da15d bp 0x7ffefbc95d30 sp 0x7ffefbc95d28
READ of size 1 at 0x7fdf7... | c | b5f386d52049067ca081651a460ab4ae85e327d4 | https://github.com/bminor/binutils-gdb/commit/e44a1d7b9ad8d73f6cea1f20fe353fc12f9b8e66 | A buffer overflow occurs in the vms_traverse_index function in vms-lib.c due to missing sanity checks on the remaining size before accessing vms_idx or vms_elfidx. |
arvo:2479 | n132/arvo:2479-vul | /src/librawspeed | [
{
"end_line": 86,
"function_name": "MosDecoder::MosDecoder",
"start_line": 70,
"target_file": "/src/librawspeed/src/librawspeed/decoders/MosDecoder.cpp"
},
{
"end_line": 136,
"function_name": "MosDecoder::decodeRawInternal",
"start_line": 97,
"target_file": "/src/librawspeed/src/... | UNKNOWN READ | librawspeed | asan | INFO: Seed: 3521745198
INFO: Loaded 1 modules (13353 guards): [0xab8df0, 0xac5e94),
/out/TiffParserFuzzer-GetDecoder-Decode: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
ASAN:DEADLYSIGNAL
=================================================================
==3392==ERROR: AddressSanitizer: SEGV on unknown address 0x... | cpp | 1cda622444fb13abe35ff42d1b3a7d940f728100 | https://github.com/darktable-org/rawspeed/commit/65cc3c5e0ccce9bc87c3e80703c7c55e8466c587 | null |
arvo:24884 | n132/arvo:24884-vul | /src/arrow | [
{
"end_line": 401,
"function_name": "ConcreteTypeFromFlatbuffer",
"start_line": 256,
"target_file": "/src/arrow/cpp/src/arrow/ipc/metadata_internal.cc"
}
] | Negative-size-param | arrow | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/arrow-ipc-stream-fuzz
=================================================================
==782==ERROR: AddressSanitizer: negative-size-param: (size=-58982400)
SCARINESS: 10 (negative-size-param)
#0 0x52e465 in MemcmpInterceptorCommon(voi... | cpp | 525a5e96a4c460a8cd0a5c6965a39529926035aa | https://github.com/apache/arrow/commit/570184b9b1aac88ea0f82a13655babe3c730c8f6 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.