task_id
stringlengths
8
10
docker_image
stringlengths
17
19
basedir
stringclasses
157 values
target_functions
listlengths
1
3
crash_type
stringclasses
85 values
project_name
stringclasses
157 values
sanitizer
stringclasses
3 values
sanitizer_output
stringlengths
1.13k
6.5M
language
stringclasses
2 values
vuln_commit
stringlengths
40
40
fix
stringlengths
69
110
vulnerability_description
stringlengths
38
824
arvo:20188
n132/arvo:20188-vul
/src/opensc
[ { "end_line": 115, "function_name": "fuzz_reader_connect", "start_line": 99, "target_file": "/src/opensc/src/tests/fuzzing/fuzz_pkcs15_reader.c" } ]
Heap-buffer-overflow WRITE {*}
opensc
asan
INFO: Seed: 2713151264 INFO: Loaded 1 modules (21532 inline 8-bit counters): 21532 [0xbf5780, 0xbfab9c), INFO: Loaded 1 PC tables (21532 PCs): 21532 [0x8c17a8,0x915968), /out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==56...
c
a487e9595e0030c1775e324b2a1bbba5f982bfe2
https://github.com/OpenSC/OpenSC/commit/4ef7ed9ffd2acacfc5026db4fb984a1386a07bdb
null
arvo:20199
n132/arvo:20199-vul
/src/arrow
[ { "end_line": 330, "function_name": "ValidateArray", "start_line": 263, "target_file": "/src/arrow/cpp/src/arrow/array/validate.cc" } ]
Heap-buffer-overflow READ 8
arrow
asan
INFO: Seed: 2151527062 INFO: Loaded 1 modules (293490 inline 8-bit counters): 293490 [0x1940010, 0x1987a82), INFO: Loaded 1 PC tables (293490 PCs): 293490 [0x1987a88,0x1e021a8), /out/arrow-ipc-stream-fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===========================================================...
cpp
92931939ac2c8c89c278c2413608c3f1d2663f91
https://github.com/apache/arrow/commit/a6307cc8a0127a4852b7d3d2c20940a094eed0d6
null
arvo:20203
n132/arvo:20203-vul
/src/arrow
[ { "end_line": 330, "function_name": "ValidateArray", "start_line": 263, "target_file": "/src/arrow/cpp/src/arrow/array/validate.cc" } ]
Global-buffer-overflow READ 1
arrow
asan
INFO: Seed: 3212450906 INFO: Loaded 1 modules (293490 inline 8-bit counters): 293490 [0x1940010, 0x1987a82), INFO: Loaded 1 PC tables (293490 PCs): 293490 [0x1987a88,0x1e021a8), /out/arrow-ipc-stream-fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===========================================================...
cpp
92931939ac2c8c89c278c2413608c3f1d2663f91
https://github.com/apache/arrow/commit/a6307cc8a0127a4852b7d3d2c20940a094eed0d6
null
arvo:20288
n132/arvo:20288-vul
/src/imagemagick
[ { "end_line": 2646, "function_name": "FxEvaluateSubexpression", "start_line": 1426, "target_file": "/src/imagemagick/MagickCore/fx.c" } ]
Use-of-uninitialized-value
imagemagick
msan
INFO: Seed: 3088268908 INFO: Loaded 1 modules (180839 inline 8-bit counters): 180839 [0x2c373e0, 0x2c63647), INFO: Loaded 1 PC tables (180839 PCs): 180839 [0x2c63648,0x2f25cb8), /out/encoder_label_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==208858==WARNING: MemorySanitizer: use-of-uninitialized-val...
cpp
59125f0af71ea162da80e14fb4bc44ca7c4a8038
https://github.com/imagemagick/imagemagick/commit/4bb0afabfcbf9123f95a787db9b10af791dd1dc7
null
arvo:20364
n132/arvo:20364-vul
/src/wabt
[ { "end_line": 1311, "function_name": "BinaryReaderIR::OnFunctionSymbol", "start_line": 1292, "target_file": "/src/wabt/src/binary-reader-ir.cc" } ]
UNKNOWN READ
wabt
asan
INFO: Seed: 3131135977 INFO: Loaded 1 modules (9209 inline 8-bit counters): 9209 [0x8461210, 0x8463609), INFO: Loaded 1 PC tables (9209 PCs): 9209 [0x8354f44,0x8366f0c), /out/wasm2wat_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:DEADLYSIGNAL ===========================================...
cpp
49a78c6173e5702326c9fb033f9ca1057f2cff64
https://github.com/WebAssembly/wabt/commit/ef0d3789f229e1176910e45fc47600336ae3aed9
null
arvo:20391
n132/arvo:20391-vul
/src/qpdf
[ { "end_line": 235, "function_name": "LLVMFuzzerTestOneInput", "start_line": 225, "target_file": "/src/qpdf/fuzz/qpdf_fuzzer.cc" } ]
Use-of-uninitialized-value
qpdf
msan
INFO: Seed: 877436314 INFO: Loaded 1 modules (35737 inline 8-bit counters): 35737 [0x10df240, 0x10e7dd9), INFO: Loaded 1 PC tables (35737 PCs): 35737 [0x10e7de0,0x1173770), /out/qpdf_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc WARNING: fuzz input: can't find PDF header WARNING: fuzz input: file is da...
cpp
c1684eae9144129027642f5069a0fd97f0559ec8
https://github.com/qpdf/qpdf/commit/232f5fc9f3bed8e1b02bca5d10b2eca444e30f95
null
arvo:20493
n132/arvo:20493-vul
/src/jbig2dec
[ { "end_line": 1104, "function_name": "jbig2_decode_generic_template0_TPGDON", "start_line": 906, "target_file": "/src/jbig2dec/jbig2_generic.c" } ]
Use-of-uninitialized-value
jbig2dec
msan
INFO: Seed: 2453089386 INFO: Loaded 1 modules (1977 inline 8-bit counters): 1977 [0x7f40b8, 0x7f4871), INFO: Loaded 1 PC tables (1977 PCs): 1977 [0x5aab10,0x5b26a0), /out/jbig2_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==10132==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x58042b in...
cpp
9d1f28c1e9b8619073b36400e787eff8d84b27c3
git://git.ghostscript.com/jbig2dec.git743d799bfd9014f9ef638634656fea21390d1444
null
arvo:20529
n132/arvo:20529-vul
/src/janus-gateway
[ { "end_line": 270, "function_name": "janus_rtcp_incoming_transport_cc", "start_line": 170, "target_file": "/src/janus-gateway/rtcp.c" } ]
Dynamic-stack-buffer-overflow READ 2
janus-gateway
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/rtcp_fuzzer < INPUT_FILE or /out/rtcp_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/rtcp_fuzzer [-N] ...
cpp
06b438119464296fb2e7f7861bbf12bc5727d211
https://github.com/meetecho/janus-gateway/commit/03cfcd34a472e1a249221a8fb1d275784ee63ea3
null
arvo:20563
n132/arvo:20563-vul
/src/ndpi
[ { "end_line": 266, "function_name": "ndpi_search_mail_smtp_tcp", "start_line": 66, "target_file": "/src/ndpi/src/lib/protocols/mail_smtp.c" } ]
Heap-buffer-overflow READ 4
ndpi
asan
INFO: Seed: 3564236824 INFO: Loaded 1 modules (14317 inline 8-bit counters): 14317 [0xaf9510, 0xafccfd), INFO: Loaded 1 PC tables (14317 PCs): 14317 [0xafcd00,0xb34bd0), /out/fuzz_process_packet: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==1...
c
7234f369499e02f44efcbbf0efe43bae596ddc53
https://github.com/ntop/nDPI/commit/d4ae8a5f164167ef4fcf5b76b743e92b9e76d9dd
null
arvo:20644
n132/arvo:20644-vul
/src/ndpi
[ { "end_line": 1777, "function_name": "ndpi_workflow_process_packet", "start_line": 1379, "target_file": "/src/ndpi/example/reader_util.c" } ]
Heap-buffer-overflow READ 1
ndpi
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_ndpi_reader ================================================================= ==16398==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000000108 at pc 0x0000004d4a85 bp 0x7ffc489e7630 sp 0x7ffc489e7628 READ of size 1 at 0...
c
b287dccecfecd32f114b043f395019eb3b000791
https://github.com/ntop/nDPI/commit/bf7dcd63c3a663cd0e1e8c567511ccfd8047d24a
null
arvo:20655
n132/arvo:20655-vul
/src/harfbuzz
[ { "end_line": 77, "function_name": "LLVMFuzzerTestOneInput", "start_line": 34, "target_file": "/src/harfbuzz/test/fuzzing/hb-set-fuzzer.cc" } ]
Heap-buffer-overflow READ 4
harfbuzz
asan
INFO: Seed: 2252443695 INFO: Loaded 1 modules (28333 inline 8-bit counters): 28333 [0x85b8cd0, 0x85bfb7d), INFO: Loaded 1 PC tables (28333 PCs): 28333 [0x84a981c,0x84e0d84), /out/hb-set-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==188...
cpp
7b42403c1c03e6f2f32fcc792b588ca5a42b1e19
https://github.com/harfbuzz/harfbuzz/commit/97229244ebd2e50ec0021ecd442e3c1c27156a5c
A minor overflow issue exists in hb-set-fuzzer where the size check compares against the pointer size instead of the struct size, potentially allowing operations with insufficiently sized data.
arvo:20712
n132/arvo:20712-vul
/src/ndpi
[ { "end_line": 222, "function_name": "search_valid_dns", "start_line": 83, "target_file": "/src/ndpi/src/lib/protocols/dns.c" } ]
Heap-buffer-overflow READ 2
ndpi
asan
INFO: Seed: 1588430608 INFO: Loaded 1 modules (12046 inline 8-bit counters): 12046 [0xab8c20, 0xabbb2e), INFO: Loaded 1 PC tables (12046 PCs): 12046 [0xabbb30,0xaeac10), /out/fuzz_process_packet: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==1...
c
edce5a8c1fbdf7fd7362e4ca3b44da52356487fc
https://github.com/ntop/nDPI/commit/080e23e30ebc1940be5f503b84cb397fea1323cb
null
arvo:20747
n132/arvo:20747-vul
/src/ndpi
[ { "end_line": 1807, "function_name": "ndpi_workflow_process_packet", "start_line": 1406, "target_file": "/src/ndpi/example/reader_util.c" } ]
UNKNOWN
ndpi
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_ndpi_reader ================================================================= ==16392==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60400000047b at pc 0x0000004da9ab bp 0x7ffff849ecd0 sp 0x7ffff849ecc8 READ of size 4 at 0...
c
fdf8dd724fc86c4d38daa66b62021ae2d34f1432
https://github.com/ntop/nDPI/commit/3eb9907dd7bfd21be4980632761852eaee5aec81
null
arvo:20766
n132/arvo:20766-vul
/src/ndpi
[ { "end_line": 1809, "function_name": "ndpi_workflow_process_packet", "start_line": 1406, "target_file": "/src/ndpi/example/reader_util.c" } ]
Heap-buffer-overflow READ 2
ndpi
asan
INFO: Seed: 4111652964 INFO: Loaded 1 modules (18012 inline 8-bit counters): 18012 [0xb812e0, 0xb8593c), INFO: Loaded 1 PC tables (18012 PCs): 18012 [0xb85940,0xbcbf00), /out/fuzz_ndpi_reader: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==1644...
c
b2cbe76e716e628438a94d2e112acddb67ec89f2
https://github.com/ntop/nDPI/commit/e9195589d29d86da1849ad0d195900e6567354cf
null
arvo:20775
n132/arvo:20775-vul
/src/openthread
[ { "end_line": 279, "function_name": "Leader::HandleCommissioningSet", "start_line": 182, "target_file": "/src/openthread/src/core/thread/network_data_leader_ftd.cpp" } ]
Stack-buffer-overflow READ 2
openthread
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/ip6-send-fuzzer ================================================================= ==18830==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f019577f71e at pc 0x0000004f557e bp 0x7ffe12ed7830 sp 0x7ffe12ed7828 READ of size 2 at 0...
cpp
ea09b6e0642cca442f92cc722d60ec93b22da68e
https://github.com/openthread/openthread/commit/167d616bc2eefe9e4712da5a65681502de5851c0
A buffer overflow vulnerability exists in the HandleCommissioningSet() function in network-data, where Commissioner Dataset TLVs with extended TLV length are not properly rejected.
arvo:20797
n132/arvo:20797-vul
/src/ndpi
[ { "end_line": 1231, "function_name": "processClientServerHello", "start_line": 705, "target_file": "/src/ndpi/src/lib/protocols/tls.c" } ]
Index-out-of-bounds
ndpi
ubsan
INFO: Seed: 3888275133 INFO: Loaded 1 modules (17233 inline 8-bit counters): 17233 [0x8866e0, 0x88aa31), INFO: Loaded 1 PC tables (17233 PCs): 17233 [0x88aa38,0x8cdf48), /out/fuzz_process_packet: Running 1 inputs 1 time(s) each. Running: /tmp/poc protocols/tls.c:1178:18: runtime error: index 1026 out of bounds for ...
c
4976d93d4e7ce5e63cb562fb7f0f916c3103e2de
https://github.com/ntop/nDPI/commit/3c05d4551dfb1181770416c4301a4f92415e41af
null
arvo:20800
n132/arvo:20800-vul
/src/yara
[ { "end_line": 372, "function_name": "pe_parse_debug_directory", "start_line": 284, "target_file": "/src/yara/libyara/modules/pe/pe.c" } ]
Heap-buffer-overflow READ 4
yara
asan
INFO: Seed: 2368957 INFO: Loaded 1 modules (8523 inline 8-bit counters): 8523 [0x8f0110, 0x8f225b), INFO: Loaded 1 PC tables (8523 PCs): 8523 [0x665ff8,0x6874a8), /out/pe_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==38369==ERROR: Addr...
cpp
9616f8708ff4583ba708159577d957cbad3bb5c2
https://github.com/VirusTotal/yara/commit/871b921f79facab9f99bf0855f7b99027671b719
A buffer overrun occurs in the pe_parse_debug_directory function.
arvo:20830
n132/arvo:20830-vul
/src/ndpi
[ { "end_line": 352, "function_name": "ndpi_search_mail_imap_tcp", "start_line": 38, "target_file": "/src/ndpi/src/lib/protocols/mail_imap.c" } ]
Index-out-of-bounds
ndpi
ubsan
INFO: Seed: 423667838 INFO: Loaded 1 modules (17234 inline 8-bit counters): 17234 [0x847dc0, 0x84c112), INFO: Loaded 1 PC tables (17234 PCs): 17234 [0x84c118,0x88f638), /out/fuzz_process_packet: Running 1 inputs 1 time(s) each. Running: /tmp/poc protocols/mail_imap.c:167:4: runtime error: index 256 out of bounds fo...
c
83fdfe24d09396f293f6e78ecd341526f339a995
https://github.com/ntop/nDPI/commit/933351840dbed3646aeb4f75a359649434b001eb
An off-by-one error exists in the imap function.
arvo:20832
n132/arvo:20832-vul
/src/ndpi
[ { "end_line": 222, "function_name": "search_valid_dns", "start_line": 83, "target_file": "/src/ndpi/src/lib/protocols/dns.c" } ]
Heap-buffer-overflow READ 2
ndpi
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_process_packet < INPUT_FILE or /out/fuzz_process_packet INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/f...
cpp
3c05d4551dfb1181770416c4301a4f92415e41af
https://github.com/ntop/nDPI/commit/fe513014a8f5156b243ec2eb5e6862a0506c6632
null
arvo:20856
n132/arvo:20856-vul
/src/ndpi
[ { "end_line": 90, "function_name": "check_ymsg", "start_line": 59, "target_file": "/src/ndpi/src/lib/protocols/yahoo.c" } ]
Heap-buffer-overflow READ 4
ndpi
asan
INFO: Seed: 2467151449 INFO: Loaded 1 modules (12080 inline 8-bit counters): 12080 [0xab9ce0, 0xabcc10), INFO: Loaded 1 PC tables (12080 PCs): 12080 [0xabcc10,0xaebf10), /out/fuzz_process_packet: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==1...
c
e9195589d29d86da1849ad0d195900e6567354cf
https://github.com/ntop/nDPI/commit/c6acf97bfbe5ad26db3c2f5dd4d379ac674d6fb3
null
arvo:20920
n132/arvo:20920-vul
/src/imagemagick
[ { "end_line": 731, "function_name": "TIFFGetProfiles", "start_line": 664, "target_file": "/src/imagemagick/coders/tiff.c" } ]
Heap-buffer-overflow READ 16
imagemagick
asan
INFO: Seed: 148329004 INFO: Loaded 1 modules (182204 inline 8-bit counters): 182204 [0x2005780, 0x2031f3c), INFO: Loaded 1 PC tables (182204 PCs): 182204 [0x2031f40,0x22f9b00), /out/encoder_tiff_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==============================================================...
cpp
4b0098f85e7011e95cd52869fd0bacf25889a15f
https://github.com/imagemagick/imagemagick/commit/824f344ceb823e156ad6e85314d79c087933c2a0
null
arvo:20959
n132/arvo:20959-vul
/src/wabt
[ { "end_line": 1311, "function_name": "BinaryReaderIR::OnFunctionSymbol", "start_line": 1292, "target_file": "/src/wabt/src/binary-reader-ir.cc" } ]
UNKNOWN READ
wabt
asan
INFO: Seed: 1481457140 INFO: Loaded 1 modules (9225 inline 8-bit counters): 9225 [0x9dc420, 0x9de829), INFO: Loaded 1 PC tables (9225 PCs): 9225 [0x6b1050,0x6d50e0), /out/wasm2wat_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==2975==ERR...
cpp
49a78c6173e5702326c9fb033f9ca1057f2cff64
https://github.com/WebAssembly/wabt/commit/ef0d3789f229e1176910e45fc47600336ae3aed9
null
arvo:21000
n132/arvo:21000-vul
/src/ndpi
[ { "end_line": 103, "function_name": "ndpi_search_setup_capwap", "start_line": 39, "target_file": "/src/ndpi/src/lib/protocols/capwap.c" } ]
Heap-buffer-overflow READ 4
ndpi
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_process_packet < INPUT_FILE or /out/fuzz_process_packet INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/f...
cpp
1e933e8b026f6f88f27d64ec2260013f38d268d0
https://github.com/ntop/nDPI/commit/4976d93d4e7ce5e63cb562fb7f0f916c3103e2de
A buffer overread occurs in the ndpi_search_setup_capwap function.
arvo:21070
n132/arvo:21070-vul
/src/openthread
[ { "end_line": 169, "function_name": "EnergyScanServer::HandleScanResult", "start_line": 137, "target_file": "/src/openthread/src/core/thread/energy_scan_server.cpp" } ]
Index-out-of-bounds
openthread
ubsan
INFO: Seed: 1454048726 INFO: Loaded 1 modules (26796 inline 8-bit counters): 26796 [0x9bdfd0, 0x9c487c), INFO: Loaded 1 PC tables (26796 PCs): 26796 [0x61de98,0x686958), /out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc thread/energy_scan_server.cpp:143:9: runtime error: index 64 out of bound...
cpp
3530fc5907eafa33064b4f23805659400bdba75d
https://github.com/openthread/openthread/commit/c77342e5cca0866fdec3ac540900f688bf841a00
A buffer overrun occurs in the energy-scan feature when receiving energy results.
arvo:21139
n132/arvo:21139-vul
/src/htslib
[ { "end_line": 2543, "function_name": "vcf_parse_format", "start_line": 2203, "target_file": "/src/htslib/vcf.c" } ]
UNKNOWN WRITE
htslib
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/hts_open_fuzzer [W::vcf_parse] Contig '@SQ' is not defined in the header. (Quick workaround: index the file with tabix.) [W::vcf_parse] FILTER 'AF:dx##' is not defined in the header [W::vcf_parse] INFO 'L:SQ' is not defined in the header, a...
c
8ff8bb328f5d4c2981933ff7847374ddc747d572
https://github.com/samtools/htslib/commit/29c294e6842a56ba3b9a24a24a5f6de1575b0961
null
arvo:21165
n132/arvo:21165-vul
/src/binutils-gdb
[ { "end_line": 2387, "function_name": "setup_sections", "start_line": 2072, "target_file": "/src/binutils-gdb/bfd/som.c" } ]
UNKNOWN READ
binutils-gdb
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_bfd AddressSanitizer:DEADLYSIGNAL ================================================================= ==58630==ERROR: AddressSanitizer: SEGV on unknown address 0x60703e3e3e5e (pc 0x7fbe30f877c6 bp 0x7ffff113db10 sp 0x7ffff113d2c8 T0) ==5...
c
44f41bb7a1568dbe2e4e642e6c3c2e9ba3d47d92
https://github.com/bminor/binutils-gdb/commit/8248d21a5b8b7bb9970163b8b327f5ac2f857f33
A vulnerability exists in som.c within the setup_sections function, where subspace.name is not properly sanity checked, leading to a potential unknown read.
arvo:21176
n132/arvo:21176-vul
/src/c-ares
[ { "end_line": 182, "function_name": "ares_parse_soa_reply", "start_line": 43, "target_file": "/src/c-ares/ares_parse_soa_reply.c" } ]
Heap-double-free
c-ares
asan
Reading 40 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/ares_parse_reply_fuzzer < INPUT_FILE or /out/ares_parse_reply_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz exec...
cpp
61f06d2a58e61a48f570a614a3974b8c6d1f06e4
https://github.com/c-ares/c-ares/commit/910df394fc40d90dda233b27bf122e50357943e6
null
arvo:21289
n132/arvo:21289-vul
/src/ndpi
[ { "end_line": 63, "function_name": "ndpi_search_fix", "start_line": 31, "target_file": "/src/ndpi/src/lib/protocols/fix.c" } ]
Heap-buffer-overflow READ 1
ndpi
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_process_packet < INPUT_FILE or /out/fuzz_process_packet INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/f...
cpp
e9195589d29d86da1849ad0d195900e6567354cf
https://github.com/ntop/nDPI/commit/c6acf97bfbe5ad26db3c2f5dd4d379ac674d6fb3
null
arvo:21296
n132/arvo:21296-vul
/src/ndpi
[ { "end_line": 1234, "function_name": "processClientServerHello", "start_line": 705, "target_file": "/src/ndpi/src/lib/protocols/tls.c" } ]
Use-of-uninitialized-value
ndpi
msan
INFO: Seed: 607253689 INFO: Loaded 1 modules (18016 inline 8-bit counters): 18016 [0xaa3905, 0xaa7f65), INFO: Loaded 1 PC tables (18016 PCs): 18016 [0xaa7f68,0xaee568), /out/fuzz_ndpi_reader: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==16449==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x5b...
c
c6acf97bfbe5ad26db3c2f5dd4d379ac674d6fb3
https://github.com/ntop/nDPI/commit/2aec630202bf976e8ee978922441a414d4176cb8
null
arvo:21326
n132/arvo:21326-vul
/src/binutils-gdb
[ { "end_line": 727, "function_name": "bfd_h8_disassemble", "start_line": 312, "target_file": "/src/binutils-gdb/opcodes/h8300-dis.c" } ]
Use-of-uninitialized-value
binutils-gdb
msan
INFO: Seed: 78972752 INFO: Loaded 1 modules (187242 inline 8-bit counters): 187242 [0x3463b37, 0x34916a1), INFO: Loaded 1 PC tables (187242 PCs): 187242 [0x2be3918,0x2ebefb8), /out/fuzz_disassemble: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==298502==WARNING: MemorySanitizer: use-of-uninitialized-value ...
c
ff7685105468702de87b75599b1ea88cc309541c
https://github.com/bminor/binutils-gdb/commit/832a580781060f54731fcf654d76ac1332037a47
null
arvo:21339
n132/arvo:21339-vul
/src/binutils-gdb
[ { "end_line": 118, "function_name": "msdos_object_p", "start_line": 44, "target_file": "/src/binutils-gdb/bfd/i386msdos.c" } ]
Use-of-uninitialized-value
binutils-gdb
msan
INFO: Seed: 4092257321 INFO: Loaded 1 modules (146857 inline 8-bit counters): 146857 [0x22bb0c7, 0x22dee70), INFO: Loaded 1 PC tables (146857 PCs): 146857 [0x1d17e38,0x1f558c8), /out/fuzz_bfd: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==298501==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x...
c
4c4addbe57711f1cdbb72305b8cbd03a68ae2e34
https://github.com/bminor/binutils-gdb/commit/ff7685105468702de87b75599b1ea88cc309541c
An uninitialized read occurs in i386msdos.c within the msdos_object_p function due to not catching a -1 return value from bfd_bread.
arvo:21349
n132/arvo:21349-vul
/src/ndpi
[ { "end_line": 1234, "function_name": "processClientServerHello", "start_line": 705, "target_file": "/src/ndpi/src/lib/protocols/tls.c" } ]
Use-of-uninitialized-value
ndpi
msan
INFO: Seed: 622911915 INFO: Loaded 1 modules (18081 inline 8-bit counters): 18081 [0xaa68a5, 0xaaaf46), INFO: Loaded 1 PC tables (18081 PCs): 18081 [0xaaaf48,0xaf1958), /out/fuzz_ndpi_reader: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==16589==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x5b...
c
81e97d75153e38ce024a308b75d64edeb4b5e9bb
https://github.com/ntop/nDPI/commit/4ec3e6c064b56f1434bd4c887bd96d0916d07f2e
null
arvo:21354
n132/arvo:21354-vul
/src/binutils-gdb
[ { "end_line": 118, "function_name": "msdos_object_p", "start_line": 44, "target_file": "/src/binutils-gdb/bfd/i386msdos.c" } ]
Use-of-uninitialized-value
binutils-gdb
msan
INFO: Seed: 2582117421 INFO: Loaded 1 modules (146834 inline 8-bit counters): 146834 [0x22ba0c7, 0x22dde59), INFO: Loaded 1 PC tables (146834 PCs): 146834 [0x1d16f98,0x1f548b8), /out/fuzz_bfd: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==298458==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x...
c
5935fd15306c26ead8274cbeab3287770f2ac92a
https://github.com/bminor/binutils-gdb/commit/5e737279c6e832a757f0326128e5a5f96fbdd291
null
arvo:21356
n132/arvo:21356-vul
/src/ndpi
[ { "end_line": 4705, "function_name": "ndpi_fill_protocol_category", "start_line": 4670, "target_file": "/src/ndpi/src/lib/ndpi_main.c" } ]
Use-of-uninitialized-value
ndpi
msan
INFO: Seed: 1793365683 INFO: Loaded 1 modules (12150 inline 8-bit counters): 12150 [0x9a1542, 0x9a44b8), INFO: Loaded 1 PC tables (12150 PCs): 12150 [0x9a44b8,0x9d3c18), /out/fuzz_process_packet: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==16591==WARNING: MemorySanitizer: use-of-uninitialized-value #0 ...
c
cf47ba234a59db325a382db4bbdf10187f93eb9a
https://github.com/ntop/nDPI/commit/c1f9f05d338bd8236930df60e08b7cf635790ebf
null
arvo:21359
n132/arvo:21359-vul
/src/binutils-gdb
[ { "end_line": 822, "function_name": "suffix", "start_line": 769, "target_file": "/src/binutils-gdb/opcodes/z80-dis.c" } ]
Use-of-uninitialized-value
binutils-gdb
msan
INFO: Seed: 976141348 INFO: Loaded 1 modules (187234 inline 8-bit counters): 187234 [0x3463b37, 0x3491699), INFO: Loaded 1 PC tables (187234 PCs): 187234 [0x2be3388,0x2ebe9a8), /out/fuzz_disassemble: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==298502==WARNING: MemorySanitizer: use-of-uninitialized-value ...
c
5ab2fbf185935f387fd5c1f8b14ba9fe04b41b39
https://github.com/bminor/binutils-gdb/commit/a18cd0cab43f45b05e9f8bcbf8fed1d67834442d
An uninitialized memory read occurs in z80-dis.c within the suffix function when processing certain input, such as objdump -d -m ez80-adl with the bytes 0x40, 0xfd, due to the mybuf variable not being initialized.
arvo:21414
n132/arvo:21414-vul
/src/binutils-gdb
[ { "end_line": 559, "function_name": "pass_over", "start_line": 511, "target_file": "/src/binutils-gdb/bfd/tekhex.c" } ]
Use-of-uninitialized-value
binutils-gdb
msan
INFO: Seed: 1728468275 INFO: Loaded 1 modules (146854 inline 8-bit counters): 146854 [0x22bb0f7, 0x22dee9d), INFO: Loaded 1 PC tables (146854 PCs): 146854 [0x1d17d18,0x1f55778), /out/fuzz_bfd: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==298501==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x...
c
d262797294039fc828e36f76c45e462966c5c72a
https://github.com/bminor/binutils-gdb/commit/b3b360dec78845e30e7994cd633905da5668a96c
An uninitialized read occurs in tekhex.c within the pass_over function, where the buffer is read without first checking is_eof.
arvo:21426
n132/arvo:21426-vul
/src/openvswitch
[ { "end_line": 5224, "function_name": "scan_gtpu_metadata", "start_line": 5182, "target_file": "/src/openvswitch/lib/odp-util.c" } ]
Use-of-uninitialized-value
openvswitch
msan
INFO: Seed: 416563991 INFO: Loaded 1 modules (40910 inline 8-bit counters): 40910 [0xf9cb58, 0xfa6b26), INFO: Loaded 1 PC tables (40910 PCs): 40910 [0xbdffc8,0xc7fca8), /out/odp_target: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==27725==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x5525ee i...
c
0ef70536eb418a13e10113a884f665d47fb732e3
https://github.com/openvswitch/ovs/commit/1e1a15669e324e0971c46a31f3de233e3a0ba5b2
null
arvo:21520
n132/arvo:21520-vul
/src/libavc
[ { "end_line": 816, "function_name": "ih264d_parse_sei_message", "start_line": 751, "target_file": "/src/libavc/decoder/ih264d_sei.c" } ]
Heap-buffer-overflow READ 4
libavc
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/avc_dec_fuzzer ================================================================= ==1644==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7fc9e5d46000 at pc 0x000000537188 bp 0x7ffe65aed5a0 sp 0x7ffe65aed598 READ of size 4 at 0x7f...
cpp
66aae99b3dace54afae1bc2f7fc1a78a712a1188
https://android.googlesource.com/platform/external/libavc/+/f59c3864fe692c0191b40712e1b7a6a05a126c44%5E%21/
null
arvo:21571
n132/arvo:21571-vul
/src/jbig2dec
[ { "end_line": 1043, "function_name": "jbig2_text_region", "start_line": 578, "target_file": "/src/jbig2dec/jbig2_text.c" } ]
Use-of-uninitialized-value
jbig2dec
msan
INFO: Seed: 1174059577 INFO: Loaded 1 modules (2018 inline 8-bit counters): 2018 [0x7f5d78, 0x7f655a), INFO: Loaded 1 PC tables (2018 PCs): 2018 [0x5ac6c0,0x5b44e0), /out/jbig2_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc memory: limit: 3221225472 Mbyte peak usage: 136 Mbyte jbig2 decoder FATAL ERROR:...
cpp
dc14b5a69be02341d84e2956131f93f962408af2
git://git.ghostscript.com/jbig2dec.git778862c21165b485302010beb5fb0765f8338b96
null
arvo:21578
n132/arvo:21578-vul
/src/libucl
[ { "end_line": 1105, "function_name": "ucl_lex_json_string", "start_line": 1029, "target_file": "/src/libucl/src/ucl_parser.c" } ]
Heap-buffer-overflow READ 1
libucl
asan
INFO: Seed: 860106432 INFO: Loaded 1 modules (2943 inline 8-bit counters): 2943 [0x8039b0, 0x80452f), INFO: Loaded 1 PC tables (2943 PCs): 2943 [0x5b16f8,0x5bcee8), /out/ucl_add_string_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==6652...
c
71f16a847414eb6d9b014bdae2844c8a1134fc04
https://github.com/vstakhov/libucl/commit/ac8d76023386fb1f1b31b47cd294e28831929c96
A vulnerability exists in the ucl_lex_json_string function where, if a string ends with a '\', the function attempts to read the next character before performing a bounds check, leading to a potential out-of-bounds read.
arvo:21579
n132/arvo:21579-vul
/src/libucl
[ { "end_line": 1937, "function_name": "ucl_parse_value", "start_line": 1686, "target_file": "/src/libucl/src/ucl_parser.c" } ]
Heap-buffer-overflow READ 1
libucl
asan
INFO: Seed: 1827139557 INFO: Loaded 1 modules (2943 inline 8-bit counters): 2943 [0x8039b0, 0x80452f), INFO: Loaded 1 PC tables (2943 PCs): 2943 [0x5b16f8,0x5bcee8), /out/ucl_add_string_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==664...
c
ac8d76023386fb1f1b31b47cd294e28831929c96
https://github.com/vstakhov/libucl/commit/08de3581e8bc1ca855cf96061583363b8570215e
An out-of-bounds read occurs in the ucl_parse_value function in cases where a string ends with a Multiline terminator without a newline. The function attempts to read the next character to check for a newline without verifying if the pointer is past the end of the buffer.
arvo:21715
n132/arvo:21715-vul
/src/wireshark
[ { "end_line": 61, "function_name": "tvb_get_ipv4_addr_with_prefix_len", "start_line": 46, "target_file": "/src/wireshark/epan/addr_and_mask.c" } ]
Stack-buffer-overflow READ 4
wireshark
asan
oss-fuzzshark: disabling: ip oss-fuzzshark: disabling: udp oss-fuzzshark: disabling: udplite oss-fuzzshark: disabling: ospf oss-fuzzshark: disabling: dhcp oss-fuzzshark: disabling: json oss-fuzzshark: disabling: snort oss-fuzzshark: configured for dissector: bgp in table: tcp.port INFO: Seed: 1463586390 INFO: Loaded 1 ...
c
251b16bb933a61b649eadff816bd48bccaa1b6cd
https://github.com/wireshark/wireshark/commit/6d25a1062d092fdae62defeb7ed83a0807fe238a
null
arvo:21718
n132/arvo:21718-vul
/src/wireshark
[ { "end_line": 61, "function_name": "tvb_get_ipv4_addr_with_prefix_len", "start_line": 46, "target_file": "/src/wireshark/epan/addr_and_mask.c" } ]
Stack-buffer-overflow READ 4
wireshark
asan
oss-fuzzshark: disabling: udp oss-fuzzshark: disabling: udplite oss-fuzzshark: disabling: ospf oss-fuzzshark: disabling: bgp oss-fuzzshark: disabling: dhcp oss-fuzzshark: disabling: json oss-fuzzshark: disabling: snort oss-fuzzshark: configured for dissector: ip INFO: Seed: 371522154 INFO: Loaded 1 modules (355129 in...
c
251b16bb933a61b649eadff816bd48bccaa1b6cd
https://github.com/wireshark/wireshark/commit/6d25a1062d092fdae62defeb7ed83a0807fe238a
null
arvo:21780
n132/arvo:21780-vul
/src/ndpi
[ { "end_line": 62, "function_name": "ndpi_search_oracle", "start_line": 34, "target_file": "/src/ndpi/src/lib/protocols/oracle.c" } ]
Heap-buffer-overflow READ 1
ndpi
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_process_packet < INPUT_FILE or /out/fuzz_process_packet INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/f...
cpp
db16a987c57c2fa097b5efabb66cef16caeddb03
https://github.com/ntop/nDPI/commit/17235d234eb6a55fd0753ab4f3b6fc8f66eb7659
null
arvo:21960
n132/arvo:21960-vul
/src/clamav-devel
[ { "end_line": 1209, "function_name": "cli_vba_readdir_new", "start_line": 364, "target_file": "/src/clamav-devel/libclamav/vba_extract.c" } ]
Heap-buffer-overflow READ {*}
clamav-devel
asan
INFO: Seed: 1508442631 INFO: Loaded 1 modules (43948 inline 8-bit counters): 43948 [0xe66600, 0xe711ac), INFO: Loaded 1 PC tables (43948 PCs): 43948 [0xe711b0,0xf1cc70), /out/clamav_scanfile_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ...
cpp
4b7a73815266f916f1b86033b806fa4ef182e6db
https://github.com/Cisco-Talos/clamav-devel/commit/a97ce0c8371162d51972d7e03e4592e7d8e8e0e3
The vba parser lacks size checks to validate size data parsed from a VBA file, which allows a possible buffer overflow read.
arvo:21998
n132/arvo:21998-vul
/src/oniguruma
[ { "end_line": 3590, "function_name": "check_node_in_look_behind", "start_line": 3514, "target_file": "/src/oniguruma/src/regcomp.c" } ]
Heap-use-after-free READ 4
oniguruma
asan
Reading 43 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzzer < INPUT_FILE or /out/fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /...
cpp
598a1bb258d849386b4e268eea80fc31e658a261
https://github.com/kkos/oniguruma/commit/5066ddb254b830bb583e62521ea7ac838f6df121
null
arvo:22022
n132/arvo:22022-vul
/src/ndpi
[ { "end_line": 70, "function_name": "ndpi_search_nats_tcp", "start_line": 42, "target_file": "/src/ndpi/src/lib/protocols/nats.c" } ]
Heap-buffer-overflow READ 1
ndpi
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_process_packet < INPUT_FILE or /out/fuzz_process_packet INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/f...
cpp
f7f705406f103a46672f73e9ffb189286ce6bacf
https://github.com/ntop/nDPI/commit/db16a987c57c2fa097b5efabb66cef16caeddb03
null
arvo:22026
n132/arvo:22026-vul
/src/openvswitch
[ { "end_line": 5224, "function_name": "scan_gtpu_metadata", "start_line": 5182, "target_file": "/src/openvswitch/lib/odp-util.c" } ]
Use-of-uninitialized-value
openvswitch
msan
INFO: Seed: 3199561460 INFO: Loaded 1 modules (40910 inline 8-bit counters): 40910 [0xf9cb58, 0xfa6b26), INFO: Loaded 1 PC tables (40910 PCs): 40910 [0xbdffc8,0xc7fca8), /out/odp_target: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==27740==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x53f72c ...
c
0ef70536eb418a13e10113a884f665d47fb732e3
https://github.com/openvswitch/ovs/commit/1e1a15669e324e0971c46a31f3de233e3a0ba5b2
null
arvo:22110
n132/arvo:22110-vul
/src/leptonica
[ { "end_line": 50, "function_name": "LLVMFuzzerTestOneInput", "start_line": 3, "target_file": "/src/leptonica/prog/fuzzing/colorquant_fuzzer.cc" } ]
Heap-use-after-free READ 8
leptonica
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/colorquant_fuzzer < INPUT_FILE or /out/colorquant_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/color...
cpp
56315e1081efde6e14b88840d53876816fb2a7ca
https://github.com/DanBloomberg/leptonica/commit/a523d9bb1aaf91e758eb8d2ece55a33a877544cb
null
arvo:22167
n132/arvo:22167-vul
/src/ndpi
[ { "end_line": 5113, "function_name": "ndpi_parse_packet_line_info", "start_line": 4848, "target_file": "/src/ndpi/src/lib/ndpi_main.c" } ]
Heap-buffer-overflow READ 8
ndpi
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_ndpi_reader < INPUT_FILE or /out/fuzz_ndpi_reader INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/fuzz_nd...
cpp
4ceff1dc77bb75919f9394983529d89c604a700f
https://github.com/ntop/nDPI/commit/61066fb106efa6d3d95b67e47b662de208b2b622
null
arvo:22169
n132/arvo:22169-vul
/src/ndpi
[ { "end_line": 5102, "function_name": "ndpi_parse_packet_line_info", "start_line": 4838, "target_file": "/src/ndpi/src/lib/ndpi_main.c" } ]
Heap-buffer-overflow READ 2
ndpi
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_ndpi_reader < INPUT_FILE or /out/fuzz_ndpi_reader INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/fuzz_nd...
cpp
3874f0e0e0293dd977fda31d3f50c69ebcad4463
https://github.com/ntop/nDPI/commit/bbbc5fdbae79c72dbe157e02dfee4ef9f18014b5
null
arvo:22231
n132/arvo:22231-vul
/src/htslib
[ { "end_line": 2759, "function_name": "cram_decode_slice", "start_line": 2138, "target_file": "/src/htslib/cram/cram_decode.c" } ]
Heap-buffer-overflow READ {*}
htslib
asan
INFO: Seed: 3292646677 INFO: Loaded 1 modules (18151 inline 8-bit counters): 18151 [0x9c7f00, 0x9cc5e7), INFO: Loaded 1 PC tables (18151 PCs): 18151 [0x712b20,0x759990), /out/hts_open_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==2052=...
c
fc431ebc252166f47f798e20954c5ccf8be83a8c
https://github.com/samtools/htslib/commit/382867a850b74e7285166a67ee3243560cd974ac
null
arvo:2242
n132/arvo:2242-vul
/src/file
[ { "end_line": 1298, "function_name": "mcopy", "start_line": 1175, "target_file": "/src/file/src/softmagic.c" } ]
Use-of-uninitialized-value
file
msan
INFO: Seed: 3742660834 INFO: Loaded 1 modules (3851 guards): [0xa32600, 0xa3622c), /out/magic_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Uninitialized bytes in __interceptor_memchr at offset 5 inside [0x70100000006c, 320) ==10652==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x5a0592 in ...
cpp
1562e15149268477b395ec71309d13f8be99a83b
https://github.com/file/file/commit/55cb70a24a58fc73b7a2b9d1b2a49845668342cc
null
arvo:22507
n132/arvo:22507-vul
/src/mruby
[ { "end_line": 1132, "function_name": "mrb_str_format", "start_line": 563, "target_file": "/src/mruby/mrbgems/mruby-sprintf/src/sprintf.c" } ]
Stack-buffer-overflow WRITE 1
mruby
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/mruby_fuzzer ================================================================= ==2719==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f11ab84cb01 at pc 0x0000005f5dd4 bp 0x7ffcb31e2660 sp 0x7ffcb31e2658 WRITE of size 1 at 0x7f...
c
69c62415c07698d45e68ad2384a5204baf9e5f4d
https://github.com/mruby/mruby/commit/15c63688e3f1a3c6067e6af70e3e9bf999d91389
The integer format can exceed 32 characters on 64-bit platforms, due to components such as the format modifier (up to 4 characters), maximum width (up to 19 digits), period separator (1 character), maximum precision (up to 19 digits), format specifier (1 character), and NUL terminator (1 byte), resulting in a total len...
arvo:22665
n132/arvo:22665-vul
/src/opensc
[ { "end_line": 2192, "function_name": "auth_read_binary", "start_line": 2103, "target_file": "/src/opensc/src/libopensc/card-oberthur.c" } ]
Heap-buffer-overflow READ {*}
opensc
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader ================================================================= ==58335==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d000000c33 at pc 0x0000004961ba bp 0x7ffd99a9bd10 sp 0x7ffd99a9b4d8 READ of size 256 ...
c
4bc03cb55dc2be4a3af9ded56ac4e481ab76beb1
https://github.com/OpenSC/OpenSC/commit/55fd3db2b5f2ecdb8d2bc148270b75ec6ff2ed2f
null
arvo:22864
n132/arvo:22864-vul
/src/ndpi
[ { "end_line": 482, "function_name": "processCertificateElements", "start_line": 233, "target_file": "/src/ndpi/src/lib/protocols/tls.c" } ]
Use-of-uninitialized-value
ndpi
msan
INFO: Seed: 2447722595 INFO: Loaded 1 modules (13104 inline 8-bit counters): 13104 [0x99b3b2, 0x99e6e2), INFO: Loaded 1 PC tables (13104 PCs): 13104 [0x99e6e8,0x9d19e8), /out/fuzz_process_packet: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==15807==WARNING: MemorySanitizer: use-of-uninitialized-value #0 ...
c
b6eef17e54999586b6aef8f545c87de4d3ec0ab3
https://github.com/ntop/nDPI/commit/c793e16050df1de377e400eec6e2b34ccff6ca85
null
arvo:22912
n132/arvo:22912-vul
/src/ndpi
[ { "end_line": 120, "function_name": "ndpi_check_spotify", "start_line": 39, "target_file": "/src/ndpi/src/lib/protocols/spotify.c" } ]
Heap-buffer-overflow READ 7
ndpi
asan
INFO: Seed: 2022679384 INFO: Loaded 1 modules (13107 inline 8-bit counters): 13107 [0xaaece0, 0xab2013), INFO: Loaded 1 PC tables (13107 PCs): 13107 [0xab2018,0xae5348), /out/fuzz_process_packet: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==1...
c
16dc0ec29e0a6b0e12bcebdc2f5619d5d88da697
https://github.com/ntop/nDPI/commit/241af016e9e2a43d24cbdc2378d813ba523f5126
null
arvo:22925
n132/arvo:22925-vul
/src/oniguruma
[ { "end_line": 152, "function_name": "code_to_mbc", "start_line": 133, "target_file": "/src/oniguruma/src/euc_jp.c" } ]
Index-out-of-bounds
oniguruma
ubsan
INFO: Seed: 1563330194 INFO: Loaded 1 modules (11078 inline 8-bit counters): 11078 [0x83d770, 0x8402b6), INFO: Loaded 1 PC tables (11078 PCs): 11078 [0x591c10,0x5bd070), /out/fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc regparse.c:8502:48: runtime error: index -400 out of bounds for type 'OnigUChar [7...
c
d59cd4c021c4723ec22cfc1311579574d6fef521
https://github.com/kkos/oniguruma/commit/86f9fc7c620fa0e41f63b09bfd95e758d1e1f405
null
arvo:22967
n132/arvo:22967-vul
/src/opensc
[ { "end_line": 644, "function_name": "tcos_decipher", "start_line": 599, "target_file": "/src/opensc/src/libopensc/card-tcos.c" } ]
Stack-buffer-overflow WRITE {*}
opensc
asan
INFO: Seed: 1722764021 INFO: Loaded 1 modules (21943 inline 8-bit counters): 21943 [0xc093c0, 0xc0e977), INFO: Loaded 1 PC tables (21943 PCs): 21943 [0x8d16c8,0x927238), /out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==58...
c
55fd3db2b5f2ecdb8d2bc148270b75ec6ff2ed2f
https://github.com/OpenSC/OpenSC/commit/9d294de90d1cc66956389856e60b6944b27b4817
null
arvo:22977
n132/arvo:22977-vul
/src/libraw
[ { "end_line": 528, "function_name": "LibRaw::parseCR3", "start_line": 100, "target_file": "/src/libraw/src/metadata/cr3_parser.cpp" } ]
Index-out-of-bounds
libraw
ubsan
INFO: Seed: 1045785370 INFO: Loaded 1 modules (66117 inline 8-bit counters): 66117 [0xe70408, 0xe8064d), INFO: Loaded 1 PC tables (66117 PCs): 66117 [0x915d38,0xa18188), /out/libraw_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc src/metadata/cr3_parser.cpp:448:9: runtime error: index -1 out of bounds fo...
cpp
6fbba37dd298bf059b45e6c68364fd92f113625f
https://github.com/libraw/libraw/commit/126ce46cd8d6d64a8031eec9164a9d388675ae77
null
arvo:22993
n132/arvo:22993-vul
/src/libraw
[ { "end_line": 1147, "function_name": "LibRaw::identify", "start_line": 179, "target_file": "/src/libraw/src/metadata/identify.cpp" } ]
Use-of-uninitialized-value
libraw
msan
INFO: Seed: 2315957164 INFO: Loaded 1 modules (18056 inline 8-bit counters): 18056 [0xba1c30, 0xba62b8), INFO: Loaded 1 PC tables (18056 PCs): 18056 [0x8b8f98,0x8ff818), /out/libraw_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==54043==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x74cb...
cpp
371161a06d7f98f231a001dad4af2dfb463e270a
https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e
null
arvo:23021
n132/arvo:23021-vul
/src/ndpi
[ { "end_line": 423, "function_name": "ndpi_search_kerberos", "start_line": 43, "target_file": "/src/ndpi/src/lib/protocols/kerberos.c" } ]
Heap-buffer-overflow READ 1
ndpi
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_process_packet < INPUT_FILE or /out/fuzz_process_packet INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/f...
cpp
580859a47d164b64c95de2da6df2d49332af4875
https://github.com/ntop/nDPI/commit/7051acc0b5b8046b6415a454a2eff4fffa18396b
An off-by-one error exists in the Kerberos protocol.
arvo:23046
n132/arvo:23046-vul
/src/ndpi
[ { "end_line": 4345, "function_name": "ndpi_reset_packet_line_info", "start_line": 4332, "target_file": "/src/ndpi/src/lib/ndpi_main.c" } ]
Heap-use-after-free READ 3
ndpi
asan
INFO: Seed: 3039658789 INFO: Loaded 1 modules (18838 inline 8-bit counters): 18838 [0xb6dd00, 0xb72696), INFO: Loaded 1 PC tables (18838 PCs): 18838 [0xb72698,0xbbbff8), /out/fuzz_ndpi_reader: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==1580...
c
fd0591b4fcebba93a949bcdf2ad12e9f790e68a0
https://github.com/ntop/nDPI/commit/6a9f5e4f7c3fd5ddab3e6727b071904d76773952
null
arvo:23176
n132/arvo:23176-vul
/src/libraw
[ { "end_line": 1147, "function_name": "LibRaw::identify", "start_line": 179, "target_file": "/src/libraw/src/metadata/identify.cpp" } ]
Use-of-uninitialized-value
libraw
msan
INFO: Seed: 4179625615 INFO: Loaded 1 modules (18056 inline 8-bit counters): 18056 [0xba1c30, 0xba62b8), INFO: Loaded 1 PC tables (18056 PCs): 18056 [0x8b8f98,0x8ff818), /out/libraw_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==54041==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x5cf9...
cpp
371161a06d7f98f231a001dad4af2dfb463e270a
https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e
null
arvo:23197
n132/arvo:23197-vul
/src/libhevc
[ { "end_line": 3497, "function_name": "ihevcd_sao_shift_ctb", "start_line": 524, "target_file": "/src/libhevc/decoder/ihevcd_sao.c" } ]
Use-of-uninitialized-value
libhevc
msan
INFO: Seed: 3381587839 INFO: Loaded 1 modules (9462 inline 8-bit counters): 9462 [0xaba5f8, 0xabcaee), INFO: Loaded 1 PC tables (9462 PCs): 9462 [0x845db8,0x86ad18), /out/hevc_dec_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==1212==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x62a66e ...
cpp
7247e6e4017e540e6b2a99f728362ee997af58b0
https://android.googlesource.com/platform/external/libhevc/+/3cacdbc078fc3269f2273a45220f3d127e0d87e9%5E%21/
The function ihevcd_sao_shift_ctb in the decoder has a memory uninitialized issue.
arvo:23396
n132/arvo:23396-vul
/src/ndpi
[ { "end_line": 5116, "function_name": "ndpi_parse_packet_line_info", "start_line": 4853, "target_file": "/src/ndpi/src/lib/ndpi_main.c" } ]
Heap-buffer-overflow READ 1
ndpi
asan
INFO: Seed: 2911792074 INFO: Loaded 1 modules (11739 inline 8-bit counters): 11739 [0xaa5240, 0xaa801b), INFO: Loaded 1 PC tables (11739 PCs): 11739 [0xaa8020,0xad5dd0), /out/fuzz_process_packet: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==1...
c
4247dd8322c3eab5e879db75e9fc5df0189aa7c1
https://github.com/ntop/nDPI/commit/38e4910636bd6273b62e0b195c9d45483c39cc1a
null
arvo:23433
n132/arvo:23433-vul
/src/leptonica
[ { "end_line": 1096, "function_name": "findNextBorderPixel", "start_line": 1064, "target_file": "/src/leptonica/src/ccbord.c" } ]
Heap-buffer-overflow READ 4
leptonica
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/ccbord_fuzzer ================================================================= ==76052==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x612000000324 at pc 0x0000004cc124 bp 0x7ffde8763660 sp 0x7ffde8763658 READ of size 4 at 0x61...
cpp
20e1a048e61df966dbef86cdbdfb46e8baf25f04
https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842
A heap-buffer-overflow occurs in the findNextBorderPixel() function due to a missing check of the pix boundary when searching for the next pixel.
arvo:23499
n132/arvo:23499-vul
/src/clamav-devel
[ { "end_line": 1052, "function_name": "cli_codepage_to_utf8", "start_line": 774, "target_file": "/src/clamav-devel/libclamav/entconv.c" } ]
Heap-buffer-overflow READ {*}
clamav-devel
asan
INFO: Seed: 3876010279 INFO: Loaded 1 modules (44110 inline 8-bit counters): 44110 [0xe6c3c0, 0xe7700e), INFO: Loaded 1 PC tables (44110 PCs): 44110 [0xe77010,0xf234f0), /out/clamav_scanfile_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ...
cpp
8081a6b06cc9f3ceeb06e9a8664db8ae1cca6c16
https://github.com/Cisco-Talos/clamav-devel/commit/20490786224f4a8256fb395deb9c05084db91708
A null dereference and memory leaks occur in the egg utf8 conversion.
arvo:23524
n132/arvo:23524-vul
/src/ndpi
[ { "end_line": 6566, "function_name": "ndpi_check_dga_name", "start_line": 6501, "target_file": "/src/ndpi/src/lib/ndpi_main.c" } ]
Use-of-uninitialized-value
ndpi
msan
INFO: Seed: 350787703 INFO: Loaded 1 modules (12622 inline 8-bit counters): 12622 [0x98d212, 0x990360), INFO: Loaded 1 PC tables (12622 PCs): 12622 [0x990360,0x9c1840), /out/fuzz_process_packet: Running 1 inputs 1 time(s) each. Running: /tmp/poc [ndpi_main.c:6086] [NDPI] Internal error: please call ndpi_finalize_in...
c
ffd20ebdf94beffc1cb8ec56896a86e28907702c
https://github.com/ntop/nDPI/commit/46d96e7f32a799ae57400d82e4c485e4ef9771ab
null
arvo:23529
n132/arvo:23529-vul
/src/opensc
[ { "end_line": 208, "function_name": "asepcos_parse_sec_attr", "start_line": 165, "target_file": "/src/opensc/src/libopensc/card-asepcos.c" } ]
Heap-buffer-overflow READ 1
opensc
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader ================================================================= ==58334==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000005b5 at pc 0x00000060bb1e bp 0x7ffcfdc41520 sp 0x7ffcfdc41518 READ of size 1 at...
c
c4d7bb1a7ba80d155021f7a311b7fa6b1ce54e15
https://github.com/OpenSC/OpenSC/commit/7cf8087351c821aa1e617282db93ecb33d53d918
null
arvo:23592
n132/arvo:23592-vul
/src/PcapPlusPlus
[ { "end_line": 1637, "function_name": "SSLCertificateRequestMessage::SSLCertificateRequestMessage", "start_line": 1609, "target_file": "/src/PcapPlusPlus/Packet++/src/SSLHandshake.cpp" } ]
Heap-buffer-overflow READ 1
PcapPlusPlus
asan
INFO: Seed: 2209791217 INFO: Loaded 1 modules (16542 inline 8-bit counters): 16542 [0xa5f850, 0xa638ee), INFO: Loaded 1 PC tables (16542 PCs): 16542 [0xa638f0,0xaa42d0), /out/FuzzTarget: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==4908==ERRO...
cpp
50283e891b978f202be85deff5919bac712280e3
https://github.com/seladb/PcapPlusPlus/commit/31406a092868f87d714910e349ab0b4dc683722b
null
arvo:23717
n132/arvo:23717-vul
/src/c-blosc2
[ { "end_line": 37, "function_name": "LLVMFuzzerTestOneInput", "start_line": 10, "target_file": "/src/c-blosc2/tests/fuzz/fuzz_decompress.c" } ]
UNKNOWN READ
c-blosc2
msan
INFO: Seed: 960694843 INFO: Loaded 1 modules (44995 inline 8-bit counters): 44995 [0xfd6f6c, 0xfe1f2f), INFO: Loaded 1 PC tables (44995 PCs): 44995 [0xcd3860,0xd83490), /out/decompress_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc MemorySanitizer:DEADLYSIGNAL ==3241==ERROR: MemorySanitizer: SEGV on unk...
cpp
b7d25a742722e67fae7c0d8aa88e03c1c4a8c724
https://github.com/Blosc/c-blosc2/commit/db309703091a85ad93e0658f24926bcb474309c0
A vulnerability exists in decompress_fuzzer where header sizes are not properly validated, potentially leading to errors detected by address sanitizer (asan).
arvo:23725
n132/arvo:23725-vul
/src/hermes
[ { "end_line": 1017, "function_name": "JSLexer::consumeBracedCodePoint", "start_line": 945, "target_file": "/src/hermes/lib/Parser/JSLexer.cpp" } ]
Heap-buffer-overflow READ 1
hermes
asan
INFO: Seed: 3023245855 INFO: Loaded 1 modules (118139 inline 8-bit counters): 118139 [0x37a4c20, 0x37c199b), INFO: Loaded 1 PC tables (118139 PCs): 118139 [0x37c19a0,0x398f150), /out/fuzzer-jsi-entry: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================...
cpp
c6c6a404e06ea5c6ccb5b549f498a1041b871b3f
https://github.com/facebook/hermes/commit/f126e71e362dad0f7f1841cbc56b5d85e16e8cc4
A heap out of bounds read occurs in JSLexer::consumeBracedCodePoint due to continued use of the curCharPtr_ pointer after it is set to the end of the buffer. This situation arises when an invalid code point triggers a call to forceEOF in JSLexer::error, which sets curCharPtr_ to the buffer's end, but JSLexer::consumeBr...
arvo:23764
n132/arvo:23764-vul
/src/hoextdown
[ { "end_line": 1818, "function_name": "is_codefence", "start_line": 1777, "target_file": "/src/hoextdown/src/document.c" } ]
Heap-buffer-overflow READ 1
hoextdown
asan
Reading 77 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/hoedown_fuzzer < INPUT_FILE or /out/hoedown_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fu...
cpp
4afac5e4db81fc93619ce139f37cb2bd8597994e
https://github.com/kjdev/hoextdown/commit/7c7dc6ac9adce5413ab54dcd604db95a9b935b05
An out-of-bounds read occurs in code fence detection.
arvo:23765
n132/arvo:23765-vul
/src/libxml2
[ { "end_line": 5262, "function_name": "htmlParseLookupSequence", "start_line": 5141, "target_file": "/src/libxml2/HTMLparser.c" } ]
Heap-use-after-free READ 1
libxml2
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/html ================================================================= ==14972==ERROR: AddressSanitizer: heap-use-after-free on address 0x62100000a100 at pc 0x0000004d2979 bp 0x7ffd8b8c89f0 sp 0x7ffd8b8c89e8 READ of size 1 at 0x62100000a100...
c
f8329fdc234a43b858271acc75ea70881e35fcae
https://gitlab.gnome.org/GNOME/libxml2/-/commit/477c7f6affcb665305b333f92ce0a782325b4156
The HTML parser exhibits a quadratic runtime vulnerability due to the removal of an important optimization that avoids repeatedly scanning the input buffer for terminating characters. This issue arises in the HTML push parser, where ctxt->checkIndex is not always written and parser state is not properly managed, leadin...
arvo:23787
n132/arvo:23787-vul
/src/opensc
[ { "end_line": 595, "function_name": "authentic_set_current_files", "start_line": 523, "target_file": "/src/opensc/src/libopensc/card-authentic.c" } ]
Memcpy-param-overlap
opensc
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader ================================================================= ==58342==ERROR: AddressSanitizer: memcpy-param-overlap: memory ranges [0x615000000a82,0x615000000a86) and [0x615000000a80, 0x615000000a84) overlap SCARINES...
c
5098cfdb4034eb2b901edb0373fb8ecf866a42cd
https://github.com/OpenSC/OpenSC/commit/05dcde508b8f5884242c6832cc2a4521fedd626f
A vulnerability exists in the authentic module where memory regions can overlap when handling paths longer than 2B, due to the use of an unsafe memory copy operation.
arvo:23796
n132/arvo:23796-vul
/src/aac
[ { "end_line": 726, "function_name": "ConcealPitchLag", "start_line": 716, "target_file": "/src/aac/libAACdec/src/usacdec_acelp.cpp" } ]
Stack-buffer-overflow READ 4
aac
asan
INFO: Seed: 1586174533 INFO: Loaded 1 modules (28937 inline 8-bit counters): 28937 [0x85bc9b0, 0x85c3ab9), INFO: Loaded 1 PC tables (28937 PCs): 28937 [0x85057e8,0x853e030), /out/aacDecoder_DecodeFrame: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==============================================================...
cpp
5a83a8e5e1cafceba6bef7ac61e68a57cc93d786
https://android.googlesource.com/platform/external/aac//+/22e70729b4bf541ea507dda074e368dd00e29d0c%5E%21/
null
arvo:23815
n132/arvo:23815-vul
/src/glib
[ { "end_line": 310, "function_name": "uri_decoder", "start_line": 235, "target_file": "/src/glib/glib/guri.c" } ]
Heap-buffer-overflow READ 1
glib
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_uri_parse_params < INPUT_FILE or /out/fuzz_uri_parse_params INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /o...
cpp
67ba5bfe601f858f8ae3266142008dc90fbbe1b5
https://gitlab.gnome.org/GNOME/glibf9d165add1342ecae6cdde1b95e9ce63320768dd
null
arvo:23816
n132/arvo:23816-vul
/src/glib
[ { "end_line": 537, "function_name": "parse_ip_literal", "start_line": 464, "target_file": "/src/glib/glib/guri.c" } ]
Heap-buffer-overflow READ 5
glib
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_uri_parse < INPUT_FILE or /out/fuzz_uri_parse INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/fuzz_uri_pa...
cpp
c363c3a9a5d504621dfa07355f35ffe10d75e2a5
https://gitlab.gnome.org/GNOME/glibb43fb9cbfb033132e970f8b587d709c582dee1a0
A vulnerability exists in the URI scope parsing code in guri, where the parser can read past the end of a URI if it encounters an incorrect %-escaped character. This issue affects the handling of zone ID syntax as defined in RFC 6874, which amends RFC 3986. The vulnerability also impacts the correctness of network-addr...
arvo:23818
n132/arvo:23818-vul
/src/glib
[ { "end_line": 310, "function_name": "uri_decoder", "start_line": 235, "target_file": "/src/glib/glib/guri.c" } ]
Heap-buffer-overflow READ 1
glib
asan
INFO: Seed: 320464510 INFO: Loaded 1 modules (15213 inline 8-bit counters): 15213 [0xa10aa0, 0xa1460d), INFO: Loaded 1 PC tables (15213 PCs): 15213 [0xa14610,0xa4fce0), /out/fuzz_uri_escape: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==7508==...
cpp
67ba5bfe601f858f8ae3266142008dc90fbbe1b5
https://gitlab.gnome.org/GNOME/glibf9d165add1342ecae6cdde1b95e9ce63320768dd
null
arvo:23826
n132/arvo:23826-vul
/src/c-blosc2
[ { "end_line": 2198, "function_name": "blosc2_decompress", "start_line": 2158, "target_file": "/src/c-blosc2/blosc/blosc2.c" } ]
Use-of-uninitialized-value
c-blosc2
msan
INFO: Seed: 4133444584 INFO: Loaded 1 modules (45073 inline 8-bit counters): 45073 [0xf8effc, 0xf9a00d), INFO: Loaded 1 PC tables (45073 PCs): 45073 [0xc8aac0,0xd3abd0), /out/decompress_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==3242==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x5...
c
c203bdd674779c25ee0342721e41e5b722ff346c
https://github.com/Blosc/c-blosc2/commit/d80b5acaf23ec4c2453a348b35096b99601fcde5
null
arvo:23837
n132/arvo:23837-vul
/src/libraw
[ { "end_line": 1147, "function_name": "LibRaw::identify", "start_line": 179, "target_file": "/src/libraw/src/metadata/identify.cpp" } ]
Index-out-of-bounds
libraw
ubsan
INFO: Seed: 3412816079 INFO: Loaded 1 modules (67793 inline 8-bit counters): 67793 [0xe56420, 0xe66cf1), INFO: Loaded 1 PC tables (67793 PCs): 67793 [0x8f0c10,0x9f9920), /out/libraw_raf_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc unknown file: data corrupted at 116218 src/demosaic/dht_demosaic.cpp:34...
cpp
371161a06d7f98f231a001dad4af2dfb463e270a
https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e
null
arvo:23848
n132/arvo:23848-vul
/src/arrow
[ { "end_line": 693, "function_name": "ReadDictionary", "start_line": 645, "target_file": "/src/arrow/cpp/src/arrow/ipc/reader.cc" } ]
Heap-buffer-overflow READ {*}
arrow
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/arrow-ipc-file-fuzz < INPUT_FILE or /out/arrow-ipc-file-fuzz INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/a...
cpp
269bb7f3cc5ea6f6d958593a44a357f92561afdc
https://github.com/apache/arrow/commit/cb2cf2f2a4714d161535837d90b025feef5bca5c
null
arvo:23868
n132/arvo:23868-vul
/src/arrow
[ { "end_line": 693, "function_name": "ReadDictionary", "start_line": 645, "target_file": "/src/arrow/cpp/src/arrow/ipc/reader.cc" } ]
Heap-buffer-overflow READ 8
arrow
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/arrow-ipc-file-fuzz < INPUT_FILE or /out/arrow-ipc-file-fuzz INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/a...
cpp
269bb7f3cc5ea6f6d958593a44a357f92561afdc
https://github.com/apache/arrow/commit/cb2cf2f2a4714d161535837d90b025feef5bca5c
null
arvo:23870
n132/arvo:23870-vul
/src/libraw
[ { "end_line": 1147, "function_name": "LibRaw::identify", "start_line": 179, "target_file": "/src/libraw/src/metadata/identify.cpp" } ]
Index-out-of-bounds
libraw
ubsan
INFO: Seed: 2028567510 INFO: Loaded 1 modules (67793 inline 8-bit counters): 67793 [0xe56420, 0xe66cf1), INFO: Loaded 1 PC tables (67793 PCs): 67793 [0x8f0c10,0x9f9920), /out/libraw_cr2_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc src/demosaic/dht_demosaic.cpp:100:21: runtime error: index 3 out of bou...
cpp
371161a06d7f98f231a001dad4af2dfb463e270a
https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e
null
arvo:23916
n132/arvo:23916-vul
/src/arrow
[ { "end_line": 164, "function_name": "PutOffsets", "start_line": 133, "target_file": "/src/arrow/cpp/src/arrow/array/concatenate.cc" } ]
Heap-buffer-overflow READ 4
arrow
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/arrow-ipc-stream-fuzz < INPUT_FILE or /out/arrow-ipc-stream-fuzz INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /o...
cpp
2b4d682be164794a8308c269b885fd67222ceb79
https://github.com/apache/arrow/commit/52afc10adc0c65e3c999665fad28ce78944e23b0
null
arvo:23979
n132/arvo:23979-vul
/src/opensc
[ { "end_line": 1786, "function_name": "coolkey_rsa_op", "start_line": 1678, "target_file": "/src/opensc/src/libopensc/card-coolkey.c" } ]
Stack-use-after-scope READ 8
opensc
asan
INFO: Seed: 905504264 INFO: Loaded 1 modules (31828 inline 8-bit counters): 31828 [0xf54040, 0xf5bc94), INFO: Loaded 1 PC tables (31828 PCs): 31828 [0xbe1c88,0xc5e1c8), /out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==577...
c
8963c351897b2c28011d1e941a31c6cb8a140a8d
https://github.com/OpenSC/OpenSC/commit/cdbcb5b7db8766d6ea9da6912755ed335780f2f9
A stack-use-after-scope vulnerability exists in coolkey, where memory on the stack is accessed after its lifetime has ended.
arvo:23991
n132/arvo:23991-vul
/src/binutils-gdb
[ { "end_line": 1395, "function_name": "print_insn_arc", "start_line": 933, "target_file": "/src/binutils-gdb/opcodes/arc-dis.c" } ]
Global-buffer-overflow READ 8
binutils-gdb
asan
INFO: Seed: 4274094732 INFO: Loaded 1 modules (195687 inline 8-bit counters): 195687 [0x35dcf90, 0x360cbf7), INFO: Loaded 1 PC tables (195687 PCs): 195687 [0x26df238,0x29db8a8), /out/fuzz_disassemble: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================...
c
bfbd943845684ac374c41797154d2c53cc338145
https://github.com/bminor/binutils-gdb/commit/570b0ed6d5368f4653bf019c60fa277ed7e983bf
A vulnerability exists in ARC where illegal double register pairs, specifically even-odd register combinations, can be used in certain instructions. While the GNU assembler does not permit these combinations, the disassembler (in arc-dis.c, function print_insn_arc) may encounter and process them without detection, pote...
arvo:24016
n132/arvo:24016-vul
/src/libraw
[ { "end_line": 1147, "function_name": "LibRaw::identify", "start_line": 179, "target_file": "/src/libraw/src/metadata/identify.cpp" } ]
Use-of-uninitialized-value
libraw
msan
INFO: Seed: 2535845648 INFO: Loaded 1 modules (18059 inline 8-bit counters): 18059 [0xba1c30, 0xba62bb), INFO: Loaded 1 PC tables (18059 PCs): 18059 [0x8b9168,0x8ffa18), /out/libraw_cr2_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==54052==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x...
cpp
371161a06d7f98f231a001dad4af2dfb463e270a
https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e
null
arvo:24097
n132/arvo:24097-vul
/src/htslib
[ { "end_line": 2577, "function_name": "vcf_parse_format", "start_line": 2206, "target_file": "/src/htslib/vcf.c" } ]
UNKNOWN WRITE
htslib
ubsan
INFO: Seed: 3944442803 INFO: Loaded 1 modules (29474 inline 8-bit counters): 29474 [0x94cce8, 0x95400a), INFO: Loaded 1 PC tables (29474 PCs): 29474 [0x601a68,0x674c88), /out/hts_open_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc [W::vcf_parse] Contig '@SQ' is not defined in the header. (Quick workarou...
c
df31e599a3d3778804b6a7fda9bb5fdc683ee34c
https://github.com/samtools/htslib/commit/dcd4b7304941a8832fba2d0fc4c1e716e7a4e72c
The check for excessive record size in vcf_parse_format() only considers individual fields, allowing the combined size of multiple fields to exceed INT_MAX and overflow fmt_aux_t::offset. This enables a vulnerability where the total memory used by all fields in a VCF record can surpass the intended limit.
arvo:24106
n132/arvo:24106-vul
/src/imagemagick
[ { "end_line": 4450, "function_name": "RenderMVGContent", "start_line": 2409, "target_file": "/src/imagemagick/MagickCore/draw.c" } ]
Heap-buffer-overflow WRITE 1
imagemagick
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/encoder_mvg_fuzzer ================================================================= ==199796==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62100005dcff at pc 0x0000006515cc bp 0x7ffd027eac50 sp 0x7ffd027eac48 WRITE of size 1 ...
cpp
e0c34b9b125c243e2a5c8fbe35dbe7699dd8d798
https://github.com/imagemagick/imagemagick/commit/f2d5b7615ec97abb32d24d2b021d386283d983ec
null
arvo:24157
n132/arvo:24157-vul
/src/ots
[ { "end_line": 1029, "function_name": "Font::DropVariations", "start_line": 1016, "target_file": "/src/ots/src/ots.cc" } ]
Use-of-uninitialized-value
ots
msan
INFO: Seed: 3530716108 INFO: Loaded 1 modules (22487 inline 8-bit counters): 22487 [0xc60168, 0xc6593f), INFO: Loaded 1 PC tables (22487 PCs): 22487 [0xc65940,0xcbd6b0), /out/ots-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ERROR at ../../src/ots/src/ots.cc:603 (ProcessGeneric) ERROR at ../../src/ots/...
cpp
d6ade56a990cfb73b4d27d191cfa45e2426ccc92
https://github.com/khaledhosny/ots/commit/a7d63a004b03224070cc55d78485ee8669627093
Dropping a variation table does not remove it from m_tables.
arvo:24164
n132/arvo:24164-vul
/src/muparser
[ { "end_line": 929, "function_name": "ParserBase::ApplyIfElse", "start_line": 887, "target_file": "/src/muparser/src/muParserBase.cpp" } ]
Heap-buffer-overflow READ 8
muparser
asan
INFO: Seed: 1209813774 INFO: Loaded 1 modules (6217 inline 8-bit counters): 6217 [0x8eb4c8, 0x8ecd11), INFO: Loaded 1 PC tables (6217 PCs): 6217 [0x667b38,0x67ffc8), /out/set_eval_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==522==ERRO...
cpp
381017ac752f31c417fd6be3c61f248b7ec88436
https://github.com/beltoforion/muparser/commit/650fbf88fae47c315ac4ba1c5519423664e4119e
null
arvo:24183
n132/arvo:24183-vul
/src/opensc
[ { "end_line": 216, "function_name": "asepcos_parse_sec_attr", "start_line": 165, "target_file": "/src/opensc/src/libopensc/card-asepcos.c" } ]
Heap-buffer-overflow READ 1
opensc
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader ================================================================= ==58335==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000595 at pc 0x00000060ba47 bp 0x7ffdcd48de40 sp 0x7ffdcd48de38 READ of size 1 at...
c
6903aebfddc466d966c7b865fae34572bf3ed23e
https://github.com/OpenSC/OpenSC/commit/978c912c7089fa4573add7140170feb9fcbe7f87
A heap-buffer-overflow vulnerability exists due to an incomplete fix in commit 7cf8087351c821aa1e617282db93ecb33d53d918. The length of the buffer is not properly changed right before it's accessed, leading to a potential out-of-bounds read.
arvo:24316
n132/arvo:24316-vul
/src/opensc
[ { "end_line": 346, "function_name": "sc_oberthur_read_file", "start_line": 231, "target_file": "/src/opensc/src/libopensc/pkcs15-oberthur.c" } ]
Heap-buffer-overflow WRITE 1
opensc
asan
INFO: Seed: 754794754 INFO: Loaded 1 modules (21822 inline 8-bit counters): 21822 [0xc06440, 0xc0b97e), INFO: Loaded 1 PC tables (21822 PCs): 21822 [0x8cf8c8,0x924ca8), /out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==583...
c
9ffb9bae63c8b7fbababb8481a83f1b575e59a18
https://github.com/OpenSC/OpenSC/commit/6903aebfddc466d966c7b865fae34572bf3ed23e
null
arvo:24436
n132/arvo:24436-vul
/src/php-src
[ { "end_line": 2316, "function_name": "zend_emit_jmp_null", "start_line": 2308, "target_file": "/src/php-src/Zend/zend_compile.c" } ]
Heap-use-after-free READ 4
php-src
asan
INFO: Seed: 438137261 INFO: Loaded 1 modules (129041 inline 8-bit counters): 129041 [0x193b260, 0x195aa71), INFO: Loaded 1 PC tables (129041 PCs): 129041 [0x195aa78,0x1b52b88), /out/php-fuzz-parser: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ...
cpp
2dbb4ecfa1d7e32ccce6591158391a62cf4cbe2f
https://github.com/php/php-src/commit/5303bcdd32e8171399c2c60bf431e5304a66c39a
null
arvo:24567
n132/arvo:24567-vul
/src/php-src
[ { "end_line": 2316, "function_name": "zend_emit_jmp_null", "start_line": 2308, "target_file": "/src/php-src/Zend/zend_compile.c" } ]
Heap-use-after-free READ 4
php-src
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/php-fuzz-parser ================================================================= ==136338==ERROR: AddressSanitizer: heap-use-after-free on address 0x606000013820 at pc 0x000000bbdc0f bp 0x7ffcaadc5640 sp 0x7ffcaadc5638 READ of size 4 at 0x...
cpp
2dbb4ecfa1d7e32ccce6591158391a62cf4cbe2f
https://github.com/php/php-src/commit/5303bcdd32e8171399c2c60bf431e5304a66c39a
null
arvo:24638
n132/arvo:24638-vul
/src/binutils-gdb
[ { "end_line": 416, "function_name": "vms_traverse_index", "start_line": 244, "target_file": "/src/binutils-gdb/bfd/vms-lib.c" } ]
Stack-buffer-overflow READ 1
binutils-gdb
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_bfd ================================================================= ==291280==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fdf7166f220 at pc 0x0000004da15d bp 0x7ffefbc95d30 sp 0x7ffefbc95d28 READ of size 1 at 0x7fdf7...
c
b5f386d52049067ca081651a460ab4ae85e327d4
https://github.com/bminor/binutils-gdb/commit/e44a1d7b9ad8d73f6cea1f20fe353fc12f9b8e66
A buffer overflow occurs in the vms_traverse_index function in vms-lib.c due to missing sanity checks on the remaining size before accessing vms_idx or vms_elfidx.
arvo:2479
n132/arvo:2479-vul
/src/librawspeed
[ { "end_line": 86, "function_name": "MosDecoder::MosDecoder", "start_line": 70, "target_file": "/src/librawspeed/src/librawspeed/decoders/MosDecoder.cpp" }, { "end_line": 136, "function_name": "MosDecoder::decodeRawInternal", "start_line": 97, "target_file": "/src/librawspeed/src/...
UNKNOWN READ
librawspeed
asan
INFO: Seed: 3521745198 INFO: Loaded 1 modules (13353 guards): [0xab8df0, 0xac5e94), /out/TiffParserFuzzer-GetDecoder-Decode: Running 1 inputs 1 time(s) each. Running: /tmp/poc ASAN:DEADLYSIGNAL ================================================================= ==3392==ERROR: AddressSanitizer: SEGV on unknown address 0x...
cpp
1cda622444fb13abe35ff42d1b3a7d940f728100
https://github.com/darktable-org/rawspeed/commit/65cc3c5e0ccce9bc87c3e80703c7c55e8466c587
null
arvo:24884
n132/arvo:24884-vul
/src/arrow
[ { "end_line": 401, "function_name": "ConcreteTypeFromFlatbuffer", "start_line": 256, "target_file": "/src/arrow/cpp/src/arrow/ipc/metadata_internal.cc" } ]
Negative-size-param
arrow
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/arrow-ipc-stream-fuzz ================================================================= ==782==ERROR: AddressSanitizer: negative-size-param: (size=-58982400) SCARINESS: 10 (negative-size-param) #0 0x52e465 in MemcmpInterceptorCommon(voi...
cpp
525a5e96a4c460a8cd0a5c6965a39529926035aa
https://github.com/apache/arrow/commit/570184b9b1aac88ea0f82a13655babe3c730c8f6
null