task_id
stringlengths
8
10
docker_image
stringlengths
17
19
basedir
stringclasses
157 values
target_functions
listlengths
1
3
crash_type
stringclasses
85 values
project_name
stringclasses
157 values
sanitizer
stringclasses
3 values
sanitizer_output
stringlengths
1.13k
6.5M
language
stringclasses
2 values
vuln_commit
stringlengths
40
40
fix
stringlengths
69
110
vulnerability_description
stringlengths
38
824
arvo:24895
n132/arvo:24895-vul
/src/sleuthkit
[ { "end_line": 4412, "function_name": "hfs_load_extended_attrs", "start_line": 3834, "target_file": "/src/sleuthkit/tsk/fs/hfs.c" } ]
Heap-buffer-overflow READ 1
sleuthkit
asan
INFO: Seed: 4278835617 INFO: Loaded 1 modules (18725 inline 8-bit counters): 18725 [0xaec3b8, 0xaf0cdd), INFO: Loaded 1 PC tables (18725 PCs): 18725 [0x7e4d88,0x82dfd8), /out/sleuthkit_fls_hfs_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================...
cpp
dc51bb6bb73ea7c57703e897115ae20dcf1e4ade
https://github.com/sleuthkit/sleuthkit/commit/d4fe8a8130b77b3601fbd167a7a4884d097aa97d
null
arvo:24901
n132/arvo:24901-vul
/src/sleuthkit
[ { "end_line": 766, "function_name": "ntfs_make_data_run", "start_line": 570, "target_file": "/src/sleuthkit/tsk/fs/ntfs.c" } ]
Heap-buffer-overflow READ 1
sleuthkit
asan
INFO: Seed: 3401947893 INFO: Loaded 1 modules (18619 inline 8-bit counters): 18619 [0xaea078, 0xaee933), INFO: Loaded 1 PC tables (18619 PCs): 18619 [0x7e2668,0x82b218), /out/sleuthkit_fls_ntfs_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===============================================================...
cpp
b5bdca074daa9edb20e954c5055ef766f88330fd
https://github.com/sleuthkit/sleuthkit/commit/243274a82cc506507bc59083d63a0d3b7ced611e
null
arvo:24902
n132/arvo:24902-vul
/src/sleuthkit
[ { "end_line": 1048, "function_name": "hfs_cat_traverse", "start_line": 737, "target_file": "/src/sleuthkit/tsk/fs/hfs.c" } ]
Heap-buffer-overflow READ 1
sleuthkit
asan
INFO: Seed: 1388391306 INFO: Loaded 1 modules (18721 inline 8-bit counters): 18721 [0xaec2f8, 0xaf0c19), INFO: Loaded 1 PC tables (18721 PCs): 18721 [0x7e4a88,0x82dc98), /out/sleuthkit_fls_hfs_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================...
cpp
5eabe4d554f09bf31f8a375735c096b1df4de0e8
https://github.com/sleuthkit/sleuthkit/commit/2701739f8ad80d14c36de1e3a7a35bd792fceabb
null
arvo:24940
n132/arvo:24940-vul
/src/opensc
[ { "end_line": 216, "function_name": "asepcos_parse_sec_attr", "start_line": 165, "target_file": "/src/opensc/src/libopensc/card-asepcos.c" } ]
Heap-buffer-overflow READ 1
opensc
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader ================================================================= ==58335==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000597 at pc 0x00000060be6c bp 0x7fff66f86480 sp 0x7fff66f86478 READ of size 1 at...
c
94d67bed81a24dc8e6058c8f679df27d7e8a9fb5
https://github.com/OpenSC/OpenSC/commit/238b783a0e267201ef8d0d79dc5fd21423f3316d
null
arvo:24993
n132/arvo:24993-vul
/src/libheif
[ { "end_line": 702, "function_name": "Op_RGB_to_YCbCr<Pixel>::convert_colorspace", "start_line": 572, "target_file": "/src/libheif/libheif/heif_colorconversion.cc" } ]
Heap-buffer-overflow READ {*}
libheif
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/file-fuzzer < INPUT_FILE or /out/file-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/file-fuzzer [-N] ...
cpp
ab9c1a5b1dadd9e2ffca621fb5b9cd3c87a5e4ca
https://github.com/strukturag/libheif/commit/5f80153e95109741dd1779b12ff13554dee6affc
A crash occurs when copying a non-HDR alpha plane.
arvo:25014
n132/arvo:25014-vul
/src/libxml2
[ { "end_line": 1994, "function_name": "xmlXIncludeLoadFallback", "start_line": 1959, "target_file": "/src/libxml2/xinclude.c" } ]
Heap-use-after-free READ 8
libxml2
asan
INFO: Seed: 2435581768 INFO: Loaded 1 modules (46011 inline 8-bit counters): 46011 [0xc1eb00, 0xc29ebb), INFO: Loaded 1 PC tables (46011 PCs): 46011 [0x8bc910,0x9704c0), /out/xml: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==15692==ERROR: Add...
c
d63cfeca3577dfa2e658b33c56889dbab7de8ff5
https://gitlab.gnome.org/GNOME/libxml2/-/commit/19cae17f5a2acfbd5554d145bb87cd6bf2de244f
The xi:fallback processing in the code does not properly fix up namespaces when fallback children are not copied, which can lead to use-after-free errors.
arvo:25110
n132/arvo:25110-vul
/src/libxml2
[ { "end_line": 2279, "function_name": "xmlXIncludeIncludeNode", "start_line": 2188, "target_file": "/src/libxml2/xinclude.c" } ]
Use-of-uninitialized-value
libxml2
msan
INFO: Seed: 2838955145 INFO: Loaded 1 modules (46053 inline 8-bit counters): 46053 [0xdcac00, 0xdd5fe5), INFO: Loaded 1 PC tables (46053 PCs): 46053 [0xaa3e90,0xb57ce0), /out/xml: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==15588==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x78b110 in xmlX...
c
87d20b554c6a90e7ece1cc7391c005089bf85b78
https://gitlab.gnome.org/GNOME/libxml2/-/commit/3fcf319378f9396a9ca840cd63b96a441818e1f1
null
arvo:25118
n132/arvo:25118-vul
/src/c-blosc2
[ { "end_line": 2198, "function_name": "blosc2_decompress", "start_line": 2158, "target_file": "/src/c-blosc2/blosc/blosc2.c" } ]
Heap-buffer-overflow READ 1
c-blosc2
asan
INFO: Seed: 118431039 INFO: Loaded 1 modules (46464 inline 8-bit counters): 46464 [0xde78c0, 0xdf2e40), INFO: Loaded 1 PC tables (46464 PCs): 46464 [0xade848,0xb94048), /out/decompress_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==3202...
c
c203bdd674779c25ee0342721e41e5b722ff346c
https://github.com/Blosc/c-blosc2/commit/d80b5acaf23ec4c2453a348b35096b99601fcde5
null
arvo:25121
n132/arvo:25121-vul
/src/leptonica
[ { "end_line": 105, "function_name": "LLVMFuzzerTestOneInput", "start_line": 3, "target_file": "/src/leptonica/prog/fuzzing/pix4_fuzzer.cc" } ]
Use-of-uninitialized-value
leptonica
msan
INFO: Seed: 369085514 INFO: Loaded 1 modules (112079 inline 8-bit counters): 112079 [0x1a4a008, 0x1a655d7), INFO: Loaded 1 PC tables (112079 PCs): 112079 [0x1a655d8,0x1c1b2c8), /out/pix4_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==74118==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0...
cpp
f6c563c1fc808da52b83fb1e92e09ea4772aa1b8
https://github.com/DanBloomberg/leptonica/commit/700cb86fd59a2cfe32a0657f95adbc8ffbf2138d
The function pixGetCmapHistogramInRect in pix4_fuzzer uses an uninitialized value when provided with a garbage pix input, leading to a security vulnerability.
arvo:25136
n132/arvo:25136-vul
/src/libzmq
[ { "end_line": 66, "function_name": "LLVMFuzzerTestOneInput", "start_line": 43, "target_file": "/src/libzmq/tests/test_socket_options_fuzzer.cpp" } ]
Heap-buffer-overflow WRITE 1
libzmq
asan
INFO: Seed: 2391544920 INFO: Loaded 1 modules (18199 inline 8-bit counters): 18199 [0x8564c74, 0x856938b), INFO: Loaded 1 PC tables (18199 PCs): 18199 [0x856938c,0x858cc44), /out/test_socket_options_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==========================================================...
cpp
2fb04c101823bbecc31ce2f9d253eeafbba1b92f
https://github.com/zeromq/libzmq/commit/5b0956c38198652c3ab41d325e93cd89a076635f
null
arvo:25210
n132/arvo:25210-vul
/src/libxml2
[ { "end_line": 1671, "function_name": "xmlTextReaderRead", "start_line": 1351, "target_file": "/src/libxml2/xmlreader.c" } ]
Heap-use-after-free READ 4
libxml2
asan
INFO: Seed: 4018252960 INFO: Loaded 1 modules (47093 inline 8-bit counters): 47093 [0xc3f440, 0xc4ac35), INFO: Loaded 1 PC tables (47093 PCs): 47093 [0x8d2cf0,0x98ac40), /out/xml: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==10008==ERROR: Add...
c
6f1470a5d6e3e369fe93f52d5760ba7c947f0cd1
https://gitlab.gnome.org/GNOME/libxml2/-/commit/ba589adc2f86c6be9ad7e0d771d4c9b09d059b89
A double free occurs in xmlTextReaderRead when processing an XInclude with an empty fallback in the XML reader.
arvo:25221
n132/arvo:25221-vul
/src/poppler
[ { "end_line": 711, "function_name": "getChars", "start_line": 693, "target_file": "/src/poppler/poppler/Stream.h" } ]
Negative-size-param
poppler
asan
INFO: Seed: 2549092301 INFO: Loaded 1 modules (78788 inline 8-bit counters): 78788 [0x14b76f8, 0x14caabc), INFO: Loaded 1 PC tables (78788 PCs): 78788 [0xf48408,0x107c048), /out/pdf_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==16600==...
cpp
c09f01b1be772b39b3d160ebdd6d09eac06e375d
https://anongit.freedesktop.org/git/poppler/poppler.git55eb5c73e5fb609ba56dee28f74e53b2be28fbb7
A vulnerability exists in BaseMemStream::getChars where the function does not properly handle cases when the read position is past the end, potentially leading to unintended behavior.
arvo:25321
n132/arvo:25321-vul
/src/php-src
[ { "end_line": 713, "function_name": "zend_generator_get_next_delegated_value", "start_line": 632, "target_file": "/src/php-src/Zend/zend_generators.c" } ]
UNKNOWN READ
php-src
asan
INFO: Seed: 3529873851 INFO: Loaded 1 modules (117029 inline 8-bit counters): 117029 [0x94c7520, 0x94e3e45), INFO: Loaded 1 PC tables (117029 PCs): 117029 [0x94e3e48,0x95c8770), /out/php-fuzz-execute: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:DEADLYSIGNAL ==================================...
cpp
c98e1747a8cd7d02bfaf76391ebef5d0b4d60c53
https://github.com/php/php-src/commit/ddc2a2d381843e086fc36388981d0b8ba1ea789d
null
arvo:25364
n132/arvo:25364-vul
/src/libsndfile
[ { "end_line": 1164, "function_name": "psf_binheader_readf", "start_line": 973, "target_file": "/src/libsndfile/src/common.c" } ]
Use-of-uninitialized-value
libsndfile
msan
INFO: Seed: 434224286 INFO: Loaded 1 modules (10107 inline 8-bit counters): 10107 [0x96f3ba, 0x971b35), INFO: Loaded 1 PC tables (10107 PCs): 10107 [0x6f1940,0x7190f0), /out/sndfile_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==16873==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x5f76...
cpp
7e2db6e8ef160ef3aa9f2df4e5205cd3e9cc270e
https://github.com/erikd/libsndfile/commit/739bc8cdac8d56c2c5f097a50cbf20fa941ff59d
An uninitialized variable exists in the function psf_binheader_readf().
arvo:25366
n132/arvo:25366-vul
/src/libsndfile
[ { "end_line": 644, "function_name": "host_read_d2f", "start_line": 620, "target_file": "/src/libsndfile/src/double64.c" } ]
Use-of-uninitialized-value
libsndfile
msan
INFO: Seed: 3592946974 INFO: Loaded 1 modules (10052 inline 8-bit counters): 10052 [0x96d31a, 0x96fa5e), INFO: Loaded 1 PC tables (10052 PCs): 10052 [0x6efe30,0x717270), /out/sndfile_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==16462==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x613...
cpp
2221cbedd7abc311882e101078049e94b2968082
https://github.com/erikd/libsndfile/commit/288764df0959a91741a47a124b39c6365af1b005
A use of uninitialized value occurs in the function endswap_int64_t_array.
arvo:25402
n132/arvo:25402-vul
/src/muparser
[ { "end_line": 1502, "function_name": "ParserBase::CreateRPN", "start_line": 1246, "target_file": "/src/muparser/src/muParserBase.cpp" } ]
Heap-buffer-overflow READ 8
muparser
asan
INFO: Seed: 2884514742 INFO: Loaded 1 modules (5994 inline 8-bit counters): 5994 [0x8eb5c8, 0x8ecd32), INFO: Loaded 1 PC tables (5994 PCs): 5994 [0x668a58,0x6800f8), /out/set_eval_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==482==ERRO...
cpp
9e28c713f1413eb3cbc2949043108a3bba47f9a1
https://github.com/beltoforion/muparser/commit/322716256d60e316c9a3b905a387be36d4e47368
null
arvo:25446
n132/arvo:25446-vul
/src/ndpi
[ { "end_line": 425, "function_name": "ndpi_search_kerberos", "start_line": 43, "target_file": "/src/ndpi/src/lib/protocols/kerberos.c" } ]
Stack-buffer-overflow READ 1
ndpi
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_process_packet < INPUT_FILE or /out/fuzz_process_packet INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/f...
cpp
1c0e617d802d214b0186f2752b50b8ee2a9e17a6
https://github.com/ntop/nDPI/commit/37abe0daea8c964dbd2e09058074bfc7ae053199
null
arvo:25526
n132/arvo:25526-vul
/src/php-src
[ { "end_line": 12066, "function_name": "ZEND_JMP_NULL_SPEC_TMPVARCV_HANDLER", "start_line": 12033, "target_file": "/src/php-src/Zend/zend_vm_execute.h" } ]
Heap-use-after-free READ 4
php-src
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/php-fuzz-execute ================================================================= ==138649==ERROR: AddressSanitizer: heap-use-after-free on address 0x612000013fc0 at pc 0x000000b5623a bp 0x7ffe26e92970 sp 0x7ffe26e92968 READ of size 4 at 0...
cpp
a009d370e93fdc5928b2de9321d433ca39e7c6e6
https://github.com/php/php-src/commit/3c53732332c4b9d3904eec0d1c42f0d4d4bf65c6
The JMP_NULL instruction in exception handling does not initialize the result variable in the exceptional case, leading to use of an undefined variable.
arvo:25530
n132/arvo:25530-vul
/src/libsndfile
[ { "end_line": 257, "function_name": "ima_reader_init", "start_line": 177, "target_file": "/src/libsndfile/src/ima_adpcm.c" } ]
Heap-buffer-overflow WRITE 2
libsndfile
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/sndfile_fuzzer < INPUT_FILE or /out/sndfile_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/sndfile_fuz...
cpp
2db6a8fd2e1e7d9d1ad309d4f4110712f7cb4e5d
https://github.com/erikd/libsndfile/commit/3970faeb7fc8cee60cc5260ab4102433c37d5d63
The vulnerability occurs in wavlike_ima_decode_block(), where the loop that processes IMA ADPCM data assumes there are always 8 nibbles per channel. If there is not enough space allocated to store the decoded nibbles, this can lead to a crash. The issue is related to insufficient buffer allocation when handling the dec...
arvo:25533
n132/arvo:25533-vul
/src/htslib
[ { "end_line": 1295, "function_name": "bcf_dec_typed_int1_safe", "start_line": 1265, "target_file": "/src/htslib/vcf.c" } ]
Heap-buffer-overflow READ 4
htslib
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/hts_open_fuzzer < INPUT_FILE or /out/hts_open_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/hts_open_...
cpp
34ba6c726925efceaa2cc995d7d4b0409907f331
https://github.com/samtools/htslib/commit/8bab82bdb8c2613e1ca7bd5573d7c12117a2dc02
null
arvo:25545
n132/arvo:25545-vul
/src/ndpi
[ { "end_line": 6870, "function_name": "ndpi_check_dga_name", "start_line": 6666, "target_file": "/src/ndpi/src/lib/ndpi_main.c" } ]
Use-of-uninitialized-value
ndpi
msan
INFO: Seed: 3316029529 INFO: Loaded 1 modules (13066 inline 8-bit counters): 13066 [0x98bfb0, 0x98f2ba), INFO: Loaded 1 PC tables (13066 PCs): 13066 [0x98f2c0,0x9c2360), /out/fuzz_process_packet: Running 1 inputs 1 time(s) each. Running: /tmp/poc Uninitialized bytes in StrstrCheck at offset 127 inside [0x7ffe76bbca...
c
ea4240055d5301b52d9fa934b8d14c126375eb17
https://github.com/ntop/nDPI/commit/1c0e617d802d214b0186f2752b50b8ee2a9e17a6
null
arvo:25561
n132/arvo:25561-vul
/src/libsndfile
[ { "end_line": 2897, "function_name": "validate_sfinfo", "start_line": 2882, "target_file": "/src/libsndfile/src/sndfile.c" } ]
Index-out-of-bounds
libsndfile
ubsan
INFO: Seed: 1921126318 INFO: Loaded 1 modules (16523 inline 8-bit counters): 16523 [0x888c68, 0x88ccf3), INFO: Loaded 1 PC tables (16523 PCs): 16523 [0x5a5bc0,0x5e6470), /out/sndfile_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc src/nms_adpcm.c:707:23: runtime error: index 46 out of bounds for type 'un...
cpp
40fdc3121ba2804a2b1b081cb06f335f855ebe6b
https://github.com/erikd/libsndfile/commit/b1d642078f1278f8a1be20ff1f9206415fd34100
The SF_INFO structure in sndfile allows excessively large values for `samplerate` and `channels`, which can lead to incorrect behavior and possible integer overflows. The API documentation does not clearly specify the valid ranges for these fields.
arvo:25626
n132/arvo:25626-vul
/src/libucl
[ { "end_line": 1956, "function_name": "ucl_inherit_handler", "start_line": 1908, "target_file": "/src/libucl/src/ucl_util.c" } ]
Heap-buffer-overflow READ 7
libucl
asan
INFO: Seed: 1248148395 INFO: Loaded 1 modules (3063 inline 8-bit counters): 3063 [0x804a30, 0x805627), INFO: Loaded 1 PC tables (3063 PCs): 3063 [0x5b1398,0x5bd308), /out/ucl_add_string_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==650...
cpp
3a94514709b7d0d3420f96549172059bfaac2b65
https://github.com/vstakhov/libucl/commit/54a5b5943b49060d4ca7b345bc80f9b0cb2cdc94
null
arvo:25678
n132/arvo:25678-vul
/src/php-src
[ { "end_line": 39335, "function_name": "ZEND_FASTCALL ZEND_YIELD_FROM_SPEC_CV_HANDLER", "start_line": 39233, "target_file": "/src/php-src/Zend/zend_vm_execute.h" } ]
Use-of-uninitialized-value
php-src
msan
INFO: Seed: 736964335 INFO: Loaded 1 modules (117602 inline 8-bit counters): 117602 [0x1c54cb0, 0x1c71812), INFO: Loaded 1 PC tables (117602 PCs): 117602 [0x1c71818,0x1e3ce38), /out/php-fuzz-execute: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==138521==WARNING: MemorySanitizer: use-of-uninitialized-value ...
cpp
7a95e943d642e05532979a06221c476183eac7e4
https://github.com/php/php-src/commit/6d538e83aa1e98694402eea5433e38d387f8729a
null
arvo:25815
n132/arvo:25815-vul
/src/hermes
[ { "end_line": 513, "function_name": "consumeTerm", "start_line": 402, "target_file": "/src/hermes/lib/Regex/RegexParser.cpp" } ]
Stack-buffer-overflow READ 2
hermes
asan
INFO: Seed: 207111632 INFO: Loaded 1 modules (119624 inline 8-bit counters): 119624 [0x38347c8, 0x3851b10), INFO: Loaded 1 PC tables (119624 PCs): 119624 [0x3851b10,0x3a24f90), /out/fuzzer-jsi-entry: Running 1 inputs 1 time(s) each. Running: /tmp/poc =================================================================...
cpp
da2bf989f2c1e1c2dc52870a47732564b38b4f74
https://github.com/facebook/hermes/commit/c593863a881796f8bf4f4faea1fa179edf5d532f
A vulnerability exists in the handling of word boundary assertions where the code does not check if the cursor is at the end of the string before dereferencing it, potentially leading to invalid memory access when parsing word boundary assertions.
arvo:25885
n132/arvo:25885-vul
/src/opensc
[ { "end_line": 388, "function_name": "hextoint", "start_line": 374, "target_file": "/src/opensc/src/libopensc/pkcs15-itacns.c" } ]
Heap-buffer-overflow READ 7
opensc
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader ================================================================= ==58701==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000616 at pc 0x0000004831ad bp 0x7ffeddc9a290 sp 0x7ffeddc99a48 READ of size 7 at...
c
6545cd26f4117326550b78c1be12f19c076dd18a
https://github.com/OpenSC/OpenSC/commit/595926471b034fe4b518af722b2e1fae4ed6c450
A vulnerability exists in itacns where the code reads behind the buffer bounds.
arvo:25893
n132/arvo:25893-vul
/src/oniguruma
[ { "end_line": 560, "function_name": "onigenc_unicode_get_case_fold_codes_by_str", "start_line": 276, "target_file": "/src/oniguruma/src/unicode.c" } ]
Stack-buffer-overflow WRITE 4
oniguruma
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzzer < INPUT_FILE or /out/fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/fuzzer [-N] afl-fuzz will r...
cpp
48a40c7238d989f25bbfa6339de71cf9189cb81b
https://github.com/kkos/oniguruma/commit/a4aaa67878509ea8296ef349bcfe98da48bc5457
null
arvo:25943
n132/arvo:25943-vul
/src/opensc
[ { "end_line": 485, "function_name": "sc_oberthur_parse_publicinfo", "start_line": 445, "target_file": "/src/opensc/src/libopensc/pkcs15-oberthur.c" } ]
Heap-buffer-overflow READ 1
opensc
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader ================================================================= ==58056==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x606000000119 at pc 0x0000009d2ad7 bp 0x7ffd9ea77610 sp 0x7ffd9ea77608 READ of size 1 at...
c
732ed77ad67e5303c46c0fa767929afd87076c87
https://github.com/OpenSC/OpenSC/commit/3ff059a74bcd10ead9a92cc67e5c8c006996e940
The length checking in the Oberthur profile is insufficient, potentially allowing improper handling of input lengths.
arvo:25976
n132/arvo:25976-vul
/src/sleuthkit
[ { "end_line": 1048, "function_name": "hfs_cat_traverse", "start_line": 737, "target_file": "/src/sleuthkit/tsk/fs/hfs.c" } ]
Heap-buffer-overflow READ 1
sleuthkit
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/sleuthkit_fls_hfs_fuzzer < INPUT_FILE or /out/sleuthkit_fls_hfs_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-fla...
cpp
5eabe4d554f09bf31f8a375735c096b1df4de0e8
https://github.com/sleuthkit/sleuthkit/commit/2701739f8ad80d14c36de1e3a7a35bd792fceabb
null
arvo:25998
n132/arvo:25998-vul
/src/opensc
[ { "end_line": 592, "function_name": "idprime_read_binary", "start_line": 525, "target_file": "/src/opensc/src/libopensc/card-idprime.c" } ]
Stack-buffer-overflow WRITE {*}
opensc
asan
INFO: Seed: 836579326 INFO: Loaded 1 modules (31956 inline 8-bit counters): 31956 [0xf69ac0, 0xf71794), INFO: Loaded 1 PC tables (31956 PCs): 31956 [0xbf5208,0xc71f48), /out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==581...
c
03396707f0a79dbfe9ba2ca2f9434b9f3ddeff55
https://github.com/OpenSC/OpenSC/commit/732ed77ad67e5303c46c0fa767929afd87076c87
null
arvo:26065
n132/arvo:26065-vul
/src/arrow
[ { "end_line": 488, "function_name": "SerializedPageReader::DecompressIfNeeded", "start_line": 460, "target_file": "/src/arrow/cpp/src/parquet/column_reader.cc" } ]
Heap-buffer-overflow READ {*}
arrow
asan
INFO: Seed: 2728104945 INFO: Loaded 1 modules (295298 inline 8-bit counters): 295298 [0x1e2aef8, 0x1e7307a), INFO: Loaded 1 PC tables (295298 PCs): 295298 [0x1e73080,0x22f48a0), /out/parquet-arrow-fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==============================================================...
cpp
424bcc6ae45d0c8679d42124abd745db8d432866
https://github.com/apache/arrow/commit/fa441346b69ed1064aac39409731740c228319c0
null
arvo:26103
n132/arvo:26103-vul
/src/opensc
[ { "end_line": 592, "function_name": "idprime_read_binary", "start_line": 525, "target_file": "/src/opensc/src/libopensc/card-idprime.c" } ]
Stack-buffer-overflow WRITE {*}
opensc
asan
INFO: Seed: 4261803615 INFO: Loaded 1 modules (31958 inline 8-bit counters): 31958 [0xf60b20, 0xf687f6), INFO: Loaded 1 PC tables (31958 PCs): 31958 [0xbeafa8,0xc67d08), /out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==58...
c
3ff059a74bcd10ead9a92cc67e5c8c006996e940
https://github.com/OpenSC/OpenSC/commit/0b40d3b999d1e9feddbd9ebd144cf7b11ab81020
The vulnerability in idprime is due to a missing check for the maximum buffer length.
arvo:26116
n132/arvo:26116-vul
/src/opensc
[ { "end_line": 551, "function_name": "sc_oberthur_parse_privateinfo", "start_line": 488, "target_file": "/src/opensc/src/libopensc/pkcs15-oberthur.c" } ]
Heap-buffer-overflow READ 1
opensc
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader ================================================================= ==58063==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x606000000239 at pc 0x0000009ca45e bp 0x7fff27c7b990 sp 0x7fff27c7b988 READ of size 1 at...
c
2f6ab4c1a2bfc3adf8295d086bd67a12f0d921db
https://github.com/OpenSC/OpenSC/commit/fca2ba9474e150e72282317b91ce68d0b801f573
null
arvo:26264
n132/arvo:26264-vul
/src/poppler
[ { "end_line": 108, "function_name": "getFileKeyLength", "start_line": 108, "target_file": "/src/poppler/poppler/SecurityHandler.h" } ]
Use-of-uninitialized-value
poppler
msan
INFO: Seed: 442750135 INFO: Loaded 1 modules (78650 inline 8-bit counters): 78650 [0x19bc660, 0x19cf99a), INFO: Loaded 1 PC tables (78650 PCs): 78650 [0x149fd30,0x15d30d0), /out/pdf_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==16602==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0xc114...
cpp
3d9dab78f7aacf3ad7e0946b3dc60101722df93e
https://anongit.freedesktop.org/git/poppler/poppler.gitc67bd3fafe0cff41855b4a2fdf7a3eb98a05ea3e
An uninitialized memory read occurs in the presence of broken files, potentially exposing sensitive data.
arvo:26593
n132/arvo:26593-vul
/src/fluent-bit
[ { "end_line": 491, "function_name": "flb_utils_time_to_seconds", "start_line": 468, "target_file": "/src/fluent-bit/src/flb_utils.c" } ]
Heap-buffer-overflow READ 1
fluent-bit
asan
INFO: Seed: 3990290039 INFO: Loaded 1 modules (2118 inline 8-bit counters): 2118 [0x7e8f00, 0x7e9746), INFO: Loaded 1 PC tables (2118 PCs): 2118 [0x7e9748,0x7f1ba8), /out/flb-it-fuzz-utils_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each. Running: /tmp/poc [2025/04/10 05:33:43] [ warn] [pack] invalid UTF-8 bytes fou...
c
979a9bb728b490659e7e6076c17f3e4cb2c5bd59
https://github.com/fluent/fluent-bit/commit/c2e33ae40af02fabe59b51637501a5be73583a15
A vulnerability exists in the utils module where the time to seconds conversion function does not properly handle the case of an empty string input.
arvo:26674
n132/arvo:26674-vul
/src/libass
[ { "end_line": 885, "function_name": "decode_font", "start_line": 844, "target_file": "/src/libass/libass/ass.c" } ]
Heap-buffer-overflow WRITE 1
libass
asan
Reading 32782 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/libass_fuzzer < INPUT_FILE or /out/libass_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-f...
cpp
d149636f502f5774ae1a8fb4c554b122674393b2
https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632
null
arvo:26712
n132/arvo:26712-vul
/src/libsndfile
[ { "end_line": 1340, "function_name": "exif_subchunk_parse", "start_line": 1270, "target_file": "/src/libsndfile/src/wavlike.c" } ]
Use-of-uninitialized-value
libsndfile
msan
INFO: Seed: 3631153812 INFO: Loaded 1 modules (10015 inline 8-bit counters): 10015 [0x96d31a, 0x96fa39), INFO: Loaded 1 PC tables (10015 PCs): 10015 [0x6eff70,0x717160), /out/sndfile_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==16437==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x5b2...
cpp
616d0ecc0ae8639c49c9d124157254392672b01a
https://github.com/libsndfile/libsndfile/commit/03667195a3333f1aedb6f2452e20bf4f6d2ef138
A use of uninitialized value occurs in the exif_subchunk_parse function.
arvo:26803
n132/arvo:26803-vul
/src/libsndfile
[ { "end_line": 200, "function_name": "wavlike_msadpcm_init", "start_line": 117, "target_file": "/src/libsndfile/src/ms_adpcm.c" } ]
Heap-buffer-overflow WRITE 2
libsndfile
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/sndfile_fuzzer < INPUT_FILE or /out/sndfile_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/sndfile_fuz...
cpp
a9815b3f228df00086e0a40bcc43162fc19896a1
https://github.com/libsndfile/libsndfile/commit/deb669ee8be55a94565f6f8a6b60890c2e7c6f32
A vulnerability exists in ms_adpcm where size checks use 'blockalign' (the size of a block) instead of 'samplesperblock', even though each block contains 7 samples per channel as part of the preamble. There is also a missing check to ensure that the block is large enough to hold the number of samples it claims to conta...
arvo:26860
n132/arvo:26860-vul
/src/opensc
[ { "end_line": 692, "function_name": "authentic_reduce_path", "start_line": 656, "target_file": "/src/opensc/src/libopensc/card-authentic.c" } ]
Index-out-of-bounds
opensc
ubsan
INFO: Seed: 970580546 INFO: Loaded 1 modules (29617 inline 8-bit counters): 29617 [0x9e3120, 0x9ea4d1), INFO: Loaded 1 PC tables (29617 PCs): 29617 [0x695d20,0x709830), /out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each. Running: /tmp/poc sc.c:456:61: runtime error: index 16 out of bounds for type 'u8 const[1...
c
445c651549eefff771fe96a8499fc5ecd0190549
https://github.com/OpenSC/OpenSC/commit/65461e4eb5aff766b3137022d3af61e2b66a6076
null
arvo:26900
n132/arvo:26900-vul
/src/opensc
[ { "end_line": 692, "function_name": "authentic_reduce_path", "start_line": 656, "target_file": "/src/opensc/src/libopensc/card-authentic.c" } ]
Stack-buffer-overflow READ {*}
opensc
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader ================================================================= ==58703==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f26ae45acf0 at pc 0x0000004966cf bp 0x7ffd78b087d0 sp 0x7ffd78b07f98 READ of size 126...
c
445c651549eefff771fe96a8499fc5ecd0190549
https://github.com/OpenSC/OpenSC/commit/65461e4eb5aff766b3137022d3af61e2b66a6076
null
arvo:26952
n132/arvo:26952-vul
/src/wireshark
[ { "end_line": 10737, "function_name": "dissect_rtps", "start_line": 10476, "target_file": "/src/wireshark/epan/dissectors/packet-rtps.c" } ]
Heap-double-free
wireshark
asan
oss-fuzzshark: disabling: udp oss-fuzzshark: disabling: udplite oss-fuzzshark: disabling: ospf oss-fuzzshark: disabling: bgp oss-fuzzshark: disabling: dhcp oss-fuzzshark: disabling: json oss-fuzzshark: disabling: snort oss-fuzzshark: configured for dissector: ip INFO: Seed: 1472833670 INFO: Loaded 1 modules (362801 i...
c
e1b3fb02627779f7e2c44386e65da57c320a5b40
https://github.com/wireshark/wireshark/commit/29f2177222f8a7c1a527dbf599cf47c7225f1783
A vulnerability exists in the rtps dissector where wmem_allocated memory is stored in pinfo->private_table, which is created with free functions (g_free) that are incompatible with wmem allocations. This can lead to memory management issues due to the collision between g_free and wmem allocations.
arvo:26967
n132/arvo:26967-vul
/src/leptonica
[ { "end_line": 92, "function_name": "LLVMFuzzerTestOneInput", "start_line": 3, "target_file": "/src/leptonica/prog/fuzzing/adaptmap_fuzzer.cc" } ]
Heap-use-after-free READ 4
leptonica
asan
INFO: Seed: 4176641470 INFO: Loaded 1 modules (117317 inline 8-bit counters): 117317 [0x15c1020, 0x15dda65), INFO: Loaded 1 PC tables (117317 PCs): 117317 [0x15dda68,0x17a7eb8), /out/adaptmap_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =================================================================...
cpp
8d7717457caf7960a8b6cbac762c69b5001039c2
https://github.com/DanBloomberg/leptonica/commit/f61f9234eac0cc6729ab15c7f395874c6a65abff
null
arvo:27025
n132/arvo:27025-vul
/src/fluent-bit
[ { "end_line": 796, "function_name": "flb_config_map_set", "start_line": 559, "target_file": "/src/fluent-bit/src/flb_config_map.c" } ]
Heap-double-free
fluent-bit
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 584142224 INFO: Loaded 1 modules (25106 inline 8-bit counters): 25106 [0xb69be0, 0xb6fdf2), INFO: Loaded 1 PC tables (25106 PCs): 25106 [0xb6fdf8,0xbd1f18), /out/flb-it-fuzz-config_map_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each. Running: /tmp/...
cpp
2f8374edb11d450c0f3941ada96ccf377f7bf635
https://github.com/fluent/fluent-bit/commit/d67f28b5b28253ff1d0732c79762bda2a12e207b
A vulnerability in config_map allows a double-free to occur due to missing memory allocation checks.
arvo:27368
n132/arvo:27368-vul
/src/fluent-bit
[ { "end_line": 163, "function_name": "flb_gzip_compress", "start_line": 68, "target_file": "/src/fluent-bit/src/flb_gzip.c" } ]
Heap-buffer-overflow WRITE 1
fluent-bit
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/flb-it-fuzz-utils_fuzzer_OSSFUZZ [2025/04/09 09:40:18] [ warn] [pack] invalid UTF-8 bytes found, skipping bytes [2025/04/09 09:40:18] [ warn] [pack] invalid UTF-8 bytes found, skipping bytes [2025/04/09 09:40:18] [ warn] [pack] invalid UTF-...
c
9a3bd47ec6121492e2c5e37ca14f5827bb7d6db2
https://github.com/fluent/fluent-bit/commit/df2af999105cd6c94ec8b533bcca498664b1aa16
null
arvo:27474
n132/arvo:27474-vul
/src/arrow
[ { "end_line": 208, "function_name": "ReifyDictionary", "start_line": 181, "target_file": "/src/arrow/cpp/src/arrow/ipc/dictionary.cc" } ]
Heap-buffer-overflow READ 8
arrow
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/arrow-ipc-stream-fuzz < INPUT_FILE or /out/arrow-ipc-stream-fuzz INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /o...
cpp
e599da2db6a22f34e94a2b44fc5f5288e89556e0
https://github.com/apache/arrow/commit/be13bf50fe00f0f4c2d065a61db189d6c59b1f7b
null
arvo:27475
n132/arvo:27475-vul
/src/arrow
[ { "end_line": 208, "function_name": "ReifyDictionary", "start_line": 181, "target_file": "/src/arrow/cpp/src/arrow/ipc/dictionary.cc" } ]
Global-buffer-overflow READ 4
arrow
asan
INFO: Seed: 2048481509 INFO: Loaded 1 modules (200813 inline 8-bit counters): 200813 [0x1670608, 0x16a1675), INFO: Loaded 1 PC tables (200813 PCs): 200813 [0x16a1678,0x19b1d48), /out/arrow-ipc-stream-fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===========================================================...
cpp
e599da2db6a22f34e94a2b44fc5f5288e89556e0
https://github.com/apache/arrow/commit/be13bf50fe00f0f4c2d065a61db189d6c59b1f7b
null
arvo:27480
n132/arvo:27480-vul
/src/opensc
[ { "end_line": 189, "function_name": "insert_key", "start_line": 94, "target_file": "/src/opensc/src/libopensc/pkcs15-tcos.c" } ]
Stack-buffer-overflow READ 1
opensc
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader ================================================================= ==58702==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fd72d9cb6c0 at pc 0x0000006e9d97 bp 0x7ffdd95aea90 sp 0x7ffdd95aea88 READ of size 1 a...
c
d3451faa2190e9f4c12bb00adf00149b7af1d18d
https://github.com/OpenSC/OpenSC/commit/b5b1afe401bb6a04783ca36b5253948d6cf5ee48
A vulnerability exists in tcos where reading behind the end of an allocated buffer can occur.
arvo:27651
n132/arvo:27651-vul
/src/ots
[ { "end_line": 224, "function_name": "OpenTypeSTAT::Parse", "start_line": 36, "target_file": "/src/ots/src/stat.cc" } ]
Use-of-uninitialized-value
ots
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1970601357 INFO: Loaded 1 modules (22435 inline 8-bit counters): 22435 [0xc71468, 0xc76c0b), INFO: Loaded 1 PC tables (22435 PCs): 22435 [0xc76c10,0xcce640), /out/ots-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ERROR at ../../src/ots...
cpp
e1d25c727058a8b256245c3a6427755fd2074c13
https://github.com/khaledhosny/ots/commit/56fa835f0eacc313323144aca4a61d8085fe7c20
A vulnerability exists in which upgrading the minor version in [STAT] causes an attempt to serialize elidedFallbackNameID without initialization, potentially leading to the addition of unintended data that the font does not have.
arvo:27691
n132/arvo:27691-vul
/src/leptonica
[ { "end_line": 29, "function_name": "LLVMFuzzerTestOneInput", "start_line": 3, "target_file": "/src/leptonica/prog/fuzzing/dewarp_fuzzer.cc" } ]
Use-of-uninitialized-value
leptonica
msan
INFO: Seed: 32072504 INFO: Loaded 1 modules (95264 inline 8-bit counters): 95264 [0x1917348, 0x192e768), INFO: Loaded 1 PC tables (95264 PCs): 95264 [0x192e768,0x1aa2968), /out/dewarp_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==76638==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x96...
cpp
4cb5129c2a9eea3e836bbcd2439ad6077f994dd0
https://github.com/DanBloomberg/leptonica/commit/989e05e68f3006d7c4356b0050f0faf64445f4bf
The dewarp_fuzzer triggers use of uninitialized value in the genPathname function due to improper argument checking in getFilenamesInDirectory() and requesting debug output during fuzzing.
arvo:27710
n132/arvo:27710-vul
/src/fluent-bit
[ { "end_line": 194, "function_name": "flb_signv4_uri_normalize_path", "start_line": 127, "target_file": "/src/fluent-bit/src/flb_signv4.c" } ]
Heap-buffer-overflow WRITE 1
fluent-bit
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/flb-it-fuzz-signv4_fuzzer_OSSFUZZ ================================================================= ==18350==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000295 at pc 0x00000051f327 bp 0x7fffb77398f0 sp 0x7fffb77398e8 WR...
c
0a23aab58cc704784d21c1e3ba4e46d9059cc8df
https://github.com/fluent/fluent-bit/commit/d118cebb93846c690b86187af890c11ff602d18c
A write heap-overflow exists in the signv4 component.
arvo:27739
n132/arvo:27739-vul
/src/arrow
[ { "end_line": 208, "function_name": "ReifyDictionary", "start_line": 181, "target_file": "/src/arrow/cpp/src/arrow/ipc/dictionary.cc" } ]
Global-buffer-overflow READ {*}
arrow
asan
Reading 647 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/arrow-ipc-stream-fuzz < INPUT_FILE or /out/arrow-ipc-stream-fuzz INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute...
cpp
e599da2db6a22f34e94a2b44fc5f5288e89556e0
https://github.com/apache/arrow/commit/be13bf50fe00f0f4c2d065a61db189d6c59b1f7b
null
arvo:27742
n132/arvo:27742-vul
/src/fluent-bit
[ { "end_line": 996, "function_name": "flb_pack_msgpack_to_json_format", "start_line": 779, "target_file": "/src/fluent-bit/src/flb_pack.c" } ]
Heap-use-after-free READ {*}
fluent-bit
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3375537278 INFO: Loaded 1 modules (5831 inline 8-bit counters): 5831 [0x8c2ba0, 0x8c4267), INFO: Loaded 1 PC tables (5831 PCs): 5831 [0x8c4268,0x8daed8), /out/flb-it-fuzz-flb_json_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each. Running: /tmp/poc =...
c
55b265a4a70a6b0a020f7cd59dfd0a02ed725747
https://github.com/fluent/fluent-bit/commit/172f393e20dad1a69e9a79c3d6f8d4c78f921b2f
null
arvo:27812
n132/arvo:27812-vul
/src/c-blosc2
[ { "end_line": 973, "function_name": "frame_get_usermeta", "start_line": 910, "target_file": "/src/c-blosc2/blosc/frame.c" } ]
Heap-buffer-overflow READ {*}
c-blosc2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1976025332 INFO: Loaded 1 modules (47212 inline 8-bit counters): 47212 [0xe37e20, 0xe4368c), INFO: Loaded 1 PC tables (47212 PCs): 47212 [0xb28e88,0xbe1548), /out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSa...
c
3055a05f0a229a11b5d8c65d42ab15ad17f3b714
https://github.com/Blosc/c-blosc2/commit/877959117eef391293b5abff200a23bafe458754
A heap-buffer-overflow occurs when reading the trailer from a frame with an invalid offset in the function frame_get_usermeta (c-blosc2/blosc/frame.c:932:5). This issue also affects blosc2_frame_to_schunk (c-blosc2/blosc/frame.c:1267:18), blosc2_schunk_open_sframe (c-blosc2/blosc/schunk.c:263:27), and is triggered duri...
arvo:27816
n132/arvo:27816-vul
/src/c-blosc2
[ { "end_line": 975, "function_name": "frame_get_usermeta", "start_line": 909, "target_file": "/src/c-blosc2/blosc/frame.c" } ]
UNKNOWN READ
c-blosc2
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1048742142 INFO: Loaded 1 modules (60413 inline 8-bit counters): 60413 [0xaac548, 0xabb145), INFO: Loaded 1 PC tables (60413 PCs): 60413 [0x7544e0,0x8404b0), /out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Undefined...
c
9cba9d298624ebd2794e3a7d375c8e41912f8d29
https://github.com/Blosc/c-blosc2/commit/d482b4279323f70cc645a7651ace41d19de6b327
A heap-buffer-overflow occurs in the code when reading the trailer from a frame with an invalid offset, leading to a security vulnerability.
arvo:27852
n132/arvo:27852-vul
/src/libjpeg-turbo
[ { "end_line": 801, "function_name": "decompress_smooth_data", "start_line": 426, "target_file": "/src/libjpeg-turbo/jdcoefct.c" } ]
Heap-buffer-overflow READ 2
libjpeg-turbo
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1073162240 INFO: Loaded 1 modules (10158 inline 8-bit counters): 10158 [0xa0c400, 0xa0ebae), INFO: Loaded 1 PC tables (10158 PCs): 10158 [0xa0ebb0,0xa36690), /out/libjpeg_turbo_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ============...
cpp
cfc7e6e58e9a187aba9312c28f8245052919212b
https://github.com/libjpeg-turbo/libjpeg-turbo/commit/ccaba5d7894ecfb5a8f11e48d3f86e1f14d5a469
null
arvo:27857
n132/arvo:27857-vul
/src/libjpeg-turbo
[ { "end_line": 801, "function_name": "decompress_smooth_data", "start_line": 426, "target_file": "/src/libjpeg-turbo/jdcoefct.c" } ]
Heap-buffer-overflow READ 2
libjpeg-turbo
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/dct_fuzzer Inconsistent progression sequence for component 0 coefficient 0 ================================================================= ==21969==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62e00000b020 at pc 0x00000064a1...
cpp
cfc7e6e58e9a187aba9312c28f8245052919212b
https://github.com/libjpeg-turbo/libjpeg-turbo/commit/ccaba5d7894ecfb5a8f11e48d3f86e1f14d5a469
null
arvo:27936
n132/arvo:27936-vul
/src/libjpeg-turbo
[ { "end_line": 420, "function_name": "smoothing_ok", "start_line": 359, "target_file": "/src/libjpeg-turbo/jdcoefct.c" } ]
Use-of-uninitialized-value
libjpeg-turbo
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2692622979 INFO: Loaded 1 modules (11562 inline 8-bit counters): 11562 [0xc4c958, 0xc4f682), INFO: Loaded 1 PC tables (11562 PCs): 11562 [0xc4f688,0xc7c928), /out/dct_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Corrupt JPEG data: 44 ...
cpp
ccaba5d7894ecfb5a8f11e48d3f86e1f14d5a469
https://github.com/libjpeg-turbo/libjpeg-turbo/commit/c7ca521bc85b57d41d3ad4963c13fc0100481084
An uninitialized read occurs in decompress_smooth_data() when cinfo->output_iMCU_row is greater than cinfo->master->last_good_iMCU_row and cinfo->input_scan_number equals 1, causing the function to read from prev_coef_bits_latch[], which is uninitialized.
arvo:28064
n132/arvo:28064-vul
/src/libjpeg-turbo
[ { "end_line": 189, "function_name": "start_pass_phuff_decoder", "start_line": 80, "target_file": "/src/libjpeg-turbo/jdphuff.c" } ]
Use-of-uninitialized-value
libjpeg-turbo
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 27347279 INFO: Loaded 1 modules (36123 inline 8-bit counters): 36123 [0x10f47a0, 0x10fd4bb), INFO: Loaded 1 PC tables (36123 PCs): 36123 [0x10fd4c0,0x118a670), /out/qpdf_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc WARNING: fuzz input...
cpp
7b68764905173ecb149b518943c32a27fd345d68
https://github.com/libjpeg-turbo/libjpeg-turbo/commit/110d8d6dcafaed517e8f77a6253169535ee3a20e
A vulnerability exists in decompress_smooth_data() where, for malformed progressive JPEG images containing an interleaved Y/Cb/Cr DC scan followed by two non-interleaved Y DC scans, the prev_coef_bits[] array is initialized only for the Y component and not for Cb and Cr. The uninitialized values for Cb and Cr are trans...
arvo:28109
n132/arvo:28109-vul
/src/serenity
[ { "end_line": 1401, "function_name": "Parser::parse_glob", "start_line": 1351, "target_file": "/src/serenity/Shell/Parser.cpp" } ]
Bad-cast
serenity
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2054178681 INFO: Loaded 1 modules (46638 inline 8-bit counters): 46638 [0xbcff98, 0xbdb5c6), INFO: Loaded 1 PC tables (46638 PCs): 46638 [0xbdb5c8,0xc918a8), /out/FuzzShell: Running 1 inputs 1 time(s) each. Running: /tmp/poc /src/serenity/Shell/Par...
cpp
c1c5225b7207d3be0a63ef1abfd62fc3b04acb2b
https://github.com/SerenityOS/serenity/commit/9d9347cd5aec545ad5c0f48cc637ca3e13970808
A bad cast to BarewordLiteral occurs in the Shell, which can lead to a security vulnerability.
arvo:28133
n132/arvo:28133-vul
/src/serenity
[ { "end_line": 905, "function_name": "process_IHDR", "start_line": 831, "target_file": "/src/serenity/Libraries/LibGfx/PNGLoader.cpp" } ]
Heap-buffer-overflow READ 1
serenity
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/FuzzPNGLoader < INPUT_FILE or /out/FuzzPNGLoader INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/FuzzPNGLoader...
cpp
5f182746b6d7989127495dce45d21885bf2ea9c0
https://github.com/SerenityOS/serenity/commit/068615fe5e25ff763d84262c615ab4c1f178a708
null
arvo:28151
n132/arvo:28151-vul
/src/serenity
[ { "end_line": 1154, "function_name": "uncompress_bmp_rle_data", "start_line": 925, "target_file": "/src/serenity/Libraries/LibGfx/BMPLoader.cpp" } ]
Heap-buffer-overflow READ 1
serenity
asan
Reading 230 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/FuzzBMPLoader < INPUT_FILE or /out/FuzzBMPLoader INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuz...
cpp
d66b0683ebff04337a89f3d0f384184d3d228607
https://github.com/SerenityOS/serenity/commit/461bdeda2b54e478cc77f13c96991949a286af30
A heap-overflow vulnerability exists in LibGfx's BMP RLE handling due to a misunderstanding of the field previously named 'data_size'.
arvo:28167
n132/arvo:28167-vul
/src/serenity
[ { "end_line": 905, "function_name": "process_IHDR", "start_line": 831, "target_file": "/src/serenity/Libraries/LibGfx/PNGLoader.cpp" } ]
Heap-buffer-overflow READ 1
serenity
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 215841342 INFO: Loaded 1 modules (18412 inline 8-bit counters): 18412 [0xa8a988, 0xa8f174), INFO: Loaded 1 PC tables (18412 PCs): 18412 [0xa8f178,0xad7038), /out/FuzzPNGLoader: Running 1 inputs 1 time(s) each. Running: /tmp/poc ====================...
cpp
5f182746b6d7989127495dce45d21885bf2ea9c0
https://github.com/SerenityOS/serenity/commit/068615fe5e25ff763d84262c615ab4c1f178a708
null
arvo:28191
n132/arvo:28191-vul
/src/wireshark
[ { "end_line": 8335, "function_name": "ieee1905_fragment_hash", "start_line": 8314, "target_file": "/src/wireshark/epan/dissectors/packet-ieee1905.c" } ]
Heap-buffer-overflow READ 6
wireshark
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzzshark_ip < INPUT_FILE or /out/fuzzshark_ip INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/fuzzshark_ip [-...
cpp
022b230dcf82d22870629ea32e641a92c331b478
https://github.com/wireshark/wireshark/commit/ca46d11c08a4792354a88956ad100282961bc586
The ieee1905 reassembly code assumes that address sizes are always 6 bytes, leading to a failing read when processing addresses of different sizes. The code uses a local buffer based on this assumption instead of dynamically allocating memory according to the actual address size from the structures.
arvo:28239
n132/arvo:28239-vul
/src/serenity
[ { "end_line": 402, "function_name": "decode_frame", "start_line": 286, "target_file": "/src/serenity/Libraries/LibGfx/GIFLoader.cpp" } ]
Global-buffer-overflow READ 4
serenity
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/FuzzGIFLoader < INPUT_FILE or /out/FuzzGIFLoader INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/FuzzGIFLoader...
cpp
69d7a34bc2ae1c014c702f9a5b662b30bfcab34f
https://github.com/SerenityOS/serenity/commit/531c3fe72eb18615dba89bfe673b8a8336abfb89
A vulnerability in LibGfx's GIF deinterlacing allows out-of-bounds access in the interlacing row stride/offset arrays. This occurs when the pass index is about to overflow, potentially leading to invalid memory access during GIF decoding.
arvo:28256
n132/arvo:28256-vul
/src/fluent-bit
[ { "end_line": 1248, "function_name": "flb_http_do", "start_line": 1100, "target_file": "/src/fluent-bit/src/flb_http_client.c" } ]
Heap-buffer-overflow WRITE 1
fluent-bit
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 522039440 INFO: Loaded 1 modules (31011 inline 8-bit counters): 31011 [0xd188a0, 0xd201c3), INFO: Loaded 1 PC tables (31011 PCs): 31011 [0xd201c8,0xd993f8), /out/flb-it-fuzz-http_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each. Running: /tmp/poc [2...
c
5ed55cd0afebcd3077defa2d915669fbb0024ad0
https://github.com/fluent/fluent-bit/commit/16f4084f36c78d1c121a78aafb7dc1db5fe699e9
null
arvo:28260
n132/arvo:28260-vul
/src/fluent-bit
[ { "end_line": 113, "function_name": "LLVMFuzzerTestOneInput", "start_line": 17, "target_file": "/src/fluent-bit/tests/internal/fuzzers/engine_fuzzer.c" } ]
Bad-cast
fluent-bit
ubsan
[2025/04/10 05:44:12] [ info] [engine] started (pid=19671) [2025/04/10 05:44:12] [debug] [engine] coroutine stack size: 24576 bytes (24.0K) [2025/04/10 05:44:12] [debug] [storage] [cio stream] new stream registered: lib.0 [2025/04/10 05:44:12] [ info] [storage] version=1.1.1, initializing... [2025/04/10 05:44:12] [ inf...
c
10198a223ce5bea0bb6022451c731b1efe75234a
https://github.com/fluent/fluent-bit/commit/7803d59d9d64ffcfd205a3ad5679eeb86c3138ce
null
arvo:28265
n132/arvo:28265-vul
/src/fluent-bit
[ { "end_line": 374, "function_name": "process_chunked_data", "start_line": 258, "target_file": "/src/fluent-bit/src/flb_http_client.c" } ]
Heap-buffer-overflow READ 1
fluent-bit
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3465893403 INFO: Loaded 1 modules (31042 inline 8-bit counters): 31042 [0xd199a0, 0xd212e2), INFO: Loaded 1 PC tables (31042 PCs): 31042 [0xd212e8,0xd9a708), /out/flb-it-fuzz-http_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each. Running: /tmp/poc [...
c
598745d7f7330c45df80a0bad7a8bae8d9e5cc32
https://github.com/fluent/fluent-bit/commit/cfee54301badc5fd61422eb85ff4c1028ad6cbc7
The http_client lacks a check on the variable val, which leads to an overflow.
arvo:28312
n132/arvo:28312-vul
/src/readstat
[ { "end_line": 997, "function_name": "sas7bdat_parse_page_pass2", "start_line": 898, "target_file": "/src/readstat/src/sas/readstat_sas7bdat_read.c" } ]
Heap-buffer-overflow READ 4
readstat
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_format_sas7bdat < INPUT_FILE or /out/fuzz_format_sas7bdat INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out...
cpp
694f7d5211d31c854df83dbfc77e173d3ac644cb
https://github.com/WizardMac/ReadStat/commit/62a3f76020c96129edff3369614b704d8f6f9fa3
null
arvo:28315
n132/arvo:28315-vul
/src/openthread
[ { "end_line": 202, "function_name": "ChannelMaskBaseTlv::IsValid", "start_line": 184, "target_file": "/src/openthread/src/core/meshcop/meshcop_tlvs.cpp" } ]
Stack-buffer-overflow READ 1
openthread
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 218056225 INFO: Loaded 1 modules (18862 inline 8-bit counters): 18862 [0x9c8830, 0x9cd1de), INFO: Loaded 1 PC tables (18862 PCs): 18862 [0x6ed058,0x736b38), /out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==================...
cpp
3d21a846d92d6df4ae3559a184462537fa1413bd
https://github.com/openthread/openthread/commit/02f7dbb42be7f75355436ec43bc82d0b2b4caad6
A security vulnerability exists in the ChannelMaskBaseTlv::IsValid() function in meshcop-tlvs, where the function does not properly validate input, potentially allowing invalid channel mask values to be accepted.
arvo:28383
n132/arvo:28383-vul
/src/opensc
[ { "end_line": 282, "function_name": "insert_pin", "start_line": 191, "target_file": "/src/opensc/src/libopensc/pkcs15-tcos.c" } ]
Stack-use-after-return READ 1
opensc
asan
INFO: Seed: 1188956587 INFO: Loaded 1 modules (31995 inline 8-bit counters): 31995 [0xf5fbc0, 0xf678bb), INFO: Loaded 1 PC tables (31995 PCs): 31995 [0xbea748,0xc676f8), /out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==58...
c
69544553c36f0613f6283e0eeb3f9eb549825986
https://github.com/OpenSC/OpenSC/commit/5df913b7f57ad89b9832555d24c08d23a534311e
A vulnerability exists in tcos where the insert_pin() function does not properly check bounds, potentially leading to out-of-bounds access.
arvo:28458
n132/arvo:28458-vul
/src/glib
[ { "end_line": 1382, "function_name": "g_date_set_parse", "start_line": 1226, "target_file": "/src/glib/glib/gdate.c" } ]
Heap-buffer-overflow READ 1
glib
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_date_parse ================================================================= ==7522==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000076 at pc 0x00000050a64c bp 0x7ffddac62ec0 sp 0x7ffddac62eb8 READ of size 1 at 0x6...
c
ba621181221f8b2f8f07743df2c02a7a7638f995
https://gitlab.gnome.org/GNOME/glibb4c2e4d553099a85f75edf8fe9c64028e7302766
The gdate component does not validate input as UTF-8 before parsing, allowing non-UTF-8 data to be processed. Dates are expected to be valid UTF-8.
arvo:28459
n132/arvo:28459-vul
/src/selinux
[ { "end_line": 3972, "function_name": "__cil_resolve_ast_last_child_helper", "start_line": 3926, "target_file": "/src/selinux/libsepol/cil/src/cil_resolve_ast.c" } ]
Heap-use-after-free READ 4
selinux
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1988764585 INFO: Loaded 1 modules (14459 inline 8-bit counters): 14459 [0x954770, 0x957feb), INFO: Loaded 1 PC tables (14459 PCs): 14459 [0x957ff0,0x9907a0), /out/secilc-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Failed to resolve c...
c
038817036f36aadf762c8a3061500903b22b8213
https://github.com/SELinuxProject/selinux/commit/0451adebdf153eee1f69914141311114a0130982
null
arvo:28462
n132/arvo:28462-vul
/src/selinux
[ { "end_line": 2375, "function_name": "cil_print_recursive_blockinherit", "start_line": 2339, "target_file": "/src/selinux/libsepol/cil/src/cil_resolve_ast.c" } ]
Heap-buffer-overflow READ 8
selinux
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 49621934 INFO: Loaded 1 modules (14421 inline 8-bit counters): 14421 [0x9535f0, 0x956e45), INFO: Loaded 1 PC tables (14421 PCs): 14421 [0x956e48,0x98f398), /out/secilc-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Recursive blockinheri...
c
a25d9104efa86f4980299fdd1b2dbba23c08ffb2
https://github.com/SELinuxProject/selinux/commit/228c06d97a8a33b60b89ded17acbd0e92cca9cfe
A heap buffer overflow (out-of-bound read) occurs in cil_print_recursive_blockinherit in libsepol/cil when the CIL compiler encounters a recursive blockinherit with an optional block. This happens because cil_print_recursive_blockinherit() assumes that all nodes are either CIL_BLOCK or CIL_BLOCKINHERIT, leading to inco...
arvo:28470
n132/arvo:28470-vul
/src/selinux
[ { "end_line": 3972, "function_name": "__cil_resolve_ast_last_child_helper", "start_line": 3926, "target_file": "/src/selinux/libsepol/cil/src/cil_resolve_ast.c" } ]
Heap-use-after-free READ 8
selinux
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 620554634 INFO: Loaded 1 modules (14459 inline 8-bit counters): 14459 [0x954770, 0x957feb), INFO: Loaded 1 PC tables (14459 PCs): 14459 [0x957ff0,0x9907a0), /out/secilc-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ====================...
c
038817036f36aadf762c8a3061500903b22b8213
https://github.com/SELinuxProject/selinux/commit/0451adebdf153eee1f69914141311114a0130982
null
arvo:28478
n132/arvo:28478-vul
/src/selinux
[ { "end_line": 3972, "function_name": "__cil_resolve_ast_last_child_helper", "start_line": 3926, "target_file": "/src/selinux/libsepol/cil/src/cil_resolve_ast.c" } ]
Heap-use-after-free READ 4
selinux
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3515742723 INFO: Loaded 1 modules (14459 inline 8-bit counters): 14459 [0x954770, 0x957feb), INFO: Loaded 1 PC tables (14459 PCs): 14459 [0x957ff0,0x9907a0), /out/secilc-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Failed to resolve s...
c
038817036f36aadf762c8a3061500903b22b8213
https://github.com/SELinuxProject/selinux/commit/0451adebdf153eee1f69914141311114a0130982
null
arvo:28484
n132/arvo:28484-vul
/src/selinux
[ { "end_line": 206, "function_name": "cil_post_fc_fill_data", "start_line": 166, "target_file": "/src/selinux/libsepol/cil/src/cil_post.c" } ]
Heap-buffer-overflow READ 1
selinux
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4182301702 INFO: Loaded 1 modules (14852 inline 8-bit counters): 14852 [0x95c350, 0x95fd54), INFO: Loaded 1 PC tables (14852 PCs): 14852 [0x95fd58,0x999d98), /out/secilc-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===================...
c
d1a34d3f1df5e90c9e01fcd9791c26db89064a7e
https://github.com/SELinuxProject/selinux/commit/e13c8162656665f9ec1c76a033cae5b011b8c658
An out-of-bound read occurs in the CIL compiler (libsepol/cil) when processing a file context pattern ending with a backslash ("\") in the cil_post_fc_fill_data() function. When the function encounters a backslash at the end of the string, it reads beyond the NUL terminator, leading to a heap-buffer-overflow. This issu...
arvo:28512
n132/arvo:28512-vul
/src/selinux
[ { "end_line": 3972, "function_name": "__cil_resolve_ast_last_child_helper", "start_line": 3926, "target_file": "/src/selinux/libsepol/cil/src/cil_resolve_ast.c" } ]
Use-of-uninitialized-value
selinux
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3694116846 INFO: Loaded 1 modules (14459 inline 8-bit counters): 14459 [0x9b71e8, 0x9baa63), INFO: Loaded 1 PC tables (14459 PCs): 14459 [0x9baa68,0x9f3218), /out/secilc-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Failed to find sens...
c
038817036f36aadf762c8a3061500903b22b8213
https://github.com/SELinuxProject/selinux/commit/0451adebdf153eee1f69914141311114a0130982
null
arvo:28587
n132/arvo:28587-vul
/src/ots
[ { "end_line": 144, "function_name": "OpenTypeGLYF::ParseSimpleGlyph", "start_line": 83, "target_file": "/src/ots/src/glyf.cc" } ]
Use-of-uninitialized-value
ots
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 706487251 INFO: Loaded 1 modules (22594 inline 8-bit counters): 22594 [0xc7be28, 0xc8166a), INFO: Loaded 1 PC tables (22594 PCs): 22594 [0xc81670,0xcd9a90), /out/ots-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ERROR at ../../src/ots/...
cpp
b703837f4dda38239d584cb0161a7447888e905d
https://github.com/khaledhosny/ots/commit/1141c81c411b599e40496679129d0884715e8650
The glyf table code accesses maxp version 1 fields without proper guards, leading to uninitialized field access due to the current design where these fields are not initialized for other maxp versions. This can result in undefined behavior when handling fonts with mismatched maxp and glyf/CFF tables.
arvo:28682
n132/arvo:28682-vul
/src/openthread
[ { "end_line": 182, "function_name": "Dataset::IsValid", "start_line": 169, "target_file": "/src/openthread/src/core/meshcop/dataset.cpp" } ]
Stack-buffer-overflow READ 1
openthread
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 724618904 INFO: Loaded 1 modules (20859 inline 8-bit counters): 20859 [0xa1bc10, 0xa20d8b), INFO: Loaded 1 PC tables (20859 PCs): 20859 [0x727f98,0x779748), /out/cli-uart-received-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =========...
cpp
14cab3a7f04373d1f5b20fa9282d467c4bc03266
https://github.com/openthread/openthread/commit/b3fc7bc453034aa61cd27d5208f08ead9c7789e0
null
arvo:28787
n132/arvo:28787-vul
/src/mdbtools
[ { "end_line": 43, "function_name": "mdb_map_find_next0", "start_line": 21, "target_file": "/src/mdbtools/src/libmdb/map.c" } ]
Heap-buffer-overflow READ 4
mdbtools
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 447617848 INFO: Loaded 1 modules (1678 inline 8-bit counters): 1678 [0x7f2380, 0x7f2a0e), INFO: Loaded 1 PC tables (1678 PCs): 1678 [0x5a0eb0,0x5a7790), /out/fuzz_mdb: Running 1 inputs 1 time(s) each. Running: /tmp/poc =============================...
c
78bbf4250ecc510c46274300b6f7fed73140147b
https://github.com/mdbtools/mdbtools/commit/50c9bdfee62ea54e33da6ae54ad9395e3042d581
null
arvo:28810
n132/arvo:28810-vul
/src/aac
[ { "end_line": 350, "function_name": "DecodeNonPCWs", "start_line": 130, "target_file": "/src/aac/libAACdec/src/aacdec_hcrs.cpp" } ]
Global-buffer-overflow READ 4
aac
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/aacDecoder_DecodeFrame < INPUT_FILE or /out/aacDecoder_DecodeFrame INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] ...
cpp
150febcc65fd7864846cbb03f511fafbaa276f86
https://android.googlesource.com/platform/external/aac//+/a7c64ff42f1c67960acb9686555ecbc683e3762c%5E%21/
An unsigned integer overflow occurs in the Hcr_State_BODY_SIGN_ESC__ESC_WORD() function.
arvo:28832
n132/arvo:28832-vul
/src/mdbtools
[ { "end_line": 75, "function_name": "decompressed_to_utf8_with_iconv", "start_line": 52, "target_file": "/src/mdbtools/src/libmdb/iconv.c" } ]
UNKNOWN READ
mdbtools
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2497116577 INFO: Loaded 1 modules (3284 inline 8-bit counters): 3284 [0x75ed08, 0x75f9dc), INFO: Loaded 1 PC tables (3284 PCs): 3284 [0x50b880,0x5185c0), /out/fuzz_mdb: Running 1 inputs 1 time(s) each. Running: /tmp/poc offset 3792651327488 is beyo...
c
0e3a627ee6b3828b8dde3a0c105bf73454c45959
https://github.com/mdbtools/mdbtools/commit/89e23615828ea64af9858e5942d6bc4d82c458a6
null
arvo:29002
n132/arvo:29002-vul
/src/selinux
[ { "end_line": 3972, "function_name": "__cil_resolve_ast_last_child_helper", "start_line": 3926, "target_file": "/src/selinux/libsepol/cil/src/cil_resolve_ast.c" } ]
Heap-use-after-free READ 8
selinux
asan
Reading 2927 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/secilc-fuzzer < INPUT_FILE or /out/secilc-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fu...
cpp
038817036f36aadf762c8a3061500903b22b8213
https://github.com/SELinuxProject/selinux/commit/0451adebdf153eee1f69914141311114a0130982
null
arvo:29164
n132/arvo:29164-vul
/src/libraw
[ { "end_line": 1147, "function_name": "LibRaw::identify", "start_line": 179, "target_file": "/src/libraw/src/metadata/identify.cpp" } ]
Use-of-uninitialized-value
libraw
msan
INFO: Seed: 3796165162 INFO: Loaded 1 modules (18059 inline 8-bit counters): 18059 [0xba1c30, 0xba62bb), INFO: Loaded 1 PC tables (18059 PCs): 18059 [0x8b9168,0x8ffa18), /out/libraw_cr2_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc unknown file: data corrupted at 524826 ==54053==WARNING: MemorySanitize...
cpp
371161a06d7f98f231a001dad4af2dfb463e270a
https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e
null
arvo:29170
n132/arvo:29170-vul
/src/serenity
[ { "end_line": 368, "function_name": "Font::load_from_offset", "start_line": 242, "target_file": "/src/serenity/Libraries/LibTTF/Font.cpp" } ]
UNKNOWN READ
serenity
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1449020934 INFO: Loaded 1 modules (30107 inline 8-bit counters): 30107 [0xa36888, 0xa3de23), INFO: Loaded 1 PC tables (30107 PCs): 30107 [0xa3de28,0xab37d8), /out/FuzzTTF: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSanitize...
cpp
688d249b2dad91b3b795a91604a56c8da93b3482
https://github.com/SerenityOS/serenity/commit/5e95d62ffef98eec2164157174d182d8d8b538a4
An unsigned overflow occurs in TTF table parsing within LibTTF due to insufficient guarding, potentially leading to incorrect memory access or other security issues.
arvo:29217
n132/arvo:29217-vul
/src/poppler
[ { "end_line": 1587, "function_name": "FoFiTrueType::parse", "start_line": 1467, "target_file": "/src/poppler/fofi/FoFiTrueType.cc" } ]
Use-of-uninitialized-value
poppler
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1077455553 INFO: Loaded 1 modules (364985 inline 8-bit counters): 364985 [0x4787c00, 0x47e0db9), INFO: Loaded 1 PC tables (364985 PCs): 364985 [0x47e0dc0,0x4d72950), /out/qt_pdf_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==30330==WA...
cpp
e4346ae34b24ce84a4aeae539f26cab49497450c
https://gitlab.freedesktop.org/poppler/poppler.git3ac779d9a9d2c63433d3765c82a2724947d86a15
A vulnerability exists in FoFiTrueType::parse where parsing does not succeed if tables are missing.
arvo:29243
n132/arvo:29243-vul
/src/binutils-gdb
[ { "end_line": 1454, "function_name": "_bfd_vms_slurp_egsd", "start_line": 1175, "target_file": "/src/binutils-gdb/bfd/vms-alpha.c" } ]
Heap-buffer-overflow READ 1
binutils-gdb
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_bfd < INPUT_FILE or /out/fuzz_bfd INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/fuzz_bfd [-N] afl-fuzz ...
cpp
18b9872261b950a8d10a4ae6ccb8f2acdaebc3e6
https://github.com/bminor/binutils-gdb/commit/de6a7ee4bd18b7812ee5ff9abb62e2889daa501b
A heap buffer overflow exists in the _bfd_vms_slurp_egsd function in vms-alpha.c, where flags are read before performing a size check.
arvo:29266
n132/arvo:29266-vul
/src/serenity
[ { "end_line": 181, "function_name": "Heap::gather_conservative_roots", "start_line": 127, "target_file": "/src/serenity/Libraries/LibJS/Heap/Heap.cpp" } ]
Stack-buffer-overflow READ 8
serenity
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/FuzzJs < INPUT_FILE or /out/FuzzJs INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/FuzzJs [-N] afl-fuzz will r...
cpp
fdd974b7ef4fb3f38c266f0f16d9b68f84f40bca
https://github.com/SerenityOS/serenity/commit/51b880b0383089822f513330cd64f93b54b9f21c
A security vulnerability exists in LibJS where AddressSanitizer (ASAN) interferes with the conservative garbage collector's stack scan, causing the JS fuzzer to crash during garbage collection and preventing further bug discovery.
arvo:29328
n132/arvo:29328-vul
/src/mdbtools
[ { "end_line": 155, "function_name": "mdb_crack_row3", "start_line": 124, "target_file": "/src/mdbtools/src/libmdb/write.c" } ]
UNKNOWN READ
mdbtools
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_mdb < INPUT_FILE or /out/fuzz_mdb INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/fuzz_mdb [-N] afl-fuzz ...
cpp
9e883cb100bc68f9c469f1d88fe06a2f7fc85597
https://github.com/mdbtools/mdbtools/commit/9b5e5919052c5dff80a3f7301ae520b71571814a
null
arvo:29408
n132/arvo:29408-vul
/src/igraph
[ { "end_line": 509, "function_name": "igraph_read_graph_gml", "start_line": 182, "target_file": "/src/igraph/src/io/gml.c" } ]
Heap-use-after-free READ 8
igraph
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/read_gml_fuzzer ================================================================= ==6494==ERROR: AddressSanitizer: heap-use-after-free on address 0x608000000068 at pc 0x0000004fb310 bp 0x7ffeda6a11c0 sp 0x7ffeda6a11b8 READ of size 8 at 0x60...
c
4ea42140de9bfee13e00845f8e3a8078c1aced29
https://github.com/igraph/igraph/commit/47eec2c3a87e0c129766046ad15b074eb60a1213
A double-free problem exists in the igraph_read_graph_gml function.
arvo:29610
n132/arvo:29610-vul
/src/lua
[ { "end_line": 213, "function_name": "lua_closeslot", "start_line": 202, "target_file": "/src/lua/lapi.c" } ]
Heap-use-after-free WRITE 1
lua
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4065600021 INFO: Loaded 1 modules (6200 inline 8-bit counters): 6200 [0x8808e0, 0x882118), INFO: Loaded 1 PC tables (6200 PCs): 6200 [0x61a0e8,0x632468), /out/fuzz_lua: Running 1 inputs 1 time(s) each. Running: /tmp/poc ============================...
c
e500892e18e994781760819e33098322728796e8
https://github.com/lua/lua/commit/2bfa13e520e53210b96ead88f49a9ca20c5a5d18
null
arvo:29633
n132/arvo:29633-vul
/src/fio
[ { "end_line": 971, "function_name": "__handle_option", "start_line": 540, "target_file": "/src/fio/parse.c" } ]
Stack-buffer-overflow WRITE {*}
fio
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_parseini < INPUT_FILE or /out/fuzz_parseini INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/fuzz_parseini...
cpp
e4d9a7bf68d0ffb9fd7ab328a4f0edddc89297be
https://github.com/axboe/fio/commit/465767437da1bcf99a375295799d33948d9fc5f0
A buffer overrun occurs in the handling of the filename option due to exceeding the size of a MAX_PATH buffer. This vulnerability is triggered when a filename longer than MAX_PATH is provided, leading to a stack-buffer-overflow in the add_file function in filesetup.c at line 1656, which is called from str_filename_cb i...
arvo:29816
n132/arvo:29816-vul
/src/c-blosc2
[ { "end_line": 476, "function_name": "get_header_info", "start_line": 383, "target_file": "/src/c-blosc2/blosc/frame.c" } ]
Heap-buffer-overflow READ 4
c-blosc2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3814365336 INFO: Loaded 1 modules (47987 inline 8-bit counters): 47987 [0xe455a0, 0xe51113), INFO: Loaded 1 PC tables (47987 PCs): 47987 [0xb32848,0xbedf78), /out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =========...
cpp
fdfeb753f3c14b20e33611da4a0a39d3b57a57ab
https://github.com/Blosc/c-blosc2/commit/98bb9e682481b934f65db1bbd73bc2c3a41f2931
null
arvo:29819
n132/arvo:29819-vul
/src/leptonica
[ { "end_line": 48, "function_name": "LLVMFuzzerTestOneInput", "start_line": 3, "target_file": "/src/leptonica/prog/fuzzing/morph_fuzzer.cc" } ]
Heap-buffer-overflow READ 4
leptonica
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/morph_fuzzer < INPUT_FILE or /out/morph_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/morph_fuzzer [-...
cpp
0665ff28f9e9df91565ee09438a30d47232ad2eb
https://github.com/DanBloomberg/leptonica/commit/a0b59604bcf24b13af168fa45d54bbedab1d3d5d
null
arvo:29821
n132/arvo:29821-vul
/src/c-blosc2
[ { "end_line": 476, "function_name": "get_header_info", "start_line": 383, "target_file": "/src/c-blosc2/blosc/frame.c" } ]
UNKNOWN READ
c-blosc2
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3892859783 INFO: Loaded 1 modules (60609 inline 8-bit counters): 60609 [0xaae9d8, 0xabd699), INFO: Loaded 1 PC tables (60609 PCs): 60609 [0x753d78,0x840988), /out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Undefined...
c
fdfeb753f3c14b20e33611da4a0a39d3b57a57ab
https://github.com/Blosc/c-blosc2/commit/98bb9e682481b934f65db1bbd73bc2c3a41f2931
null
arvo:29822
n132/arvo:29822-vul
/src/c-blosc2
[ { "end_line": 52, "function_name": "LLVMFuzzerTestOneInput", "start_line": 11, "target_file": "/src/c-blosc2/tests/fuzz/fuzz_decompress_frame.c" } ]
UNKNOWN READ
c-blosc2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3701903030 INFO: Loaded 1 modules (44785 inline 8-bit counters): 44785 [0x87da400, 0x87e52f1), INFO: Loaded 1 PC tables (44785 PCs): 44785 [0x873537c,0x878cb04), /out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Addre...
c
aebf2b9858368681e497f136501ab33cc1014aed
https://github.com/Blosc/c-blosc2/commit/4f7cfdbde36917b3b6291492240fc9b128ace1d7
null
arvo:29855
n132/arvo:29855-vul
/src/htslib
[ { "end_line": 1740, "function_name": "cram_uncompress_block", "start_line": 1565, "target_file": "/src/htslib/cram/cram_io.c" } ]
Heap-buffer-overflow READ 1
htslib
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/hts_open_fuzzer < INPUT_FILE or /out/hts_open_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/hts_open_...
cpp
a01a139ac1fa365a688ec8734d62ef859a8bc416
https://github.com/samtools/htslib/commit/90fef7300c75ca6b8834da0dcb710e27d599324e
null
arvo:29908
n132/arvo:29908-vul
/src/htslib
[ { "end_line": 1740, "function_name": "cram_uncompress_block", "start_line": 1565, "target_file": "/src/htslib/cram/cram_io.c" } ]
Heap-buffer-overflow READ 1
htslib
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 674920177 INFO: Loaded 1 modules (21854 inline 8-bit counters): 21854 [0xa4a2d0, 0xa4f82e), INFO: Loaded 1 PC tables (21854 PCs): 21854 [0x77e2e0,0x7d38c0), /out/hts_open_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==================...
c
a01a139ac1fa365a688ec8734d62ef859a8bc416
https://github.com/samtools/htslib/commit/90fef7300c75ca6b8834da0dcb710e27d599324e
null
arvo:29947
n132/arvo:29947-vul
/src/c-blosc2
[ { "end_line": 1302, "function_name": "frame_get_metalayers", "start_line": 1253, "target_file": "/src/c-blosc2/blosc/frame.c" } ]
UNKNOWN READ
c-blosc2
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2622841311 INFO: Loaded 1 modules (65357 inline 8-bit counters): 65357 [0xaf2068, 0xb01fb5), INFO: Loaded 1 PC tables (65357 PCs): 65357 [0x7814e8,0x8809b8), /out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Undefined...
cpp
c91ed64cc5403478c2ebce420f84dd3a2a0540dd
https://github.com/Blosc/c-blosc2/commit/1a42fcd4473577cb8558b5609672a02388dabd39
null
arvo:29973
n132/arvo:29973-vul
/src/c-blosc2
[ { "end_line": 1302, "function_name": "frame_get_metalayers", "start_line": 1253, "target_file": "/src/c-blosc2/blosc/frame.c" } ]
Memcpy-param-overlap
c-blosc2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3192712035 INFO: Loaded 1 modules (52624 inline 8-bit counters): 52624 [0xec6a20, 0xed37b0), INFO: Loaded 1 PC tables (52624 PCs): 52624 [0xba10d0,0xc6e9d0), /out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =========...
c
c91ed64cc5403478c2ebce420f84dd3a2a0540dd
https://github.com/Blosc/c-blosc2/commit/1a42fcd4473577cb8558b5609672a02388dabd39
null