task_id stringlengths 8 10 | docker_image stringlengths 17 19 | basedir stringclasses 157
values | target_functions listlengths 1 3 | crash_type stringclasses 85
values | project_name stringclasses 157
values | sanitizer stringclasses 3
values | sanitizer_output stringlengths 1.13k 6.5M | language stringclasses 2
values | vuln_commit stringlengths 40 40 | fix stringlengths 69 110 | vulnerability_description stringlengths 38 824 ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
arvo:24895 | n132/arvo:24895-vul | /src/sleuthkit | [
{
"end_line": 4412,
"function_name": "hfs_load_extended_attrs",
"start_line": 3834,
"target_file": "/src/sleuthkit/tsk/fs/hfs.c"
}
] | Heap-buffer-overflow READ 1 | sleuthkit | asan | INFO: Seed: 4278835617
INFO: Loaded 1 modules (18725 inline 8-bit counters): 18725 [0xaec3b8, 0xaf0cdd),
INFO: Loaded 1 PC tables (18725 PCs): 18725 [0x7e4d88,0x82dfd8),
/out/sleuthkit_fls_hfs_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================================================================... | cpp | dc51bb6bb73ea7c57703e897115ae20dcf1e4ade | https://github.com/sleuthkit/sleuthkit/commit/d4fe8a8130b77b3601fbd167a7a4884d097aa97d | null |
arvo:24901 | n132/arvo:24901-vul | /src/sleuthkit | [
{
"end_line": 766,
"function_name": "ntfs_make_data_run",
"start_line": 570,
"target_file": "/src/sleuthkit/tsk/fs/ntfs.c"
}
] | Heap-buffer-overflow READ 1 | sleuthkit | asan | INFO: Seed: 3401947893
INFO: Loaded 1 modules (18619 inline 8-bit counters): 18619 [0xaea078, 0xaee933),
INFO: Loaded 1 PC tables (18619 PCs): 18619 [0x7e2668,0x82b218),
/out/sleuthkit_fls_ntfs_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===============================================================... | cpp | b5bdca074daa9edb20e954c5055ef766f88330fd | https://github.com/sleuthkit/sleuthkit/commit/243274a82cc506507bc59083d63a0d3b7ced611e | null |
arvo:24902 | n132/arvo:24902-vul | /src/sleuthkit | [
{
"end_line": 1048,
"function_name": "hfs_cat_traverse",
"start_line": 737,
"target_file": "/src/sleuthkit/tsk/fs/hfs.c"
}
] | Heap-buffer-overflow READ 1 | sleuthkit | asan | INFO: Seed: 1388391306
INFO: Loaded 1 modules (18721 inline 8-bit counters): 18721 [0xaec2f8, 0xaf0c19),
INFO: Loaded 1 PC tables (18721 PCs): 18721 [0x7e4a88,0x82dc98),
/out/sleuthkit_fls_hfs_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================================================================... | cpp | 5eabe4d554f09bf31f8a375735c096b1df4de0e8 | https://github.com/sleuthkit/sleuthkit/commit/2701739f8ad80d14c36de1e3a7a35bd792fceabb | null |
arvo:24940 | n132/arvo:24940-vul | /src/opensc | [
{
"end_line": 216,
"function_name": "asepcos_parse_sec_attr",
"start_line": 165,
"target_file": "/src/opensc/src/libopensc/card-asepcos.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader
=================================================================
==58335==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000597 at pc 0x00000060be6c bp 0x7fff66f86480 sp 0x7fff66f86478
READ of size 1 at... | c | 94d67bed81a24dc8e6058c8f679df27d7e8a9fb5 | https://github.com/OpenSC/OpenSC/commit/238b783a0e267201ef8d0d79dc5fd21423f3316d | null |
arvo:24993 | n132/arvo:24993-vul | /src/libheif | [
{
"end_line": 702,
"function_name": "Op_RGB_to_YCbCr<Pixel>::convert_colorspace",
"start_line": 572,
"target_file": "/src/libheif/libheif/heif_colorconversion.cc"
}
] | Heap-buffer-overflow READ {*} | libheif | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/file-fuzzer < INPUT_FILE
or
/out/file-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/file-fuzzer [-N]
... | cpp | ab9c1a5b1dadd9e2ffca621fb5b9cd3c87a5e4ca | https://github.com/strukturag/libheif/commit/5f80153e95109741dd1779b12ff13554dee6affc | A crash occurs when copying a non-HDR alpha plane. |
arvo:25014 | n132/arvo:25014-vul | /src/libxml2 | [
{
"end_line": 1994,
"function_name": "xmlXIncludeLoadFallback",
"start_line": 1959,
"target_file": "/src/libxml2/xinclude.c"
}
] | Heap-use-after-free READ 8 | libxml2 | asan | INFO: Seed: 2435581768
INFO: Loaded 1 modules (46011 inline 8-bit counters): 46011 [0xc1eb00, 0xc29ebb),
INFO: Loaded 1 PC tables (46011 PCs): 46011 [0x8bc910,0x9704c0),
/out/xml: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==15692==ERROR: Add... | c | d63cfeca3577dfa2e658b33c56889dbab7de8ff5 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/19cae17f5a2acfbd5554d145bb87cd6bf2de244f | The xi:fallback processing in the code does not properly fix up namespaces when fallback children are not copied, which can lead to use-after-free errors. |
arvo:25110 | n132/arvo:25110-vul | /src/libxml2 | [
{
"end_line": 2279,
"function_name": "xmlXIncludeIncludeNode",
"start_line": 2188,
"target_file": "/src/libxml2/xinclude.c"
}
] | Use-of-uninitialized-value | libxml2 | msan | INFO: Seed: 2838955145
INFO: Loaded 1 modules (46053 inline 8-bit counters): 46053 [0xdcac00, 0xdd5fe5),
INFO: Loaded 1 PC tables (46053 PCs): 46053 [0xaa3e90,0xb57ce0),
/out/xml: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==15588==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x78b110 in xmlX... | c | 87d20b554c6a90e7ece1cc7391c005089bf85b78 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/3fcf319378f9396a9ca840cd63b96a441818e1f1 | null |
arvo:25118 | n132/arvo:25118-vul | /src/c-blosc2 | [
{
"end_line": 2198,
"function_name": "blosc2_decompress",
"start_line": 2158,
"target_file": "/src/c-blosc2/blosc/blosc2.c"
}
] | Heap-buffer-overflow READ 1 | c-blosc2 | asan | INFO: Seed: 118431039
INFO: Loaded 1 modules (46464 inline 8-bit counters): 46464 [0xde78c0, 0xdf2e40),
INFO: Loaded 1 PC tables (46464 PCs): 46464 [0xade848,0xb94048),
/out/decompress_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==3202... | c | c203bdd674779c25ee0342721e41e5b722ff346c | https://github.com/Blosc/c-blosc2/commit/d80b5acaf23ec4c2453a348b35096b99601fcde5 | null |
arvo:25121 | n132/arvo:25121-vul | /src/leptonica | [
{
"end_line": 105,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 3,
"target_file": "/src/leptonica/prog/fuzzing/pix4_fuzzer.cc"
}
] | Use-of-uninitialized-value | leptonica | msan | INFO: Seed: 369085514
INFO: Loaded 1 modules (112079 inline 8-bit counters): 112079 [0x1a4a008, 0x1a655d7),
INFO: Loaded 1 PC tables (112079 PCs): 112079 [0x1a655d8,0x1c1b2c8),
/out/pix4_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==74118==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0... | cpp | f6c563c1fc808da52b83fb1e92e09ea4772aa1b8 | https://github.com/DanBloomberg/leptonica/commit/700cb86fd59a2cfe32a0657f95adbc8ffbf2138d | The function pixGetCmapHistogramInRect in pix4_fuzzer uses an uninitialized value when provided with a garbage pix input, leading to a security vulnerability. |
arvo:25136 | n132/arvo:25136-vul | /src/libzmq | [
{
"end_line": 66,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 43,
"target_file": "/src/libzmq/tests/test_socket_options_fuzzer.cpp"
}
] | Heap-buffer-overflow WRITE 1 | libzmq | asan | INFO: Seed: 2391544920
INFO: Loaded 1 modules (18199 inline 8-bit counters): 18199 [0x8564c74, 0x856938b),
INFO: Loaded 1 PC tables (18199 PCs): 18199 [0x856938c,0x858cc44),
/out/test_socket_options_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==========================================================... | cpp | 2fb04c101823bbecc31ce2f9d253eeafbba1b92f | https://github.com/zeromq/libzmq/commit/5b0956c38198652c3ab41d325e93cd89a076635f | null |
arvo:25210 | n132/arvo:25210-vul | /src/libxml2 | [
{
"end_line": 1671,
"function_name": "xmlTextReaderRead",
"start_line": 1351,
"target_file": "/src/libxml2/xmlreader.c"
}
] | Heap-use-after-free READ 4 | libxml2 | asan | INFO: Seed: 4018252960
INFO: Loaded 1 modules (47093 inline 8-bit counters): 47093 [0xc3f440, 0xc4ac35),
INFO: Loaded 1 PC tables (47093 PCs): 47093 [0x8d2cf0,0x98ac40),
/out/xml: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==10008==ERROR: Add... | c | 6f1470a5d6e3e369fe93f52d5760ba7c947f0cd1 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/ba589adc2f86c6be9ad7e0d771d4c9b09d059b89 | A double free occurs in xmlTextReaderRead when processing an XInclude with an empty fallback in the XML reader. |
arvo:25221 | n132/arvo:25221-vul | /src/poppler | [
{
"end_line": 711,
"function_name": "getChars",
"start_line": 693,
"target_file": "/src/poppler/poppler/Stream.h"
}
] | Negative-size-param | poppler | asan | INFO: Seed: 2549092301
INFO: Loaded 1 modules (78788 inline 8-bit counters): 78788 [0x14b76f8, 0x14caabc),
INFO: Loaded 1 PC tables (78788 PCs): 78788 [0xf48408,0x107c048),
/out/pdf_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==16600==... | cpp | c09f01b1be772b39b3d160ebdd6d09eac06e375d | https://anongit.freedesktop.org/git/poppler/poppler.git55eb5c73e5fb609ba56dee28f74e53b2be28fbb7 | A vulnerability exists in BaseMemStream::getChars where the function does not properly handle cases when the read position is past the end, potentially leading to unintended behavior. |
arvo:25321 | n132/arvo:25321-vul | /src/php-src | [
{
"end_line": 713,
"function_name": "zend_generator_get_next_delegated_value",
"start_line": 632,
"target_file": "/src/php-src/Zend/zend_generators.c"
}
] | UNKNOWN READ | php-src | asan | INFO: Seed: 3529873851
INFO: Loaded 1 modules (117029 inline 8-bit counters): 117029 [0x94c7520, 0x94e3e45),
INFO: Loaded 1 PC tables (117029 PCs): 117029 [0x94e3e48,0x95c8770),
/out/php-fuzz-execute: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEADLYSIGNAL
==================================... | cpp | c98e1747a8cd7d02bfaf76391ebef5d0b4d60c53 | https://github.com/php/php-src/commit/ddc2a2d381843e086fc36388981d0b8ba1ea789d | null |
arvo:25364 | n132/arvo:25364-vul | /src/libsndfile | [
{
"end_line": 1164,
"function_name": "psf_binheader_readf",
"start_line": 973,
"target_file": "/src/libsndfile/src/common.c"
}
] | Use-of-uninitialized-value | libsndfile | msan | INFO: Seed: 434224286
INFO: Loaded 1 modules (10107 inline 8-bit counters): 10107 [0x96f3ba, 0x971b35),
INFO: Loaded 1 PC tables (10107 PCs): 10107 [0x6f1940,0x7190f0),
/out/sndfile_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==16873==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x5f76... | cpp | 7e2db6e8ef160ef3aa9f2df4e5205cd3e9cc270e | https://github.com/erikd/libsndfile/commit/739bc8cdac8d56c2c5f097a50cbf20fa941ff59d | An uninitialized variable exists in the function psf_binheader_readf(). |
arvo:25366 | n132/arvo:25366-vul | /src/libsndfile | [
{
"end_line": 644,
"function_name": "host_read_d2f",
"start_line": 620,
"target_file": "/src/libsndfile/src/double64.c"
}
] | Use-of-uninitialized-value | libsndfile | msan | INFO: Seed: 3592946974
INFO: Loaded 1 modules (10052 inline 8-bit counters): 10052 [0x96d31a, 0x96fa5e),
INFO: Loaded 1 PC tables (10052 PCs): 10052 [0x6efe30,0x717270),
/out/sndfile_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==16462==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x613... | cpp | 2221cbedd7abc311882e101078049e94b2968082 | https://github.com/erikd/libsndfile/commit/288764df0959a91741a47a124b39c6365af1b005 | A use of uninitialized value occurs in the function endswap_int64_t_array. |
arvo:25402 | n132/arvo:25402-vul | /src/muparser | [
{
"end_line": 1502,
"function_name": "ParserBase::CreateRPN",
"start_line": 1246,
"target_file": "/src/muparser/src/muParserBase.cpp"
}
] | Heap-buffer-overflow READ 8 | muparser | asan | INFO: Seed: 2884514742
INFO: Loaded 1 modules (5994 inline 8-bit counters): 5994 [0x8eb5c8, 0x8ecd32),
INFO: Loaded 1 PC tables (5994 PCs): 5994 [0x668a58,0x6800f8),
/out/set_eval_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==482==ERRO... | cpp | 9e28c713f1413eb3cbc2949043108a3bba47f9a1 | https://github.com/beltoforion/muparser/commit/322716256d60e316c9a3b905a387be36d4e47368 | null |
arvo:25446 | n132/arvo:25446-vul | /src/ndpi | [
{
"end_line": 425,
"function_name": "ndpi_search_kerberos",
"start_line": 43,
"target_file": "/src/ndpi/src/lib/protocols/kerberos.c"
}
] | Stack-buffer-overflow READ 1 | ndpi | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_process_packet < INPUT_FILE
or
/out/fuzz_process_packet INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/f... | cpp | 1c0e617d802d214b0186f2752b50b8ee2a9e17a6 | https://github.com/ntop/nDPI/commit/37abe0daea8c964dbd2e09058074bfc7ae053199 | null |
arvo:25526 | n132/arvo:25526-vul | /src/php-src | [
{
"end_line": 12066,
"function_name": "ZEND_JMP_NULL_SPEC_TMPVARCV_HANDLER",
"start_line": 12033,
"target_file": "/src/php-src/Zend/zend_vm_execute.h"
}
] | Heap-use-after-free READ 4 | php-src | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/php-fuzz-execute
=================================================================
==138649==ERROR: AddressSanitizer: heap-use-after-free on address 0x612000013fc0 at pc 0x000000b5623a bp 0x7ffe26e92970 sp 0x7ffe26e92968
READ of size 4 at 0... | cpp | a009d370e93fdc5928b2de9321d433ca39e7c6e6 | https://github.com/php/php-src/commit/3c53732332c4b9d3904eec0d1c42f0d4d4bf65c6 | The JMP_NULL instruction in exception handling does not initialize the result variable in the exceptional case, leading to use of an undefined variable. |
arvo:25530 | n132/arvo:25530-vul | /src/libsndfile | [
{
"end_line": 257,
"function_name": "ima_reader_init",
"start_line": 177,
"target_file": "/src/libsndfile/src/ima_adpcm.c"
}
] | Heap-buffer-overflow WRITE 2 | libsndfile | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/sndfile_fuzzer < INPUT_FILE
or
/out/sndfile_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/sndfile_fuz... | cpp | 2db6a8fd2e1e7d9d1ad309d4f4110712f7cb4e5d | https://github.com/erikd/libsndfile/commit/3970faeb7fc8cee60cc5260ab4102433c37d5d63 | The vulnerability occurs in wavlike_ima_decode_block(), where the loop that processes IMA ADPCM data assumes there are always 8 nibbles per channel. If there is not enough space allocated to store the decoded nibbles, this can lead to a crash. The issue is related to insufficient buffer allocation when handling the dec... |
arvo:25533 | n132/arvo:25533-vul | /src/htslib | [
{
"end_line": 1295,
"function_name": "bcf_dec_typed_int1_safe",
"start_line": 1265,
"target_file": "/src/htslib/vcf.c"
}
] | Heap-buffer-overflow READ 4 | htslib | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/hts_open_fuzzer < INPUT_FILE
or
/out/hts_open_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/hts_open_... | cpp | 34ba6c726925efceaa2cc995d7d4b0409907f331 | https://github.com/samtools/htslib/commit/8bab82bdb8c2613e1ca7bd5573d7c12117a2dc02 | null |
arvo:25545 | n132/arvo:25545-vul | /src/ndpi | [
{
"end_line": 6870,
"function_name": "ndpi_check_dga_name",
"start_line": 6666,
"target_file": "/src/ndpi/src/lib/ndpi_main.c"
}
] | Use-of-uninitialized-value | ndpi | msan | INFO: Seed: 3316029529
INFO: Loaded 1 modules (13066 inline 8-bit counters): 13066 [0x98bfb0, 0x98f2ba),
INFO: Loaded 1 PC tables (13066 PCs): 13066 [0x98f2c0,0x9c2360),
/out/fuzz_process_packet: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialized bytes in StrstrCheck at offset 127 inside [0x7ffe76bbca... | c | ea4240055d5301b52d9fa934b8d14c126375eb17 | https://github.com/ntop/nDPI/commit/1c0e617d802d214b0186f2752b50b8ee2a9e17a6 | null |
arvo:25561 | n132/arvo:25561-vul | /src/libsndfile | [
{
"end_line": 2897,
"function_name": "validate_sfinfo",
"start_line": 2882,
"target_file": "/src/libsndfile/src/sndfile.c"
}
] | Index-out-of-bounds | libsndfile | ubsan | INFO: Seed: 1921126318
INFO: Loaded 1 modules (16523 inline 8-bit counters): 16523 [0x888c68, 0x88ccf3),
INFO: Loaded 1 PC tables (16523 PCs): 16523 [0x5a5bc0,0x5e6470),
/out/sndfile_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
src/nms_adpcm.c:707:23: runtime error: index 46 out of bounds for type 'un... | cpp | 40fdc3121ba2804a2b1b081cb06f335f855ebe6b | https://github.com/erikd/libsndfile/commit/b1d642078f1278f8a1be20ff1f9206415fd34100 | The SF_INFO structure in sndfile allows excessively large values for `samplerate` and `channels`, which can lead to incorrect behavior and possible integer overflows. The API documentation does not clearly specify the valid ranges for these fields. |
arvo:25626 | n132/arvo:25626-vul | /src/libucl | [
{
"end_line": 1956,
"function_name": "ucl_inherit_handler",
"start_line": 1908,
"target_file": "/src/libucl/src/ucl_util.c"
}
] | Heap-buffer-overflow READ 7 | libucl | asan | INFO: Seed: 1248148395
INFO: Loaded 1 modules (3063 inline 8-bit counters): 3063 [0x804a30, 0x805627),
INFO: Loaded 1 PC tables (3063 PCs): 3063 [0x5b1398,0x5bd308),
/out/ucl_add_string_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==650... | cpp | 3a94514709b7d0d3420f96549172059bfaac2b65 | https://github.com/vstakhov/libucl/commit/54a5b5943b49060d4ca7b345bc80f9b0cb2cdc94 | null |
arvo:25678 | n132/arvo:25678-vul | /src/php-src | [
{
"end_line": 39335,
"function_name": "ZEND_FASTCALL ZEND_YIELD_FROM_SPEC_CV_HANDLER",
"start_line": 39233,
"target_file": "/src/php-src/Zend/zend_vm_execute.h"
}
] | Use-of-uninitialized-value | php-src | msan | INFO: Seed: 736964335
INFO: Loaded 1 modules (117602 inline 8-bit counters): 117602 [0x1c54cb0, 0x1c71812),
INFO: Loaded 1 PC tables (117602 PCs): 117602 [0x1c71818,0x1e3ce38),
/out/php-fuzz-execute: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==138521==WARNING: MemorySanitizer: use-of-uninitialized-value
... | cpp | 7a95e943d642e05532979a06221c476183eac7e4 | https://github.com/php/php-src/commit/6d538e83aa1e98694402eea5433e38d387f8729a | null |
arvo:25815 | n132/arvo:25815-vul | /src/hermes | [
{
"end_line": 513,
"function_name": "consumeTerm",
"start_line": 402,
"target_file": "/src/hermes/lib/Regex/RegexParser.cpp"
}
] | Stack-buffer-overflow READ 2 | hermes | asan | INFO: Seed: 207111632
INFO: Loaded 1 modules (119624 inline 8-bit counters): 119624 [0x38347c8, 0x3851b10),
INFO: Loaded 1 PC tables (119624 PCs): 119624 [0x3851b10,0x3a24f90),
/out/fuzzer-jsi-entry: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================... | cpp | da2bf989f2c1e1c2dc52870a47732564b38b4f74 | https://github.com/facebook/hermes/commit/c593863a881796f8bf4f4faea1fa179edf5d532f | A vulnerability exists in the handling of word boundary assertions where the code does not check if the cursor is at the end of the string before dereferencing it, potentially leading to invalid memory access when parsing word boundary assertions. |
arvo:25885 | n132/arvo:25885-vul | /src/opensc | [
{
"end_line": 388,
"function_name": "hextoint",
"start_line": 374,
"target_file": "/src/opensc/src/libopensc/pkcs15-itacns.c"
}
] | Heap-buffer-overflow READ 7 | opensc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader
=================================================================
==58701==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000616 at pc 0x0000004831ad bp 0x7ffeddc9a290 sp 0x7ffeddc99a48
READ of size 7 at... | c | 6545cd26f4117326550b78c1be12f19c076dd18a | https://github.com/OpenSC/OpenSC/commit/595926471b034fe4b518af722b2e1fae4ed6c450 | A vulnerability exists in itacns where the code reads behind the buffer bounds. |
arvo:25893 | n132/arvo:25893-vul | /src/oniguruma | [
{
"end_line": 560,
"function_name": "onigenc_unicode_get_case_fold_codes_by_str",
"start_line": 276,
"target_file": "/src/oniguruma/src/unicode.c"
}
] | Stack-buffer-overflow WRITE 4 | oniguruma | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzzer < INPUT_FILE
or
/out/fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/fuzzer [-N]
afl-fuzz will r... | cpp | 48a40c7238d989f25bbfa6339de71cf9189cb81b | https://github.com/kkos/oniguruma/commit/a4aaa67878509ea8296ef349bcfe98da48bc5457 | null |
arvo:25943 | n132/arvo:25943-vul | /src/opensc | [
{
"end_line": 485,
"function_name": "sc_oberthur_parse_publicinfo",
"start_line": 445,
"target_file": "/src/opensc/src/libopensc/pkcs15-oberthur.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader
=================================================================
==58056==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x606000000119 at pc 0x0000009d2ad7 bp 0x7ffd9ea77610 sp 0x7ffd9ea77608
READ of size 1 at... | c | 732ed77ad67e5303c46c0fa767929afd87076c87 | https://github.com/OpenSC/OpenSC/commit/3ff059a74bcd10ead9a92cc67e5c8c006996e940 | The length checking in the Oberthur profile is insufficient, potentially allowing improper handling of input lengths. |
arvo:25976 | n132/arvo:25976-vul | /src/sleuthkit | [
{
"end_line": 1048,
"function_name": "hfs_cat_traverse",
"start_line": 737,
"target_file": "/src/sleuthkit/tsk/fs/hfs.c"
}
] | Heap-buffer-overflow READ 1 | sleuthkit | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/sleuthkit_fls_hfs_fuzzer < INPUT_FILE
or
/out/sleuthkit_fls_hfs_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-fla... | cpp | 5eabe4d554f09bf31f8a375735c096b1df4de0e8 | https://github.com/sleuthkit/sleuthkit/commit/2701739f8ad80d14c36de1e3a7a35bd792fceabb | null |
arvo:25998 | n132/arvo:25998-vul | /src/opensc | [
{
"end_line": 592,
"function_name": "idprime_read_binary",
"start_line": 525,
"target_file": "/src/opensc/src/libopensc/card-idprime.c"
}
] | Stack-buffer-overflow WRITE {*} | opensc | asan | INFO: Seed: 836579326
INFO: Loaded 1 modules (31956 inline 8-bit counters): 31956 [0xf69ac0, 0xf71794),
INFO: Loaded 1 PC tables (31956 PCs): 31956 [0xbf5208,0xc71f48),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==581... | c | 03396707f0a79dbfe9ba2ca2f9434b9f3ddeff55 | https://github.com/OpenSC/OpenSC/commit/732ed77ad67e5303c46c0fa767929afd87076c87 | null |
arvo:26065 | n132/arvo:26065-vul | /src/arrow | [
{
"end_line": 488,
"function_name": "SerializedPageReader::DecompressIfNeeded",
"start_line": 460,
"target_file": "/src/arrow/cpp/src/parquet/column_reader.cc"
}
] | Heap-buffer-overflow READ {*} | arrow | asan | INFO: Seed: 2728104945
INFO: Loaded 1 modules (295298 inline 8-bit counters): 295298 [0x1e2aef8, 0x1e7307a),
INFO: Loaded 1 PC tables (295298 PCs): 295298 [0x1e73080,0x22f48a0),
/out/parquet-arrow-fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==============================================================... | cpp | 424bcc6ae45d0c8679d42124abd745db8d432866 | https://github.com/apache/arrow/commit/fa441346b69ed1064aac39409731740c228319c0 | null |
arvo:26103 | n132/arvo:26103-vul | /src/opensc | [
{
"end_line": 592,
"function_name": "idprime_read_binary",
"start_line": 525,
"target_file": "/src/opensc/src/libopensc/card-idprime.c"
}
] | Stack-buffer-overflow WRITE {*} | opensc | asan | INFO: Seed: 4261803615
INFO: Loaded 1 modules (31958 inline 8-bit counters): 31958 [0xf60b20, 0xf687f6),
INFO: Loaded 1 PC tables (31958 PCs): 31958 [0xbeafa8,0xc67d08),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==58... | c | 3ff059a74bcd10ead9a92cc67e5c8c006996e940 | https://github.com/OpenSC/OpenSC/commit/0b40d3b999d1e9feddbd9ebd144cf7b11ab81020 | The vulnerability in idprime is due to a missing check for the maximum buffer length. |
arvo:26116 | n132/arvo:26116-vul | /src/opensc | [
{
"end_line": 551,
"function_name": "sc_oberthur_parse_privateinfo",
"start_line": 488,
"target_file": "/src/opensc/src/libopensc/pkcs15-oberthur.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader
=================================================================
==58063==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x606000000239 at pc 0x0000009ca45e bp 0x7fff27c7b990 sp 0x7fff27c7b988
READ of size 1 at... | c | 2f6ab4c1a2bfc3adf8295d086bd67a12f0d921db | https://github.com/OpenSC/OpenSC/commit/fca2ba9474e150e72282317b91ce68d0b801f573 | null |
arvo:26264 | n132/arvo:26264-vul | /src/poppler | [
{
"end_line": 108,
"function_name": "getFileKeyLength",
"start_line": 108,
"target_file": "/src/poppler/poppler/SecurityHandler.h"
}
] | Use-of-uninitialized-value | poppler | msan | INFO: Seed: 442750135
INFO: Loaded 1 modules (78650 inline 8-bit counters): 78650 [0x19bc660, 0x19cf99a),
INFO: Loaded 1 PC tables (78650 PCs): 78650 [0x149fd30,0x15d30d0),
/out/pdf_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==16602==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0xc114... | cpp | 3d9dab78f7aacf3ad7e0946b3dc60101722df93e | https://anongit.freedesktop.org/git/poppler/poppler.gitc67bd3fafe0cff41855b4a2fdf7a3eb98a05ea3e | An uninitialized memory read occurs in the presence of broken files, potentially exposing sensitive data. |
arvo:26593 | n132/arvo:26593-vul | /src/fluent-bit | [
{
"end_line": 491,
"function_name": "flb_utils_time_to_seconds",
"start_line": 468,
"target_file": "/src/fluent-bit/src/flb_utils.c"
}
] | Heap-buffer-overflow READ 1 | fluent-bit | asan | INFO: Seed: 3990290039
INFO: Loaded 1 modules (2118 inline 8-bit counters): 2118 [0x7e8f00, 0x7e9746),
INFO: Loaded 1 PC tables (2118 PCs): 2118 [0x7e9748,0x7f1ba8),
/out/flb-it-fuzz-utils_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
[2025/04/10 05:33:43] [ warn] [pack] invalid UTF-8 bytes fou... | c | 979a9bb728b490659e7e6076c17f3e4cb2c5bd59 | https://github.com/fluent/fluent-bit/commit/c2e33ae40af02fabe59b51637501a5be73583a15 | A vulnerability exists in the utils module where the time to seconds conversion function does not properly handle the case of an empty string input. |
arvo:26674 | n132/arvo:26674-vul | /src/libass | [
{
"end_line": 885,
"function_name": "decode_font",
"start_line": 844,
"target_file": "/src/libass/libass/ass.c"
}
] | Heap-buffer-overflow WRITE 1 | libass | asan | Reading 32782 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/libass_fuzzer < INPUT_FILE
or
/out/libass_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-f... | cpp | d149636f502f5774ae1a8fb4c554b122674393b2 | https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632 | null |
arvo:26712 | n132/arvo:26712-vul | /src/libsndfile | [
{
"end_line": 1340,
"function_name": "exif_subchunk_parse",
"start_line": 1270,
"target_file": "/src/libsndfile/src/wavlike.c"
}
] | Use-of-uninitialized-value | libsndfile | msan | INFO: Seed: 3631153812
INFO: Loaded 1 modules (10015 inline 8-bit counters): 10015 [0x96d31a, 0x96fa39),
INFO: Loaded 1 PC tables (10015 PCs): 10015 [0x6eff70,0x717160),
/out/sndfile_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==16437==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x5b2... | cpp | 616d0ecc0ae8639c49c9d124157254392672b01a | https://github.com/libsndfile/libsndfile/commit/03667195a3333f1aedb6f2452e20bf4f6d2ef138 | A use of uninitialized value occurs in the exif_subchunk_parse function. |
arvo:26803 | n132/arvo:26803-vul | /src/libsndfile | [
{
"end_line": 200,
"function_name": "wavlike_msadpcm_init",
"start_line": 117,
"target_file": "/src/libsndfile/src/ms_adpcm.c"
}
] | Heap-buffer-overflow WRITE 2 | libsndfile | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/sndfile_fuzzer < INPUT_FILE
or
/out/sndfile_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/sndfile_fuz... | cpp | a9815b3f228df00086e0a40bcc43162fc19896a1 | https://github.com/libsndfile/libsndfile/commit/deb669ee8be55a94565f6f8a6b60890c2e7c6f32 | A vulnerability exists in ms_adpcm where size checks use 'blockalign' (the size of a block) instead of 'samplesperblock', even though each block contains 7 samples per channel as part of the preamble. There is also a missing check to ensure that the block is large enough to hold the number of samples it claims to conta... |
arvo:26860 | n132/arvo:26860-vul | /src/opensc | [
{
"end_line": 692,
"function_name": "authentic_reduce_path",
"start_line": 656,
"target_file": "/src/opensc/src/libopensc/card-authentic.c"
}
] | Index-out-of-bounds | opensc | ubsan | INFO: Seed: 970580546
INFO: Loaded 1 modules (29617 inline 8-bit counters): 29617 [0x9e3120, 0x9ea4d1),
INFO: Loaded 1 PC tables (29617 PCs): 29617 [0x695d20,0x709830),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
sc.c:456:61: runtime error: index 16 out of bounds for type 'u8 const[1... | c | 445c651549eefff771fe96a8499fc5ecd0190549 | https://github.com/OpenSC/OpenSC/commit/65461e4eb5aff766b3137022d3af61e2b66a6076 | null |
arvo:26900 | n132/arvo:26900-vul | /src/opensc | [
{
"end_line": 692,
"function_name": "authentic_reduce_path",
"start_line": 656,
"target_file": "/src/opensc/src/libopensc/card-authentic.c"
}
] | Stack-buffer-overflow READ {*} | opensc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader
=================================================================
==58703==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f26ae45acf0 at pc 0x0000004966cf bp 0x7ffd78b087d0 sp 0x7ffd78b07f98
READ of size 126... | c | 445c651549eefff771fe96a8499fc5ecd0190549 | https://github.com/OpenSC/OpenSC/commit/65461e4eb5aff766b3137022d3af61e2b66a6076 | null |
arvo:26952 | n132/arvo:26952-vul | /src/wireshark | [
{
"end_line": 10737,
"function_name": "dissect_rtps",
"start_line": 10476,
"target_file": "/src/wireshark/epan/dissectors/packet-rtps.c"
}
] | Heap-double-free | wireshark | asan | oss-fuzzshark: disabling: udp
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: bgp
oss-fuzzshark: disabling: dhcp
oss-fuzzshark: disabling: json
oss-fuzzshark: disabling: snort
oss-fuzzshark: configured for dissector: ip
INFO: Seed: 1472833670
INFO: Loaded 1 modules (362801 i... | c | e1b3fb02627779f7e2c44386e65da57c320a5b40 | https://github.com/wireshark/wireshark/commit/29f2177222f8a7c1a527dbf599cf47c7225f1783 | A vulnerability exists in the rtps dissector where wmem_allocated memory is stored in pinfo->private_table, which is created with free functions (g_free) that are incompatible with wmem allocations. This can lead to memory management issues due to the collision between g_free and wmem allocations. |
arvo:26967 | n132/arvo:26967-vul | /src/leptonica | [
{
"end_line": 92,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 3,
"target_file": "/src/leptonica/prog/fuzzing/adaptmap_fuzzer.cc"
}
] | Heap-use-after-free READ 4 | leptonica | asan | INFO: Seed: 4176641470
INFO: Loaded 1 modules (117317 inline 8-bit counters): 117317 [0x15c1020, 0x15dda65),
INFO: Loaded 1 PC tables (117317 PCs): 117317 [0x15dda68,0x17a7eb8),
/out/adaptmap_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================... | cpp | 8d7717457caf7960a8b6cbac762c69b5001039c2 | https://github.com/DanBloomberg/leptonica/commit/f61f9234eac0cc6729ab15c7f395874c6a65abff | null |
arvo:27025 | n132/arvo:27025-vul | /src/fluent-bit | [
{
"end_line": 796,
"function_name": "flb_config_map_set",
"start_line": 559,
"target_file": "/src/fluent-bit/src/flb_config_map.c"
}
] | Heap-double-free | fluent-bit | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 584142224
INFO: Loaded 1 modules (25106 inline 8-bit counters): 25106 [0xb69be0, 0xb6fdf2),
INFO: Loaded 1 PC tables (25106 PCs): 25106 [0xb6fdf8,0xbd1f18),
/out/flb-it-fuzz-config_map_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each.
Running: /tmp/... | cpp | 2f8374edb11d450c0f3941ada96ccf377f7bf635 | https://github.com/fluent/fluent-bit/commit/d67f28b5b28253ff1d0732c79762bda2a12e207b | A vulnerability in config_map allows a double-free to occur due to missing memory allocation checks. |
arvo:27368 | n132/arvo:27368-vul | /src/fluent-bit | [
{
"end_line": 163,
"function_name": "flb_gzip_compress",
"start_line": 68,
"target_file": "/src/fluent-bit/src/flb_gzip.c"
}
] | Heap-buffer-overflow WRITE 1 | fluent-bit | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/flb-it-fuzz-utils_fuzzer_OSSFUZZ
[2025/04/09 09:40:18] [ warn] [pack] invalid UTF-8 bytes found, skipping bytes
[2025/04/09 09:40:18] [ warn] [pack] invalid UTF-8 bytes found, skipping bytes
[2025/04/09 09:40:18] [ warn] [pack] invalid UTF-... | c | 9a3bd47ec6121492e2c5e37ca14f5827bb7d6db2 | https://github.com/fluent/fluent-bit/commit/df2af999105cd6c94ec8b533bcca498664b1aa16 | null |
arvo:27474 | n132/arvo:27474-vul | /src/arrow | [
{
"end_line": 208,
"function_name": "ReifyDictionary",
"start_line": 181,
"target_file": "/src/arrow/cpp/src/arrow/ipc/dictionary.cc"
}
] | Heap-buffer-overflow READ 8 | arrow | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/arrow-ipc-stream-fuzz < INPUT_FILE
or
/out/arrow-ipc-stream-fuzz INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /o... | cpp | e599da2db6a22f34e94a2b44fc5f5288e89556e0 | https://github.com/apache/arrow/commit/be13bf50fe00f0f4c2d065a61db189d6c59b1f7b | null |
arvo:27475 | n132/arvo:27475-vul | /src/arrow | [
{
"end_line": 208,
"function_name": "ReifyDictionary",
"start_line": 181,
"target_file": "/src/arrow/cpp/src/arrow/ipc/dictionary.cc"
}
] | Global-buffer-overflow READ 4 | arrow | asan | INFO: Seed: 2048481509
INFO: Loaded 1 modules (200813 inline 8-bit counters): 200813 [0x1670608, 0x16a1675),
INFO: Loaded 1 PC tables (200813 PCs): 200813 [0x16a1678,0x19b1d48),
/out/arrow-ipc-stream-fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===========================================================... | cpp | e599da2db6a22f34e94a2b44fc5f5288e89556e0 | https://github.com/apache/arrow/commit/be13bf50fe00f0f4c2d065a61db189d6c59b1f7b | null |
arvo:27480 | n132/arvo:27480-vul | /src/opensc | [
{
"end_line": 189,
"function_name": "insert_key",
"start_line": 94,
"target_file": "/src/opensc/src/libopensc/pkcs15-tcos.c"
}
] | Stack-buffer-overflow READ 1 | opensc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader
=================================================================
==58702==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fd72d9cb6c0 at pc 0x0000006e9d97 bp 0x7ffdd95aea90 sp 0x7ffdd95aea88
READ of size 1 a... | c | d3451faa2190e9f4c12bb00adf00149b7af1d18d | https://github.com/OpenSC/OpenSC/commit/b5b1afe401bb6a04783ca36b5253948d6cf5ee48 | A vulnerability exists in tcos where reading behind the end of an allocated buffer can occur. |
arvo:27651 | n132/arvo:27651-vul | /src/ots | [
{
"end_line": 224,
"function_name": "OpenTypeSTAT::Parse",
"start_line": 36,
"target_file": "/src/ots/src/stat.cc"
}
] | Use-of-uninitialized-value | ots | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1970601357
INFO: Loaded 1 modules (22435 inline 8-bit counters): 22435 [0xc71468, 0xc76c0b),
INFO: Loaded 1 PC tables (22435 PCs): 22435 [0xc76c10,0xcce640),
/out/ots-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
ERROR at ../../src/ots... | cpp | e1d25c727058a8b256245c3a6427755fd2074c13 | https://github.com/khaledhosny/ots/commit/56fa835f0eacc313323144aca4a61d8085fe7c20 | A vulnerability exists in which upgrading the minor version in [STAT] causes an attempt to serialize elidedFallbackNameID without initialization, potentially leading to the addition of unintended data that the font does not have. |
arvo:27691 | n132/arvo:27691-vul | /src/leptonica | [
{
"end_line": 29,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 3,
"target_file": "/src/leptonica/prog/fuzzing/dewarp_fuzzer.cc"
}
] | Use-of-uninitialized-value | leptonica | msan | INFO: Seed: 32072504
INFO: Loaded 1 modules (95264 inline 8-bit counters): 95264 [0x1917348, 0x192e768),
INFO: Loaded 1 PC tables (95264 PCs): 95264 [0x192e768,0x1aa2968),
/out/dewarp_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==76638==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x96... | cpp | 4cb5129c2a9eea3e836bbcd2439ad6077f994dd0 | https://github.com/DanBloomberg/leptonica/commit/989e05e68f3006d7c4356b0050f0faf64445f4bf | The dewarp_fuzzer triggers use of uninitialized value in the genPathname function due to improper argument checking in getFilenamesInDirectory() and requesting debug output during fuzzing. |
arvo:27710 | n132/arvo:27710-vul | /src/fluent-bit | [
{
"end_line": 194,
"function_name": "flb_signv4_uri_normalize_path",
"start_line": 127,
"target_file": "/src/fluent-bit/src/flb_signv4.c"
}
] | Heap-buffer-overflow WRITE 1 | fluent-bit | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/flb-it-fuzz-signv4_fuzzer_OSSFUZZ
=================================================================
==18350==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000295 at pc 0x00000051f327 bp 0x7fffb77398f0 sp 0x7fffb77398e8
WR... | c | 0a23aab58cc704784d21c1e3ba4e46d9059cc8df | https://github.com/fluent/fluent-bit/commit/d118cebb93846c690b86187af890c11ff602d18c | A write heap-overflow exists in the signv4 component. |
arvo:27739 | n132/arvo:27739-vul | /src/arrow | [
{
"end_line": 208,
"function_name": "ReifyDictionary",
"start_line": 181,
"target_file": "/src/arrow/cpp/src/arrow/ipc/dictionary.cc"
}
] | Global-buffer-overflow READ {*} | arrow | asan | Reading 647 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/arrow-ipc-stream-fuzz < INPUT_FILE
or
/out/arrow-ipc-stream-fuzz INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute... | cpp | e599da2db6a22f34e94a2b44fc5f5288e89556e0 | https://github.com/apache/arrow/commit/be13bf50fe00f0f4c2d065a61db189d6c59b1f7b | null |
arvo:27742 | n132/arvo:27742-vul | /src/fluent-bit | [
{
"end_line": 996,
"function_name": "flb_pack_msgpack_to_json_format",
"start_line": 779,
"target_file": "/src/fluent-bit/src/flb_pack.c"
}
] | Heap-use-after-free READ {*} | fluent-bit | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3375537278
INFO: Loaded 1 modules (5831 inline 8-bit counters): 5831 [0x8c2ba0, 0x8c4267),
INFO: Loaded 1 PC tables (5831 PCs): 5831 [0x8c4268,0x8daed8),
/out/flb-it-fuzz-flb_json_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=... | c | 55b265a4a70a6b0a020f7cd59dfd0a02ed725747 | https://github.com/fluent/fluent-bit/commit/172f393e20dad1a69e9a79c3d6f8d4c78f921b2f | null |
arvo:27812 | n132/arvo:27812-vul | /src/c-blosc2 | [
{
"end_line": 973,
"function_name": "frame_get_usermeta",
"start_line": 910,
"target_file": "/src/c-blosc2/blosc/frame.c"
}
] | Heap-buffer-overflow READ {*} | c-blosc2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1976025332
INFO: Loaded 1 modules (47212 inline 8-bit counters): 47212 [0xe37e20, 0xe4368c),
INFO: Loaded 1 PC tables (47212 PCs): 47212 [0xb28e88,0xbe1548),
/out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSa... | c | 3055a05f0a229a11b5d8c65d42ab15ad17f3b714 | https://github.com/Blosc/c-blosc2/commit/877959117eef391293b5abff200a23bafe458754 | A heap-buffer-overflow occurs when reading the trailer from a frame with an invalid offset in the function frame_get_usermeta (c-blosc2/blosc/frame.c:932:5). This issue also affects blosc2_frame_to_schunk (c-blosc2/blosc/frame.c:1267:18), blosc2_schunk_open_sframe (c-blosc2/blosc/schunk.c:263:27), and is triggered duri... |
arvo:27816 | n132/arvo:27816-vul | /src/c-blosc2 | [
{
"end_line": 975,
"function_name": "frame_get_usermeta",
"start_line": 909,
"target_file": "/src/c-blosc2/blosc/frame.c"
}
] | UNKNOWN READ | c-blosc2 | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1048742142
INFO: Loaded 1 modules (60413 inline 8-bit counters): 60413 [0xaac548, 0xabb145),
INFO: Loaded 1 PC tables (60413 PCs): 60413 [0x7544e0,0x8404b0),
/out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Undefined... | c | 9cba9d298624ebd2794e3a7d375c8e41912f8d29 | https://github.com/Blosc/c-blosc2/commit/d482b4279323f70cc645a7651ace41d19de6b327 | A heap-buffer-overflow occurs in the code when reading the trailer from a frame with an invalid offset, leading to a security vulnerability. |
arvo:27852 | n132/arvo:27852-vul | /src/libjpeg-turbo | [
{
"end_line": 801,
"function_name": "decompress_smooth_data",
"start_line": 426,
"target_file": "/src/libjpeg-turbo/jdcoefct.c"
}
] | Heap-buffer-overflow READ 2 | libjpeg-turbo | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1073162240
INFO: Loaded 1 modules (10158 inline 8-bit counters): 10158 [0xa0c400, 0xa0ebae),
INFO: Loaded 1 PC tables (10158 PCs): 10158 [0xa0ebb0,0xa36690),
/out/libjpeg_turbo_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
============... | cpp | cfc7e6e58e9a187aba9312c28f8245052919212b | https://github.com/libjpeg-turbo/libjpeg-turbo/commit/ccaba5d7894ecfb5a8f11e48d3f86e1f14d5a469 | null |
arvo:27857 | n132/arvo:27857-vul | /src/libjpeg-turbo | [
{
"end_line": 801,
"function_name": "decompress_smooth_data",
"start_line": 426,
"target_file": "/src/libjpeg-turbo/jdcoefct.c"
}
] | Heap-buffer-overflow READ 2 | libjpeg-turbo | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/dct_fuzzer
Inconsistent progression sequence for component 0 coefficient 0
=================================================================
==21969==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62e00000b020 at pc 0x00000064a1... | cpp | cfc7e6e58e9a187aba9312c28f8245052919212b | https://github.com/libjpeg-turbo/libjpeg-turbo/commit/ccaba5d7894ecfb5a8f11e48d3f86e1f14d5a469 | null |
arvo:27936 | n132/arvo:27936-vul | /src/libjpeg-turbo | [
{
"end_line": 420,
"function_name": "smoothing_ok",
"start_line": 359,
"target_file": "/src/libjpeg-turbo/jdcoefct.c"
}
] | Use-of-uninitialized-value | libjpeg-turbo | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2692622979
INFO: Loaded 1 modules (11562 inline 8-bit counters): 11562 [0xc4c958, 0xc4f682),
INFO: Loaded 1 PC tables (11562 PCs): 11562 [0xc4f688,0xc7c928),
/out/dct_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Corrupt JPEG data: 44 ... | cpp | ccaba5d7894ecfb5a8f11e48d3f86e1f14d5a469 | https://github.com/libjpeg-turbo/libjpeg-turbo/commit/c7ca521bc85b57d41d3ad4963c13fc0100481084 | An uninitialized read occurs in decompress_smooth_data() when cinfo->output_iMCU_row is greater than cinfo->master->last_good_iMCU_row and cinfo->input_scan_number equals 1, causing the function to read from prev_coef_bits_latch[], which is uninitialized. |
arvo:28064 | n132/arvo:28064-vul | /src/libjpeg-turbo | [
{
"end_line": 189,
"function_name": "start_pass_phuff_decoder",
"start_line": 80,
"target_file": "/src/libjpeg-turbo/jdphuff.c"
}
] | Use-of-uninitialized-value | libjpeg-turbo | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 27347279
INFO: Loaded 1 modules (36123 inline 8-bit counters): 36123 [0x10f47a0, 0x10fd4bb),
INFO: Loaded 1 PC tables (36123 PCs): 36123 [0x10fd4c0,0x118a670),
/out/qpdf_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
WARNING: fuzz input... | cpp | 7b68764905173ecb149b518943c32a27fd345d68 | https://github.com/libjpeg-turbo/libjpeg-turbo/commit/110d8d6dcafaed517e8f77a6253169535ee3a20e | A vulnerability exists in decompress_smooth_data() where, for malformed progressive JPEG images containing an interleaved Y/Cb/Cr DC scan followed by two non-interleaved Y DC scans, the prev_coef_bits[] array is initialized only for the Y component and not for Cb and Cr. The uninitialized values for Cb and Cr are trans... |
arvo:28109 | n132/arvo:28109-vul | /src/serenity | [
{
"end_line": 1401,
"function_name": "Parser::parse_glob",
"start_line": 1351,
"target_file": "/src/serenity/Shell/Parser.cpp"
}
] | Bad-cast | serenity | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2054178681
INFO: Loaded 1 modules (46638 inline 8-bit counters): 46638 [0xbcff98, 0xbdb5c6),
INFO: Loaded 1 PC tables (46638 PCs): 46638 [0xbdb5c8,0xc918a8),
/out/FuzzShell: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
/src/serenity/Shell/Par... | cpp | c1c5225b7207d3be0a63ef1abfd62fc3b04acb2b | https://github.com/SerenityOS/serenity/commit/9d9347cd5aec545ad5c0f48cc637ca3e13970808 | A bad cast to BarewordLiteral occurs in the Shell, which can lead to a security vulnerability. |
arvo:28133 | n132/arvo:28133-vul | /src/serenity | [
{
"end_line": 905,
"function_name": "process_IHDR",
"start_line": 831,
"target_file": "/src/serenity/Libraries/LibGfx/PNGLoader.cpp"
}
] | Heap-buffer-overflow READ 1 | serenity | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/FuzzPNGLoader < INPUT_FILE
or
/out/FuzzPNGLoader INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/FuzzPNGLoader... | cpp | 5f182746b6d7989127495dce45d21885bf2ea9c0 | https://github.com/SerenityOS/serenity/commit/068615fe5e25ff763d84262c615ab4c1f178a708 | null |
arvo:28151 | n132/arvo:28151-vul | /src/serenity | [
{
"end_line": 1154,
"function_name": "uncompress_bmp_rle_data",
"start_line": 925,
"target_file": "/src/serenity/Libraries/LibGfx/BMPLoader.cpp"
}
] | Heap-buffer-overflow READ 1 | serenity | asan | Reading 230 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/FuzzBMPLoader < INPUT_FILE
or
/out/FuzzBMPLoader INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuz... | cpp | d66b0683ebff04337a89f3d0f384184d3d228607 | https://github.com/SerenityOS/serenity/commit/461bdeda2b54e478cc77f13c96991949a286af30 | A heap-overflow vulnerability exists in LibGfx's BMP RLE handling due to a misunderstanding of the field previously named 'data_size'. |
arvo:28167 | n132/arvo:28167-vul | /src/serenity | [
{
"end_line": 905,
"function_name": "process_IHDR",
"start_line": 831,
"target_file": "/src/serenity/Libraries/LibGfx/PNGLoader.cpp"
}
] | Heap-buffer-overflow READ 1 | serenity | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 215841342
INFO: Loaded 1 modules (18412 inline 8-bit counters): 18412 [0xa8a988, 0xa8f174),
INFO: Loaded 1 PC tables (18412 PCs): 18412 [0xa8f178,0xad7038),
/out/FuzzPNGLoader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
====================... | cpp | 5f182746b6d7989127495dce45d21885bf2ea9c0 | https://github.com/SerenityOS/serenity/commit/068615fe5e25ff763d84262c615ab4c1f178a708 | null |
arvo:28191 | n132/arvo:28191-vul | /src/wireshark | [
{
"end_line": 8335,
"function_name": "ieee1905_fragment_hash",
"start_line": 8314,
"target_file": "/src/wireshark/epan/dissectors/packet-ieee1905.c"
}
] | Heap-buffer-overflow READ 6 | wireshark | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzzshark_ip < INPUT_FILE
or
/out/fuzzshark_ip INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/fuzzshark_ip [-... | cpp | 022b230dcf82d22870629ea32e641a92c331b478 | https://github.com/wireshark/wireshark/commit/ca46d11c08a4792354a88956ad100282961bc586 | The ieee1905 reassembly code assumes that address sizes are always 6 bytes, leading to a failing read when processing addresses of different sizes. The code uses a local buffer based on this assumption instead of dynamically allocating memory according to the actual address size from the structures. |
arvo:28239 | n132/arvo:28239-vul | /src/serenity | [
{
"end_line": 402,
"function_name": "decode_frame",
"start_line": 286,
"target_file": "/src/serenity/Libraries/LibGfx/GIFLoader.cpp"
}
] | Global-buffer-overflow READ 4 | serenity | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/FuzzGIFLoader < INPUT_FILE
or
/out/FuzzGIFLoader INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/FuzzGIFLoader... | cpp | 69d7a34bc2ae1c014c702f9a5b662b30bfcab34f | https://github.com/SerenityOS/serenity/commit/531c3fe72eb18615dba89bfe673b8a8336abfb89 | A vulnerability in LibGfx's GIF deinterlacing allows out-of-bounds access in the interlacing row stride/offset arrays. This occurs when the pass index is about to overflow, potentially leading to invalid memory access during GIF decoding. |
arvo:28256 | n132/arvo:28256-vul | /src/fluent-bit | [
{
"end_line": 1248,
"function_name": "flb_http_do",
"start_line": 1100,
"target_file": "/src/fluent-bit/src/flb_http_client.c"
}
] | Heap-buffer-overflow WRITE 1 | fluent-bit | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 522039440
INFO: Loaded 1 modules (31011 inline 8-bit counters): 31011 [0xd188a0, 0xd201c3),
INFO: Loaded 1 PC tables (31011 PCs): 31011 [0xd201c8,0xd993f8),
/out/flb-it-fuzz-http_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
[2... | c | 5ed55cd0afebcd3077defa2d915669fbb0024ad0 | https://github.com/fluent/fluent-bit/commit/16f4084f36c78d1c121a78aafb7dc1db5fe699e9 | null |
arvo:28260 | n132/arvo:28260-vul | /src/fluent-bit | [
{
"end_line": 113,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 17,
"target_file": "/src/fluent-bit/tests/internal/fuzzers/engine_fuzzer.c"
}
] | Bad-cast | fluent-bit | ubsan | [2025/04/10 05:44:12] [ info] [engine] started (pid=19671)
[2025/04/10 05:44:12] [debug] [engine] coroutine stack size: 24576 bytes (24.0K)
[2025/04/10 05:44:12] [debug] [storage] [cio stream] new stream registered: lib.0
[2025/04/10 05:44:12] [ info] [storage] version=1.1.1, initializing...
[2025/04/10 05:44:12] [ inf... | c | 10198a223ce5bea0bb6022451c731b1efe75234a | https://github.com/fluent/fluent-bit/commit/7803d59d9d64ffcfd205a3ad5679eeb86c3138ce | null |
arvo:28265 | n132/arvo:28265-vul | /src/fluent-bit | [
{
"end_line": 374,
"function_name": "process_chunked_data",
"start_line": 258,
"target_file": "/src/fluent-bit/src/flb_http_client.c"
}
] | Heap-buffer-overflow READ 1 | fluent-bit | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3465893403
INFO: Loaded 1 modules (31042 inline 8-bit counters): 31042 [0xd199a0, 0xd212e2),
INFO: Loaded 1 PC tables (31042 PCs): 31042 [0xd212e8,0xd9a708),
/out/flb-it-fuzz-http_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
[... | c | 598745d7f7330c45df80a0bad7a8bae8d9e5cc32 | https://github.com/fluent/fluent-bit/commit/cfee54301badc5fd61422eb85ff4c1028ad6cbc7 | The http_client lacks a check on the variable val, which leads to an overflow. |
arvo:28312 | n132/arvo:28312-vul | /src/readstat | [
{
"end_line": 997,
"function_name": "sas7bdat_parse_page_pass2",
"start_line": 898,
"target_file": "/src/readstat/src/sas/readstat_sas7bdat_read.c"
}
] | Heap-buffer-overflow READ 4 | readstat | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_format_sas7bdat < INPUT_FILE
or
/out/fuzz_format_sas7bdat INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out... | cpp | 694f7d5211d31c854df83dbfc77e173d3ac644cb | https://github.com/WizardMac/ReadStat/commit/62a3f76020c96129edff3369614b704d8f6f9fa3 | null |
arvo:28315 | n132/arvo:28315-vul | /src/openthread | [
{
"end_line": 202,
"function_name": "ChannelMaskBaseTlv::IsValid",
"start_line": 184,
"target_file": "/src/openthread/src/core/meshcop/meshcop_tlvs.cpp"
}
] | Stack-buffer-overflow READ 1 | openthread | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 218056225
INFO: Loaded 1 modules (18862 inline 8-bit counters): 18862 [0x9c8830, 0x9cd1de),
INFO: Loaded 1 PC tables (18862 PCs): 18862 [0x6ed058,0x736b38),
/out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==================... | cpp | 3d21a846d92d6df4ae3559a184462537fa1413bd | https://github.com/openthread/openthread/commit/02f7dbb42be7f75355436ec43bc82d0b2b4caad6 | A security vulnerability exists in the ChannelMaskBaseTlv::IsValid() function in meshcop-tlvs, where the function does not properly validate input, potentially allowing invalid channel mask values to be accepted. |
arvo:28383 | n132/arvo:28383-vul | /src/opensc | [
{
"end_line": 282,
"function_name": "insert_pin",
"start_line": 191,
"target_file": "/src/opensc/src/libopensc/pkcs15-tcos.c"
}
] | Stack-use-after-return READ 1 | opensc | asan | INFO: Seed: 1188956587
INFO: Loaded 1 modules (31995 inline 8-bit counters): 31995 [0xf5fbc0, 0xf678bb),
INFO: Loaded 1 PC tables (31995 PCs): 31995 [0xbea748,0xc676f8),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==58... | c | 69544553c36f0613f6283e0eeb3f9eb549825986 | https://github.com/OpenSC/OpenSC/commit/5df913b7f57ad89b9832555d24c08d23a534311e | A vulnerability exists in tcos where the insert_pin() function does not properly check bounds, potentially leading to out-of-bounds access. |
arvo:28458 | n132/arvo:28458-vul | /src/glib | [
{
"end_line": 1382,
"function_name": "g_date_set_parse",
"start_line": 1226,
"target_file": "/src/glib/glib/gdate.c"
}
] | Heap-buffer-overflow READ 1 | glib | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_date_parse
=================================================================
==7522==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000076 at pc 0x00000050a64c bp 0x7ffddac62ec0 sp 0x7ffddac62eb8
READ of size 1 at 0x6... | c | ba621181221f8b2f8f07743df2c02a7a7638f995 | https://gitlab.gnome.org/GNOME/glibb4c2e4d553099a85f75edf8fe9c64028e7302766 | The gdate component does not validate input as UTF-8 before parsing, allowing non-UTF-8 data to be processed. Dates are expected to be valid UTF-8. |
arvo:28459 | n132/arvo:28459-vul | /src/selinux | [
{
"end_line": 3972,
"function_name": "__cil_resolve_ast_last_child_helper",
"start_line": 3926,
"target_file": "/src/selinux/libsepol/cil/src/cil_resolve_ast.c"
}
] | Heap-use-after-free READ 4 | selinux | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1988764585
INFO: Loaded 1 modules (14459 inline 8-bit counters): 14459 [0x954770, 0x957feb),
INFO: Loaded 1 PC tables (14459 PCs): 14459 [0x957ff0,0x9907a0),
/out/secilc-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Failed to resolve c... | c | 038817036f36aadf762c8a3061500903b22b8213 | https://github.com/SELinuxProject/selinux/commit/0451adebdf153eee1f69914141311114a0130982 | null |
arvo:28462 | n132/arvo:28462-vul | /src/selinux | [
{
"end_line": 2375,
"function_name": "cil_print_recursive_blockinherit",
"start_line": 2339,
"target_file": "/src/selinux/libsepol/cil/src/cil_resolve_ast.c"
}
] | Heap-buffer-overflow READ 8 | selinux | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 49621934
INFO: Loaded 1 modules (14421 inline 8-bit counters): 14421 [0x9535f0, 0x956e45),
INFO: Loaded 1 PC tables (14421 PCs): 14421 [0x956e48,0x98f398),
/out/secilc-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Recursive blockinheri... | c | a25d9104efa86f4980299fdd1b2dbba23c08ffb2 | https://github.com/SELinuxProject/selinux/commit/228c06d97a8a33b60b89ded17acbd0e92cca9cfe | A heap buffer overflow (out-of-bound read) occurs in cil_print_recursive_blockinherit in libsepol/cil when the CIL compiler encounters a recursive blockinherit with an optional block. This happens because cil_print_recursive_blockinherit() assumes that all nodes are either CIL_BLOCK or CIL_BLOCKINHERIT, leading to inco... |
arvo:28470 | n132/arvo:28470-vul | /src/selinux | [
{
"end_line": 3972,
"function_name": "__cil_resolve_ast_last_child_helper",
"start_line": 3926,
"target_file": "/src/selinux/libsepol/cil/src/cil_resolve_ast.c"
}
] | Heap-use-after-free READ 8 | selinux | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 620554634
INFO: Loaded 1 modules (14459 inline 8-bit counters): 14459 [0x954770, 0x957feb),
INFO: Loaded 1 PC tables (14459 PCs): 14459 [0x957ff0,0x9907a0),
/out/secilc-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
====================... | c | 038817036f36aadf762c8a3061500903b22b8213 | https://github.com/SELinuxProject/selinux/commit/0451adebdf153eee1f69914141311114a0130982 | null |
arvo:28478 | n132/arvo:28478-vul | /src/selinux | [
{
"end_line": 3972,
"function_name": "__cil_resolve_ast_last_child_helper",
"start_line": 3926,
"target_file": "/src/selinux/libsepol/cil/src/cil_resolve_ast.c"
}
] | Heap-use-after-free READ 4 | selinux | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3515742723
INFO: Loaded 1 modules (14459 inline 8-bit counters): 14459 [0x954770, 0x957feb),
INFO: Loaded 1 PC tables (14459 PCs): 14459 [0x957ff0,0x9907a0),
/out/secilc-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Failed to resolve s... | c | 038817036f36aadf762c8a3061500903b22b8213 | https://github.com/SELinuxProject/selinux/commit/0451adebdf153eee1f69914141311114a0130982 | null |
arvo:28484 | n132/arvo:28484-vul | /src/selinux | [
{
"end_line": 206,
"function_name": "cil_post_fc_fill_data",
"start_line": 166,
"target_file": "/src/selinux/libsepol/cil/src/cil_post.c"
}
] | Heap-buffer-overflow READ 1 | selinux | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4182301702
INFO: Loaded 1 modules (14852 inline 8-bit counters): 14852 [0x95c350, 0x95fd54),
INFO: Loaded 1 PC tables (14852 PCs): 14852 [0x95fd58,0x999d98),
/out/secilc-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===================... | c | d1a34d3f1df5e90c9e01fcd9791c26db89064a7e | https://github.com/SELinuxProject/selinux/commit/e13c8162656665f9ec1c76a033cae5b011b8c658 | An out-of-bound read occurs in the CIL compiler (libsepol/cil) when processing a file context pattern ending with a backslash ("\") in the cil_post_fc_fill_data() function. When the function encounters a backslash at the end of the string, it reads beyond the NUL terminator, leading to a heap-buffer-overflow. This issu... |
arvo:28512 | n132/arvo:28512-vul | /src/selinux | [
{
"end_line": 3972,
"function_name": "__cil_resolve_ast_last_child_helper",
"start_line": 3926,
"target_file": "/src/selinux/libsepol/cil/src/cil_resolve_ast.c"
}
] | Use-of-uninitialized-value | selinux | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3694116846
INFO: Loaded 1 modules (14459 inline 8-bit counters): 14459 [0x9b71e8, 0x9baa63),
INFO: Loaded 1 PC tables (14459 PCs): 14459 [0x9baa68,0x9f3218),
/out/secilc-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Failed to find sens... | c | 038817036f36aadf762c8a3061500903b22b8213 | https://github.com/SELinuxProject/selinux/commit/0451adebdf153eee1f69914141311114a0130982 | null |
arvo:28587 | n132/arvo:28587-vul | /src/ots | [
{
"end_line": 144,
"function_name": "OpenTypeGLYF::ParseSimpleGlyph",
"start_line": 83,
"target_file": "/src/ots/src/glyf.cc"
}
] | Use-of-uninitialized-value | ots | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 706487251
INFO: Loaded 1 modules (22594 inline 8-bit counters): 22594 [0xc7be28, 0xc8166a),
INFO: Loaded 1 PC tables (22594 PCs): 22594 [0xc81670,0xcd9a90),
/out/ots-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
ERROR at ../../src/ots/... | cpp | b703837f4dda38239d584cb0161a7447888e905d | https://github.com/khaledhosny/ots/commit/1141c81c411b599e40496679129d0884715e8650 | The glyf table code accesses maxp version 1 fields without proper guards, leading to uninitialized field access due to the current design where these fields are not initialized for other maxp versions. This can result in undefined behavior when handling fonts with mismatched maxp and glyf/CFF tables. |
arvo:28682 | n132/arvo:28682-vul | /src/openthread | [
{
"end_line": 182,
"function_name": "Dataset::IsValid",
"start_line": 169,
"target_file": "/src/openthread/src/core/meshcop/dataset.cpp"
}
] | Stack-buffer-overflow READ 1 | openthread | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 724618904
INFO: Loaded 1 modules (20859 inline 8-bit counters): 20859 [0xa1bc10, 0xa20d8b),
INFO: Loaded 1 PC tables (20859 PCs): 20859 [0x727f98,0x779748),
/out/cli-uart-received-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=========... | cpp | 14cab3a7f04373d1f5b20fa9282d467c4bc03266 | https://github.com/openthread/openthread/commit/b3fc7bc453034aa61cd27d5208f08ead9c7789e0 | null |
arvo:28787 | n132/arvo:28787-vul | /src/mdbtools | [
{
"end_line": 43,
"function_name": "mdb_map_find_next0",
"start_line": 21,
"target_file": "/src/mdbtools/src/libmdb/map.c"
}
] | Heap-buffer-overflow READ 4 | mdbtools | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 447617848
INFO: Loaded 1 modules (1678 inline 8-bit counters): 1678 [0x7f2380, 0x7f2a0e),
INFO: Loaded 1 PC tables (1678 PCs): 1678 [0x5a0eb0,0x5a7790),
/out/fuzz_mdb: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=============================... | c | 78bbf4250ecc510c46274300b6f7fed73140147b | https://github.com/mdbtools/mdbtools/commit/50c9bdfee62ea54e33da6ae54ad9395e3042d581 | null |
arvo:28810 | n132/arvo:28810-vul | /src/aac | [
{
"end_line": 350,
"function_name": "DecodeNonPCWs",
"start_line": 130,
"target_file": "/src/aac/libAACdec/src/aacdec_hcrs.cpp"
}
] | Global-buffer-overflow READ 4 | aac | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/aacDecoder_DecodeFrame < INPUT_FILE
or
/out/aacDecoder_DecodeFrame INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] ... | cpp | 150febcc65fd7864846cbb03f511fafbaa276f86 | https://android.googlesource.com/platform/external/aac//+/a7c64ff42f1c67960acb9686555ecbc683e3762c%5E%21/ | An unsigned integer overflow occurs in the Hcr_State_BODY_SIGN_ESC__ESC_WORD() function. |
arvo:28832 | n132/arvo:28832-vul | /src/mdbtools | [
{
"end_line": 75,
"function_name": "decompressed_to_utf8_with_iconv",
"start_line": 52,
"target_file": "/src/mdbtools/src/libmdb/iconv.c"
}
] | UNKNOWN READ | mdbtools | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2497116577
INFO: Loaded 1 modules (3284 inline 8-bit counters): 3284 [0x75ed08, 0x75f9dc),
INFO: Loaded 1 PC tables (3284 PCs): 3284 [0x50b880,0x5185c0),
/out/fuzz_mdb: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
offset 3792651327488 is beyo... | c | 0e3a627ee6b3828b8dde3a0c105bf73454c45959 | https://github.com/mdbtools/mdbtools/commit/89e23615828ea64af9858e5942d6bc4d82c458a6 | null |
arvo:29002 | n132/arvo:29002-vul | /src/selinux | [
{
"end_line": 3972,
"function_name": "__cil_resolve_ast_last_child_helper",
"start_line": 3926,
"target_file": "/src/selinux/libsepol/cil/src/cil_resolve_ast.c"
}
] | Heap-use-after-free READ 8 | selinux | asan | Reading 2927 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/secilc-fuzzer < INPUT_FILE
or
/out/secilc-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fu... | cpp | 038817036f36aadf762c8a3061500903b22b8213 | https://github.com/SELinuxProject/selinux/commit/0451adebdf153eee1f69914141311114a0130982 | null |
arvo:29164 | n132/arvo:29164-vul | /src/libraw | [
{
"end_line": 1147,
"function_name": "LibRaw::identify",
"start_line": 179,
"target_file": "/src/libraw/src/metadata/identify.cpp"
}
] | Use-of-uninitialized-value | libraw | msan | INFO: Seed: 3796165162
INFO: Loaded 1 modules (18059 inline 8-bit counters): 18059 [0xba1c30, 0xba62bb),
INFO: Loaded 1 PC tables (18059 PCs): 18059 [0x8b9168,0x8ffa18),
/out/libraw_cr2_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
unknown file: data corrupted at 524826
==54053==WARNING: MemorySanitize... | cpp | 371161a06d7f98f231a001dad4af2dfb463e270a | https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e | null |
arvo:29170 | n132/arvo:29170-vul | /src/serenity | [
{
"end_line": 368,
"function_name": "Font::load_from_offset",
"start_line": 242,
"target_file": "/src/serenity/Libraries/LibTTF/Font.cpp"
}
] | UNKNOWN READ | serenity | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1449020934
INFO: Loaded 1 modules (30107 inline 8-bit counters): 30107 [0xa36888, 0xa3de23),
INFO: Loaded 1 PC tables (30107 PCs): 30107 [0xa3de28,0xab37d8),
/out/FuzzTTF: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitize... | cpp | 688d249b2dad91b3b795a91604a56c8da93b3482 | https://github.com/SerenityOS/serenity/commit/5e95d62ffef98eec2164157174d182d8d8b538a4 | An unsigned overflow occurs in TTF table parsing within LibTTF due to insufficient guarding, potentially leading to incorrect memory access or other security issues. |
arvo:29217 | n132/arvo:29217-vul | /src/poppler | [
{
"end_line": 1587,
"function_name": "FoFiTrueType::parse",
"start_line": 1467,
"target_file": "/src/poppler/fofi/FoFiTrueType.cc"
}
] | Use-of-uninitialized-value | poppler | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1077455553
INFO: Loaded 1 modules (364985 inline 8-bit counters): 364985 [0x4787c00, 0x47e0db9),
INFO: Loaded 1 PC tables (364985 PCs): 364985 [0x47e0dc0,0x4d72950),
/out/qt_pdf_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==30330==WA... | cpp | e4346ae34b24ce84a4aeae539f26cab49497450c | https://gitlab.freedesktop.org/poppler/poppler.git3ac779d9a9d2c63433d3765c82a2724947d86a15 | A vulnerability exists in FoFiTrueType::parse where parsing does not succeed if tables are missing. |
arvo:29243 | n132/arvo:29243-vul | /src/binutils-gdb | [
{
"end_line": 1454,
"function_name": "_bfd_vms_slurp_egsd",
"start_line": 1175,
"target_file": "/src/binutils-gdb/bfd/vms-alpha.c"
}
] | Heap-buffer-overflow READ 1 | binutils-gdb | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_bfd < INPUT_FILE
or
/out/fuzz_bfd INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/fuzz_bfd [-N]
afl-fuzz ... | cpp | 18b9872261b950a8d10a4ae6ccb8f2acdaebc3e6 | https://github.com/bminor/binutils-gdb/commit/de6a7ee4bd18b7812ee5ff9abb62e2889daa501b | A heap buffer overflow exists in the _bfd_vms_slurp_egsd function in vms-alpha.c, where flags are read before performing a size check. |
arvo:29266 | n132/arvo:29266-vul | /src/serenity | [
{
"end_line": 181,
"function_name": "Heap::gather_conservative_roots",
"start_line": 127,
"target_file": "/src/serenity/Libraries/LibJS/Heap/Heap.cpp"
}
] | Stack-buffer-overflow READ 8 | serenity | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/FuzzJs < INPUT_FILE
or
/out/FuzzJs INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/FuzzJs [-N]
afl-fuzz will r... | cpp | fdd974b7ef4fb3f38c266f0f16d9b68f84f40bca | https://github.com/SerenityOS/serenity/commit/51b880b0383089822f513330cd64f93b54b9f21c | A security vulnerability exists in LibJS where AddressSanitizer (ASAN) interferes with the conservative garbage collector's stack scan, causing the JS fuzzer to crash during garbage collection and preventing further bug discovery. |
arvo:29328 | n132/arvo:29328-vul | /src/mdbtools | [
{
"end_line": 155,
"function_name": "mdb_crack_row3",
"start_line": 124,
"target_file": "/src/mdbtools/src/libmdb/write.c"
}
] | UNKNOWN READ | mdbtools | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_mdb < INPUT_FILE
or
/out/fuzz_mdb INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/fuzz_mdb [-N]
afl-fuzz ... | cpp | 9e883cb100bc68f9c469f1d88fe06a2f7fc85597 | https://github.com/mdbtools/mdbtools/commit/9b5e5919052c5dff80a3f7301ae520b71571814a | null |
arvo:29408 | n132/arvo:29408-vul | /src/igraph | [
{
"end_line": 509,
"function_name": "igraph_read_graph_gml",
"start_line": 182,
"target_file": "/src/igraph/src/io/gml.c"
}
] | Heap-use-after-free READ 8 | igraph | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/read_gml_fuzzer
=================================================================
==6494==ERROR: AddressSanitizer: heap-use-after-free on address 0x608000000068 at pc 0x0000004fb310 bp 0x7ffeda6a11c0 sp 0x7ffeda6a11b8
READ of size 8 at 0x60... | c | 4ea42140de9bfee13e00845f8e3a8078c1aced29 | https://github.com/igraph/igraph/commit/47eec2c3a87e0c129766046ad15b074eb60a1213 | A double-free problem exists in the igraph_read_graph_gml function. |
arvo:29610 | n132/arvo:29610-vul | /src/lua | [
{
"end_line": 213,
"function_name": "lua_closeslot",
"start_line": 202,
"target_file": "/src/lua/lapi.c"
}
] | Heap-use-after-free WRITE 1 | lua | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4065600021
INFO: Loaded 1 modules (6200 inline 8-bit counters): 6200 [0x8808e0, 0x882118),
INFO: Loaded 1 PC tables (6200 PCs): 6200 [0x61a0e8,0x632468),
/out/fuzz_lua: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
============================... | c | e500892e18e994781760819e33098322728796e8 | https://github.com/lua/lua/commit/2bfa13e520e53210b96ead88f49a9ca20c5a5d18 | null |
arvo:29633 | n132/arvo:29633-vul | /src/fio | [
{
"end_line": 971,
"function_name": "__handle_option",
"start_line": 540,
"target_file": "/src/fio/parse.c"
}
] | Stack-buffer-overflow WRITE {*} | fio | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_parseini < INPUT_FILE
or
/out/fuzz_parseini INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/fuzz_parseini... | cpp | e4d9a7bf68d0ffb9fd7ab328a4f0edddc89297be | https://github.com/axboe/fio/commit/465767437da1bcf99a375295799d33948d9fc5f0 | A buffer overrun occurs in the handling of the filename option due to exceeding the size of a MAX_PATH buffer. This vulnerability is triggered when a filename longer than MAX_PATH is provided, leading to a stack-buffer-overflow in the add_file function in filesetup.c at line 1656, which is called from str_filename_cb i... |
arvo:29816 | n132/arvo:29816-vul | /src/c-blosc2 | [
{
"end_line": 476,
"function_name": "get_header_info",
"start_line": 383,
"target_file": "/src/c-blosc2/blosc/frame.c"
}
] | Heap-buffer-overflow READ 4 | c-blosc2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3814365336
INFO: Loaded 1 modules (47987 inline 8-bit counters): 47987 [0xe455a0, 0xe51113),
INFO: Loaded 1 PC tables (47987 PCs): 47987 [0xb32848,0xbedf78),
/out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=========... | cpp | fdfeb753f3c14b20e33611da4a0a39d3b57a57ab | https://github.com/Blosc/c-blosc2/commit/98bb9e682481b934f65db1bbd73bc2c3a41f2931 | null |
arvo:29819 | n132/arvo:29819-vul | /src/leptonica | [
{
"end_line": 48,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 3,
"target_file": "/src/leptonica/prog/fuzzing/morph_fuzzer.cc"
}
] | Heap-buffer-overflow READ 4 | leptonica | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/morph_fuzzer < INPUT_FILE
or
/out/morph_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/morph_fuzzer [-... | cpp | 0665ff28f9e9df91565ee09438a30d47232ad2eb | https://github.com/DanBloomberg/leptonica/commit/a0b59604bcf24b13af168fa45d54bbedab1d3d5d | null |
arvo:29821 | n132/arvo:29821-vul | /src/c-blosc2 | [
{
"end_line": 476,
"function_name": "get_header_info",
"start_line": 383,
"target_file": "/src/c-blosc2/blosc/frame.c"
}
] | UNKNOWN READ | c-blosc2 | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3892859783
INFO: Loaded 1 modules (60609 inline 8-bit counters): 60609 [0xaae9d8, 0xabd699),
INFO: Loaded 1 PC tables (60609 PCs): 60609 [0x753d78,0x840988),
/out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Undefined... | c | fdfeb753f3c14b20e33611da4a0a39d3b57a57ab | https://github.com/Blosc/c-blosc2/commit/98bb9e682481b934f65db1bbd73bc2c3a41f2931 | null |
arvo:29822 | n132/arvo:29822-vul | /src/c-blosc2 | [
{
"end_line": 52,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 11,
"target_file": "/src/c-blosc2/tests/fuzz/fuzz_decompress_frame.c"
}
] | UNKNOWN READ | c-blosc2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3701903030
INFO: Loaded 1 modules (44785 inline 8-bit counters): 44785 [0x87da400, 0x87e52f1),
INFO: Loaded 1 PC tables (44785 PCs): 44785 [0x873537c,0x878cb04),
/out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Addre... | c | aebf2b9858368681e497f136501ab33cc1014aed | https://github.com/Blosc/c-blosc2/commit/4f7cfdbde36917b3b6291492240fc9b128ace1d7 | null |
arvo:29855 | n132/arvo:29855-vul | /src/htslib | [
{
"end_line": 1740,
"function_name": "cram_uncompress_block",
"start_line": 1565,
"target_file": "/src/htslib/cram/cram_io.c"
}
] | Heap-buffer-overflow READ 1 | htslib | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/hts_open_fuzzer < INPUT_FILE
or
/out/hts_open_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/hts_open_... | cpp | a01a139ac1fa365a688ec8734d62ef859a8bc416 | https://github.com/samtools/htslib/commit/90fef7300c75ca6b8834da0dcb710e27d599324e | null |
arvo:29908 | n132/arvo:29908-vul | /src/htslib | [
{
"end_line": 1740,
"function_name": "cram_uncompress_block",
"start_line": 1565,
"target_file": "/src/htslib/cram/cram_io.c"
}
] | Heap-buffer-overflow READ 1 | htslib | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 674920177
INFO: Loaded 1 modules (21854 inline 8-bit counters): 21854 [0xa4a2d0, 0xa4f82e),
INFO: Loaded 1 PC tables (21854 PCs): 21854 [0x77e2e0,0x7d38c0),
/out/hts_open_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==================... | c | a01a139ac1fa365a688ec8734d62ef859a8bc416 | https://github.com/samtools/htslib/commit/90fef7300c75ca6b8834da0dcb710e27d599324e | null |
arvo:29947 | n132/arvo:29947-vul | /src/c-blosc2 | [
{
"end_line": 1302,
"function_name": "frame_get_metalayers",
"start_line": 1253,
"target_file": "/src/c-blosc2/blosc/frame.c"
}
] | UNKNOWN READ | c-blosc2 | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2622841311
INFO: Loaded 1 modules (65357 inline 8-bit counters): 65357 [0xaf2068, 0xb01fb5),
INFO: Loaded 1 PC tables (65357 PCs): 65357 [0x7814e8,0x8809b8),
/out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Undefined... | cpp | c91ed64cc5403478c2ebce420f84dd3a2a0540dd | https://github.com/Blosc/c-blosc2/commit/1a42fcd4473577cb8558b5609672a02388dabd39 | null |
arvo:29973 | n132/arvo:29973-vul | /src/c-blosc2 | [
{
"end_line": 1302,
"function_name": "frame_get_metalayers",
"start_line": 1253,
"target_file": "/src/c-blosc2/blosc/frame.c"
}
] | Memcpy-param-overlap | c-blosc2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3192712035
INFO: Loaded 1 modules (52624 inline 8-bit counters): 52624 [0xec6a20, 0xed37b0),
INFO: Loaded 1 PC tables (52624 PCs): 52624 [0xba10d0,0xc6e9d0),
/out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=========... | c | c91ed64cc5403478c2ebce420f84dd3a2a0540dd | https://github.com/Blosc/c-blosc2/commit/1a42fcd4473577cb8558b5609672a02388dabd39 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.