task_id stringlengths 8 10 | docker_image stringlengths 17 19 | basedir stringclasses 157
values | target_functions listlengths 1 3 | crash_type stringclasses 85
values | project_name stringclasses 157
values | sanitizer stringclasses 3
values | sanitizer_output stringlengths 1.13k 6.5M | language stringclasses 2
values | vuln_commit stringlengths 40 40 | fix stringlengths 69 110 | vulnerability_description stringlengths 38 824 ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
arvo:29974 | n132/arvo:29974-vul | /src/wireshark | [
{
"end_line": 4429,
"function_name": "dissect_tcpopt_sack",
"start_line": 4304,
"target_file": "/src/wireshark/epan/dissectors/packet-tcp.c"
}
] | Index-out-of-bounds | wireshark | ubsan | oss-fuzzshark: disabling: udp
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: bgp
oss-fuzzshark: disabling: dhcp
oss-fuzzshark: disabling: json
oss-fuzzshark: disabling: snort
oss-fuzzshark: configured for dissector: ip
INFO: Running with entropic power schedule (0xFF, 100).
I... | c | ccd8529440e37c8debe91a3b31229548704df82f | https://github.com/wireshark/wireshark/commit/ce19a2512eaa76b066bc9885444354c4df2bf210 | A vulnerability exists in the TCP implementation where the absence of a SACK range check allows writing past the ends of the sack_left_edge and sack_right_edge arrays. |
arvo:30051 | n132/arvo:30051-vul | /src/sudo | [
{
"end_line": 781,
"function_name": "sudoers_parse_ldif",
"start_line": 567,
"target_file": "/src/sudo/plugins/sudoers/parse_ldif.c"
}
] | UNKNOWN WRITE | sudo | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4027853160
INFO: Loaded 1 modules (10247 inline 8-bit counters): 10247 [0x925720, 0x927f27),
INFO: Loaded 1 PC tables (10247 PCs): 10247 [0x927f28,0x94ff98),
/out/fuzz_sudoers_parse: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
: invalid LDIF... | c | 8781560e1bf30e2b7fa564865d138f663bbfa125 | https://github.com/sudo-project/sudo/commit/419c8952402b5b5642a0d093aa713819f26a36e3 | A vulnerability exists where ldif_to_sudoers() is called even when there are no roles to convert. |
arvo:30090 | n132/arvo:30090-vul | /src/fluent-bit | [
{
"end_line": 225,
"function_name": "flb_parser_json_do",
"start_line": 29,
"target_file": "/src/fluent-bit/src/flb_parser_json.c"
}
] | Heap-buffer-overflow READ {*} | fluent-bit | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/flb-it-fuzz-parser_fuzzer_OSSFUZZ
[2025/04/10 14:24:36] [ info] Configuration:
[2025/04/10 14:24:36] [ info] flush time | 5.000000 seconds
[2025/04/10 14:24:36] [ info] grace | 5 seconds
[2025/04/10 14:24:36] [ info] daemon ... | c | 9c992e46578845ea8a222b9cef42c323634c77a6 | https://github.com/fluent/fluent-bit/commit/6e6cb845e96de2474456aceb8d6ffdf42b19942c | A type confusion bug exists in the JSON parser, which can lead to incorrect handling of data types during parsing. |
arvo:30093 | n132/arvo:30093-vul | /src/fluent-bit | [
{
"end_line": 483,
"function_name": "ra_translate_keymap",
"start_line": 416,
"target_file": "/src/fluent-bit/src/flb_record_accessor.c"
}
] | Stack-buffer-overflow READ {*} | fluent-bit | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/flb-it-fuzz-record_ac_fuzzer_OSSFUZZ
[2025/04/10 04:17:11] [error] [sp] bad input character '' at line -1094795586
=================================================================
==19950==ERROR: AddressSanitizer: stack-buffer-overflow on... | c | 2766d32cb4699a271128c056e452cff51031a0d0 | https://github.com/fluent/fluent-bit/commit/0ec1a7b309ec29904d9f855c495dcd550da74d57 | null |
arvo:30112 | n132/arvo:30112-vul | /src/opensc | [
{
"end_line": 952,
"function_name": "sc_pkcs15emu_oberthur_add_data",
"start_line": 856,
"target_file": "/src/opensc/src/libopensc/pkcs15-oberthur.c"
}
] | Heap-buffer-overflow READ {*} | opensc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader
=================================================================
==58075==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60c000000180 at pc 0x000000499097 bp 0x7ffff5a959f0 sp 0x7ffff5a951b8
READ of size 254 ... | c | 9c91a4327e6db579f7f964f147fd6e94a0e1b85e | https://github.com/OpenSC/OpenSC/commit/17d8980cde7be597afc366b7e311d0d7cadcb1f4 | null |
arvo:30113 | n132/arvo:30113-vul | /src/c-blosc2 | [
{
"end_line": 1145,
"function_name": "frame_get_usermeta",
"start_line": 1056,
"target_file": "/src/c-blosc2/blosc/frame.c"
}
] | UNKNOWN READ | c-blosc2 | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1928156616
INFO: Loaded 1 modules (65370 inline 8-bit counters): 65370 [0xaf1fc8, 0xb01f22),
INFO: Loaded 1 PC tables (65370 PCs): 65370 [0x781aa8,0x881048),
/out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Undefined... | c | f18a6d4644ef960d7ac1e75742bdacfd691d8bc5 | https://github.com/Blosc/c-blosc2/commit/9d81c680a0a9e9a6ac081bb1061c00a1ab3feaac | A vulnerability exists in which the code attempts to read usermeta past the frame, triggering an ASAN sanitizer check. |
arvo:3012 | n132/arvo:3012-vul | /src/librawspeed | [
{
"end_line": 110,
"function_name": "OrfDecoder::decodeRawInternal",
"start_line": 63,
"target_file": "/src/librawspeed/src/librawspeed/decoders/OrfDecoder.cpp"
},
{
"end_line": 301,
"function_name": "OrfDecoder::decodeCompressed",
"start_line": 141,
"target_file": "/src/librawsp... | Use-after-poison WRITE 2 | librawspeed | asan | INFO: Seed: 1942819145
INFO: Loaded 1 modules (13713 guards): [0xad27b0, 0xadfdf4),
/out/TiffParserFuzzer-GetDecoder-Decode: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==3432==ERROR: AddressSanitizer: use-after-poison on address 0x7f0069255802 a... | cpp | 301c84ac1fe8827c0ba5f6a291bf052f1430ea81 | https://github.com/darktable-org/rawspeed/commit/4e3e6cbc15022fd78b214034c7dfacc719ba418c | A vulnerability exists in OrfDecoder where image dimensions are not checked before processing, potentially allowing invalid or malicious input to be handled. The decodeCompressed() function is involved in this issue. |
arvo:30181 | n132/arvo:30181-vul | /src/wolfmqtt | [
{
"end_line": 754,
"function_name": "MqttEncode_Connect",
"start_line": 611,
"target_file": "/src/wolfmqtt/src/mqtt_packet.c"
}
] | Heap-buffer-overflow WRITE 1 | wolfmqtt | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2495873999
INFO: Loaded 1 modules (14419 inline 8-bit counters): 14419 [0x83c0030, 0x83c3883),
INFO: Loaded 1 PC tables (14419 PCs): 14419 [0x833be3c,0x83580d4),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=============... | cpp | d7ac40ba2e1fb3d37590dcbca2aca2b9f142a6d2 | https://github.com/wolfSSL/wolfMQTT/commit/af1c98b16ef3fb90c7c1714d61f069b38d479588 | A NULL username in the relevant code path does not require extra length, potentially leading to a security vulnerability. |
arvo:30234 | n132/arvo:30234-vul | /src/selinux | [
{
"end_line": 317,
"function_name": "cil_destroy_blockinherit",
"start_line": 297,
"target_file": "/src/selinux/libsepol/cil/src/cil_build_ast.c"
}
] | Heap-use-after-free READ 4 | selinux | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 601048975
INFO: Loaded 1 modules (14431 inline 8-bit counters): 14431 [0x9566b0, 0x959f0f),
INFO: Loaded 1 PC tables (14431 PCs): 14431 [0x959f10,0x992500),
/out/secilc-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Recursive blockinher... | c | 1048f8d329a0e34a2529b3376fb085c5e6b3db0d | https://github.com/SELinuxProject/selinux/commit/eba0ffee01ee11bb4fc3f6505d9cf69693088621 | A heap-use-after-free vulnerability exists in libsepol/cil when using optional blockinherit. When secilc compiles a policy where an optional block contains blockinherit statements, and one of the inherited blocks does not exist, the optional block is disabled at pass 3 (CIL_PASS_BLKIN_LINK). The function __cil_resolve_... |
arvo:30236 | n132/arvo:30236-vul | /src/sudo | [
{
"end_line": 3296,
"function_name": "yyparse",
"start_line": 1401,
"target_file": "/src/sudo/plugins/sudoers/gram.c"
}
] | Heap-double-free | sudo | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4012234423
INFO: Loaded 1 modules (3524 inline 8-bit counters): 3524 [0x841960, 0x842724),
INFO: Loaded 1 PC tables (3524 PCs): 3524 [0x842728,0x850368),
/out/fuzz_sudoers: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
sudoers:2:42: syntax err... | c | d2901f4121e5490f9d1128458a8e229f4870b3cd | https://github.com/sudo-project/sudo/commit/bd4e8bc699ba1355c5579f345b4521017b8454f1 | Options are not removed from the leak list before being freed, which can lead to security vulnerabilities. |
arvo:30253 | n132/arvo:30253-vul | /src/c-blosc2 | [
{
"end_line": 493,
"function_name": "get_header_info",
"start_line": 388,
"target_file": "/src/c-blosc2/blosc/frame.c"
}
] | Memcpy-param-overlap | c-blosc2 | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/decompress_frame_fuzzer < INPUT_FILE
or
/out/decompress_frame_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags... | cpp | e362bb0bed6bbc50062c1a0df6d6f2be273962ba | https://github.com/Blosc/c-blosc2/commit/dd0e099a4cf51ec01064065778b1d3bfb314f201 | null |
arvo:30324 | n132/arvo:30324-vul | /src/libraw | [
{
"end_line": 2064,
"function_name": "LibRaw::apply_tiff",
"start_line": 1517,
"target_file": "/src/libraw/src/metadata/tiff.cpp"
}
] | Heap-buffer-overflow WRITE {*} | libraw | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/libraw_cr2_fuzzer < INPUT_FILE
or
/out/libraw_cr2_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/libra... | cpp | 371161a06d7f98f231a001dad4af2dfb463e270a | https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e | null |
arvo:30340 | n132/arvo:30340-vul | /src/relic | [
{
"end_line": 131,
"function_name": "bn_rsh",
"start_line": 105,
"target_file": "/src/relic/src/bn/relic_bn_shift.c"
}
] | Heap-use-after-free WRITE 8 | relic | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/cryptofuzz-relic
=================================================================
==3603==ERROR: AddressSanitizer: heap-use-after-free on address 0x612000016d30 at pc 0x00000073d737 bp 0x7ffc33ee81f0 sp 0x7ffc33ee81e8
WRITE of size 8 at 0x... | cpp | 1cca0a522ca280c7c8ba5e1288a54d9ecde627b4 | https://github.com/relic-toolkit/relic/commit/e2cb33534a9b9b32dd530d687dada1bafbdf7179 | null |
arvo:30482 | n132/arvo:30482-vul | /src/relic | [
{
"end_line": 137,
"function_name": "bn_mul_karat_imp",
"start_line": 50,
"target_file": "/src/relic/src/bn/relic_bn_mul.c"
}
] | Use-of-uninitialized-value | relic | msan | INFO: found LLVMFuzzerCustomMutator (0x8af560). Disabling -len_control by default.
INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1587390669
INFO: Loaded 1 modules (71869 inline 8-bit counters): 71869 [0x1d14140, 0x1d259fd),
INFO: Loaded 1 PC tables (71869 PCs): 71869 [0x1d25a00,0x1e3e5d0),
/ou... | cpp | bbc7669d7cd5257fd473b7e3b585bb571de28eec | https://github.com/relic-toolkit/relic/commit/0886abbb8596c875ccf25981e4cde3a4dd902365 | null |
arvo:30507 | n132/arvo:30507-vul | /src/serenity | [
{
"end_line": 423,
"function_name": "decode_frame",
"start_line": 308,
"target_file": "/src/serenity/Userland/Libraries/LibGfx/GIFLoader.cpp"
}
] | Global-buffer-overflow READ 4 | serenity | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/FuzzGIFLoader
=================================================================
==1417==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000000625250 at pc 0x00000050b89e bp 0x7ffc76abc6f0 sp 0x7ffc76abc6e8
READ of size 4 at 0x0... | cpp | 9aa91e6c6f267c843b92cf57eeae289ccae82799 | https://github.com/SerenityOS/serenity/commit/ce5fe2a6e807b819866b4f429ca6f7a2d74445b7 | A read buffer overflow occurs in the interlaced GIF decode process within LibGfx, specifically in GIFLoader.cpp at line 402. The previous fix does not fully address the issue, and the vulnerability remains at this location. |
arvo:30684 | n132/arvo:30684-vul | /src/flatbuffers | [
{
"end_line": 1583,
"function_name": "Parser::ParseVector",
"start_line": 1478,
"target_file": "/src/flatbuffers/src/idl_parser.cpp"
}
] | Heap-buffer-overflow WRITE 1 | flatbuffers | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1886682582
INFO: Loaded 1 modules (14511 inline 8-bit counters): 14511 [0x5a1f90, 0x5a583f),
INFO: Loaded 1 PC tables (14511 PCs): 14511 [0x5a5840,0x5de330),
/out/parser_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===================... | cpp | 6f3e45eca1fde7a68cb72fd4499a3647f719c9db | https://github.com/google/flatbuffers/commit/fee095410b0969765b5c2545c10e585f69e961b0 | null |
arvo:30717 | n132/arvo:30717-vul | /src/selinux | [
{
"end_line": 115,
"function_name": "cil_copy_block",
"start_line": 98,
"target_file": "/src/selinux/libsepol/cil/src/cil_copy_ast.c"
}
] | UNKNOWN READ | selinux | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2866085386
INFO: Loaded 1 modules (14867 inline 8-bit counters): 14867 [0x95f310, 0x962d23),
INFO: Loaded 1 PC tables (14867 PCs): 14867 [0x962d28,0x99ce58),
/out/secilc-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DE... | c | b839e9a1cb78d67c18df8b2e75e2fa53cca74392 | https://github.com/SELinuxProject/selinux/commit/d155b410d4bbc90d28f361b966f0429598da8188 | null |
arvo:30748 | n132/arvo:30748-vul | /src/c-blosc2 | [
{
"end_line": 1195,
"function_name": "frame_get_metalayers_from_header",
"start_line": 1086,
"target_file": "/src/c-blosc2/blosc/frame.c"
}
] | Negative-size-param | c-blosc2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 5502380
INFO: Loaded 1 modules (40801 inline 8-bit counters): 40801 [0x873e140, 0x87480a1),
INFO: Loaded 1 PC tables (40801 PCs): 40801 [0x86a08a4,0x86f03ac),
/out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==3726==... | c | 98f51f9f1446e2bb70cf098c860401feed6e3b14 | https://github.com/Blosc/c-blosc2/commit/1f79b650f75becece4a5346f49f29bea71daa72c | A negative-size-param issue occurs when reading content_len in the frame_get_metalayers function, leading to a potential security vulnerability. |
arvo:30752 | n132/arvo:30752-vul | /src/mdbtools | [
{
"end_line": 75,
"function_name": "decompressed_to_utf8_with_iconv",
"start_line": 52,
"target_file": "/src/mdbtools/src/libmdb/iconv.c"
}
] | Segv on unknown address | mdbtools | asan | offset 34360262656 is beyond EOF
Oops! didn't get a full page at 16777472
Warning: defaulting to brute force read
warning: Invalid data location detected in mdb_crack_row.
AddressSanitizer:DEADLYSIGNAL
=================================================================
==27657==ERROR: AddressSanitizer: SEGV on unknown ad... | c | 0e3a627ee6b3828b8dde3a0c105bf73454c45959 | https://github.com/mdbtools/mdbtools/commit/89e23615828ea64af9858e5942d6bc4d82c458a6 | null |
arvo:30775 | n132/arvo:30775-vul | /src/selinux | [
{
"end_line": 2506,
"function_name": "cil_resolve_blockinherit_copy",
"start_line": 2462,
"target_file": "/src/selinux/libsepol/cil/src/cil_resolve_ast.c"
}
] | UNKNOWN READ | selinux | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 404830629
INFO: Loaded 1 modules (15004 inline 8-bit counters): 15004 [0x9cc478, 0x9cff14),
INFO: Loaded 1 PC tables (15004 PCs): 15004 [0x9cff18,0xa0a8d8),
/out/secilc-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:DEAD... | c | 5681c6275b5ad9cf3d84af243a66b900a0628f72 | https://github.com/SELinuxProject/selinux/commit/74d00a8decebf940d95064ff60042dcb2cbcc2c0 | null |
arvo:30800 | n132/arvo:30800-vul | /src/opensc | [
{
"end_line": 1215,
"function_name": "iasecc_process_fci",
"start_line": 1125,
"target_file": "/src/opensc/src/libopensc/card-iasecc.c"
}
] | Stack-buffer-overflow READ 1 | opensc | asan | INFO: Seed: 3675025298
INFO: Loaded 1 modules (21956 inline 8-bit counters): 21956 [0xc0dfe0, 0xc135a4),
INFO: Loaded 1 PC tables (21956 PCs): 21956 [0x8d5368,0x92afa8),
/out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==58... | c | 1252aca9f10771ef5ba8405e73cf2da50827958f | https://github.com/OpenSC/OpenSC/commit/ae1cf0be90396fb6c0be95829bf0d3eecbd2fd1c | A stack buffer overflow occurs in the iasecc module when an empty ACL is returned. |
arvo:30868 | n132/arvo:30868-vul | /src/c-blosc2 | [
{
"end_line": 1494,
"function_name": "frame_get_vlmetalayers",
"start_line": 1436,
"target_file": "/src/c-blosc2/blosc/frame.c"
}
] | Heap-buffer-overflow READ 1 | c-blosc2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3146337438
INFO: Loaded 1 modules (40884 inline 8-bit counters): 40884 [0x8745200, 0x874f1b4),
INFO: Loaded 1 PC tables (40884 PCs): 40884 [0x86a7644,0x86f73e4),
/out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=====... | c | d5622cd1a6247a8740bef1511b8b2b5ed0cfbfcb | https://github.com/Blosc/c-blosc2/commit/767a0d9302dce5d7467014cfd64f91a1b266e6d9 | A heap-buffer-overflow vulnerability exists due to the lack of checks when reading the trailer outside of the frame boundaries. |
arvo:30983 | n132/arvo:30983-vul | /src/ots | [
{
"end_line": 103,
"function_name": "OpenTypeSILF::Parse",
"start_line": 14,
"target_file": "/src/ots/src/silf.cc"
}
] | Use-of-uninitialized-value | ots | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1381650114
INFO: Loaded 1 modules (22754 inline 8-bit counters): 22754 [0xc7ce38, 0xc8271a),
INFO: Loaded 1 PC tables (22754 PCs): 22754 [0xc82720,0xcdb540),
/out/ots-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==999==WARNING: Memory... | cpp | c162298f36fb869769cb04268d9341d13186720a | https://github.com/khaledhosny/ots/commit/6e9a697bd9a76475d2d947fb1a371e8f7a6edb32 | A vulnerability exists in graphite where the decompressed buffer is not zero-initialized. The lz4 library does not fully initialize the buffer, even though it claims the decompressed size matches the requested size. |
arvo:30999 | n132/arvo:30999-vul | /src/php-src | [
{
"end_line": 2391,
"function_name": "increment_string",
"start_line": 2307,
"target_file": "/src/php-src/Zend/zend_operators.c"
}
] | UNKNOWN READ | php-src | msan | INFO: Seed: 1892275911
INFO: Loaded 1 modules (131554 inline 8-bit counters): 131554 [0x1e5b640, 0x1e7b822),
INFO: Loaded 1 PC tables (131554 PCs): 131554 [0x1e7b828,0x207d648),
/out/php-fuzz-execute: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:DEADLYSIGNAL
==141061==ERROR: MemorySanitizer: S... | cpp | 0cdc634fc4f233034c37234d98f5ff3d6cf216b2 | https://github.com/php/php-src/commit/353f7ffb6b3f6e7c3aed8b3ed51182a973e120b8 | A vulnerability exists where the delref operation occurs before successful allocation, which can lead to inconsistent reference counts after an out-of-memory (OOM) condition. This issue is particularly notable in some string/array separation cases. |
arvo:31042 | n132/arvo:31042-vul | /src/sudo | [
{
"end_line": 358,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 186,
"target_file": "/src/sudo/plugins/sudoers/regress/fuzz/fuzz_policy.c"
},
{
"end_line": 990,
"function_name": "set_cmnd",
"start_line": 912,
"target_file": "/src/sudo/plugins/sudoers/sudoers.c"
}
] | UNKNOWN WRITE | sudo | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2360500043
INFO: Loaded 1 modules (5132 inline 8-bit counters): 5132 [0x55f7490cff00, 0x55f7490d130c),
INFO: Loaded 1 PC tables (5132 PCs): 5132 [0x55f7490d1310,0x55f7490e53d0),
/out/fuzz_policy: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
f... | c | c09169e812aac4f54801b6ca2b565fff52ecd518 | https://github.com/sudo-project/sudo/commit/ae3a098d2f0988b63a780523a006a3db8e8b3872 | A vulnerability exists where user_cmnd is not always dynamically allocated, even though it is freed in sudo_user_free(). The policy functions set user_cmnd directly instead of always setting argv. Additionally, sudoers_policy_main() can be called with an argc of 0, which is not intended. |
arvo:31050 | n132/arvo:31050-vul | /src/selinux | [
{
"end_line": 3972,
"function_name": "__cil_resolve_ast_last_child_helper",
"start_line": 3926,
"target_file": "/src/selinux/libsepol/cil/src/cil_resolve_ast.c"
}
] | Use-of-uninitialized-value | selinux | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3472398253
INFO: Loaded 1 modules (14458 inline 8-bit counters): 14458 [0x9b91e8, 0x9bca62),
INFO: Loaded 1 PC tables (14458 PCs): 14458 [0x9bca68,0x9f5208),
/out/secilc-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Failed to resolve c... | c | 038817036f36aadf762c8a3061500903b22b8213 | https://github.com/SELinuxProject/selinux/commit/0451adebdf153eee1f69914141311114a0130982 | null |
arvo:31057 | n132/arvo:31057-vul | /src/selinux | [
{
"end_line": 6566,
"function_name": "cil_build_ast",
"start_line": 6540,
"target_file": "/src/selinux/libsepol/cil/src/cil_build_ast.c"
}
] | Use-of-uninitialized-value | selinux | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2794472240
INFO: Loaded 1 modules (14885 inline 8-bit counters): 14885 [0x9c62c8, 0x9c9ced),
INFO: Loaded 1 PC tables (14885 PCs): 14885 [0x9c9cf0,0xa03f40),
/out/secilc-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==3383==WARNING: Me... | c | 8a74c05b97050bd226d61fc162e04dcdf8e91247 | https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521 | null |
arvo:31065 | n132/arvo:31065-vul | /src/selinux | [
{
"end_line": 58,
"function_name": "cil_reset_classpermission",
"start_line": 51,
"target_file": "/src/selinux/libsepol/cil/src/cil_reset_ast.c"
}
] | Heap-use-after-free READ 8 | selinux | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2283326505
INFO: Loaded 1 modules (14853 inline 8-bit counters): 14853 [0x95f350, 0x962d55),
INFO: Loaded 1 PC tables (14853 PCs): 14853 [0x962d58,0x99cda8),
/out/secilc-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===================... | c | e13c8162656665f9ec1c76a033cae5b011b8c658 | https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3 | A vulnerability exists in libsepol/cil where the classperms list of a classpermission rule is not destroyed when resetting the classpermission. The classperms list is created and filled in when classpermissionset rules are processed, so the classpermission rule does not own any part of the list and should not retain an... |
arvo:31120 | n132/arvo:31120-vul | /src/c-blosc2 | [
{
"end_line": 1752,
"function_name": "get_coffset",
"start_line": 1734,
"target_file": "/src/c-blosc2/blosc/frame.c"
}
] | Heap-use-after-free READ 4 | c-blosc2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1275430309
INFO: Loaded 1 modules (40905 inline 8-bit counters): 40905 [0x8745280, 0x874f249),
INFO: Loaded 1 PC tables (40905 PCs): 40905 [0x86a7bc4,0x86f7a0c),
/out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=====... | cpp | 969fb4cbb617801876fb5ddefc73778935ff1a56 | https://github.com/Blosc/c-blosc2/commit/e411d87705c65db2aafb0e774092fe57647fb31c | A heap-buffer-overflow occurs when reading a chunk outside of the frame boundary, leading to a security vulnerability. |
arvo:31121 | n132/arvo:31121-vul | /src/wireshark | [
{
"end_line": 359,
"function_name": "dissect_vjc_uncomp",
"start_line": 246,
"target_file": "/src/wireshark/epan/dissectors/packet-vj-comp.c"
}
] | Heap-buffer-overflow READ 1 | wireshark | asan | Warning: AFL++ tools will need to set AFL_MAP_SIZE to 383424 to be able to run this instrumented program!
Running LLVMFuzzerInitialize ...
oss-fuzzshark: disabling: udp
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: bgp
oss-fuzzshark: disabling: dhcp
oss-fuzzshark: disabling:... | c | 81cc0ad06cac97ff5fdba3329cc557e05f4dc79f | https://github.com/wireshark/wireshark/commit/72c9b4b1e8e9bb5ae0ffc4493f3fd86b06c014d8 | A vulnerability exists in the VJ compression implementation where, when handling uncompressed packets, there are missing bounds checks before allocating or reading memory. The code allocates memory based on the entire packet contents rather than limiting it to the size of the IP header plus the maximum needed size of t... |
arvo:31124 | n132/arvo:31124-vul | /src/selinux | [
{
"end_line": 40,
"function_name": "cil_reset_perm",
"start_line": 37,
"target_file": "/src/selinux/libsepol/cil/src/cil_reset_ast.c"
}
] | Heap-use-after-free READ 8 | selinux | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 968397115
INFO: Loaded 1 modules (14853 inline 8-bit counters): 14853 [0x95f350, 0x962d55),
INFO: Loaded 1 PC tables (14853 PCs): 14853 [0x962d58,0x99cda8),
/out/secilc-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
====================... | c | f34d3d30c8325e4847a6b696fe7a3936a8a361f3 | https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba | A vulnerability exists in libsepol/cil where the classperm list is not destroyed when resetting map perms. Map perms use the classperms field, which is a pointer to a list of classperms created and added to during the resolution of classmapping rules. Since the map permission does not own the data in the list, failing ... |
arvo:31179 | n132/arvo:31179-vul | /src/leptonica | [
{
"end_line": 33,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 3,
"target_file": "/src/leptonica/prog/fuzzing/flipdetect_fuzzer.cc"
}
] | Use-of-uninitialized-value | leptonica | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2467700698
INFO: Loaded 1 modules (115570 inline 8-bit counters): 115570 [0x1b4c328, 0x1b6869a),
INFO: Loaded 1 PC tables (115570 PCs): 115570 [0x1b686a0,0x1d2bdc0),
/out/flipdetect_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==74808... | cpp | 9ca045147dedbecf48d678bf6885bf2ca62e29dd | https://github.com/DanBloomberg/leptonica/commit/43050bffb966f7438ff177a6f78bc90915889df7 | An uninitialized value is used in the makeOrientDecision() function. |
arvo:31181 | n132/arvo:31181-vul | /src/libraw | [
{
"end_line": 1147,
"function_name": "LibRaw::identify",
"start_line": 179,
"target_file": "/src/libraw/src/metadata/identify.cpp"
}
] | Heap-buffer-overflow READ 1 | libraw | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1900819783
INFO: Loaded 1 modules (18115 inline 8-bit counters): 18115 [0xab77b0, 0xabbe73),
INFO: Loaded 1 PC tables (18115 PCs): 18115 [0x7a5428,0x7ec058),
/out/libraw_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===================... | cpp | 371161a06d7f98f231a001dad4af2dfb463e270a | https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e | null |
arvo:31198 | n132/arvo:31198-vul | /src/wireshark | [
{
"end_line": 77,
"function_name": "subset_find_guint8",
"start_line": 61,
"target_file": "/src/wireshark/epan/tvbuff_subset.c"
}
] | Stack-buffer-overflow WRITE {*} | wireshark | asan | Warning: AFL++ tools will need to set AFL_MAP_SIZE to 385024 to be able to run this instrumented program!
Running LLVMFuzzerInitialize ...
oss-fuzzshark: disabling: udp
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: bgp
oss-fuzzshark: disabling: dhcp
oss-fuzzshark: disabling:... | c | 22cf2cb345b16f9783165e9cfc80ed9a97a11ca0 | https://github.com/wireshark/wireshark/commit/2ba52cdc0e4216dafdfc32498fc0210c99449ec9 | null |
arvo:31250 | n132/arvo:31250-vul | /src/sudo | [
{
"end_line": 89,
"function_name": "set_cmnd_path",
"start_line": 84,
"target_file": "/src/sudo/plugins/sudoers/stubs.c"
}
] | UNKNOWN WRITE | sudo | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_sudoers
=================================================================
==44225==ERROR: AddressSanitizer: attempting double-free on 0x602000000090 in thread T0:
SCARINESS: 42 (double-free)
#0 0x55bb44ad66a2 in free /src/llvm-proj... | c | 5fc6b8c1776bbb35290b8851f2e4bc349c806f3c | https://github.com/sudo-project/sudo/commit/322e0b3693fa43d281ffe082a1e08e523e8dd17f | The set_cmnd_path() stub returns a status of FOUND even though it does not modify user_cmnd, which can lead to incorrect behavior when resetting user_cmnd based on a new runchroot. |
arvo:31276 | n132/arvo:31276-vul | /src/p11-kit | [
{
"end_line": 352,
"function_name": "proto_read_attribute_array",
"start_line": 289,
"target_file": "/src/p11-kit/p11-kit/rpc-server.c"
}
] | UNKNOWN WRITE | p11-kit | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4051609780
INFO: Loaded 1 modules (26595 inline 8-bit counters): 26595 [0x987cc0, 0x98e4a3),
INFO: Loaded 1 PC tables (26595 PCs): 26595 [0x98e4a8,0x9f62d8),
/out/rpc_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanit... | c | 34b568727ff98ebb36f45a3d63c07f165c58219b | https://github.com/p11-glue/p11-kit/commit/b3243a754763f6df19351593781b88e277a324bc | A vulnerability exists in the rpc-server where parsing CKF_ARRAY_ATTRIBUTE allows nested attribute arrays. The current internal API cannot determine the actual size of data that needs to be stored, as ulValueLen is set to the attribute count times sizeof(CK_ATTRIBUTE), leading to potential issues with memory allocation... |
arvo:31301 | n132/arvo:31301-vul | /src/libass | [
{
"end_line": 203,
"function_name": "fnv_32a_buf",
"start_line": 186,
"target_file": "/src/libass/libass/ass_utils.h"
}
] | Heap-buffer-overflow READ 1 | libass | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3069947096
INFO: Loaded 1 modules (33751 inline 8-bit counters): 33751 [0xd28a70, 0xd30e47),
INFO: Loaded 1 PC tables (33751 PCs): 33751 [0xd30e48,0xdb4bb8),
/out/libass_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===================... | cpp | a93e17f5ffe526e68c88d69141dbf495523376e2 | https://github.com/libass/libass/commit/8f987713dd0fa791c5c511c13bb27021fa653fb0 | A crash occurs when the hash function is called with zero-length buffers, as it does not handle empty strings. |
arvo:31306 | n132/arvo:31306-vul | /src/fluent-bit | [
{
"end_line": 190,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 13,
"target_file": "/src/fluent-bit/tests/internal/fuzzers/utils_fuzzer.c"
}
] | UNKNOWN WRITE | fluent-bit | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2730340325
INFO: Loaded 1 modules (2883 inline 8-bit counters): 2883 [0x889260, 0x889da3),
INFO: Loaded 1 PC tables (2883 PCs): 2883 [0x889da8,0x8951d8),
/out/flb-it-fuzz-utils_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
[202... | c | 16f4084f36c78d1c121a78aafb7dc1db5fe699e9 | https://github.com/fluent/fluent-bit/commit/b4036d78e0963f9051bea9501437852d0bf6772e | null |
arvo:31332 | n132/arvo:31332-vul | /src/md4c | [
{
"end_line": 5702,
"function_name": "md_is_container_mark",
"start_line": 5646,
"target_file": "/src/md4c/src/md4c.c"
}
] | Heap-buffer-overflow READ 1 | md4c | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3857336753
INFO: Loaded 1 modules (3223 inline 8-bit counters): 3223 [0x85e0f0, 0x85ed87),
INFO: Loaded 1 PC tables (3223 PCs): 3223 [0x5ec750,0x5f90c0),
/out/fuzz-mdhtml: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=========================... | c | 933388a6573ed04ee267ccfbc0625f6f6306313d | https://github.com/mity/md4c/commit/260cd3394d45bd51f2002936a63401419658ecd7 | A buffer overflow occurs on input in c-string format such as:
"\n# h1\nc hh##e2ked\n\n A | rong__ ___strong \u0000\u0000\u0000\u0000\u0000\u0000\a\u0000\u0000\u0000\u0000\n# h1\nh# #2\n### h3\n#### h4\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\\\n##### h5\n#*#####\u0000\n6" |
arvo:31333 | n132/arvo:31333-vul | /src/md4c | [
{
"end_line": 2351,
"function_name": "md_is_inline_link_spec",
"start_line": 2256,
"target_file": "/src/md4c/src/md4c.c"
}
] | Heap-buffer-overflow READ 1 | md4c | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2686091767
INFO: Loaded 1 modules (3224 inline 8-bit counters): 3224 [0x85e0f0, 0x85ed88),
INFO: Loaded 1 PC tables (3224 PCs): 3224 [0x5ec770,0x5f90f0),
/out/fuzz-mdhtml: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=========================... | c | eeb32ecc9ed35615226cb11f112d34b46c9b204a | https://github.com/mity/md4c/commit/f436c3029850c138e54a0de055d61db45130409e | null |
arvo:31340 | n132/arvo:31340-vul | /src/libiec61850 | [
{
"end_line": 59,
"function_name": "getIndefiniteLength",
"start_line": 27,
"target_file": "/src/libiec61850/src/mms/asn1/ber_decode.c"
}
] | Heap-buffer-overflow READ 1 | libiec61850 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3278931693
INFO: Loaded 1 modules (1218 inline 8-bit counters): 1218 [0x7d2db0, 0x7d3272),
INFO: Loaded 1 PC tables (1218 PCs): 1218 [0x58a688,0x58f2a8),
/out/fuzz_mms_decode: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=====================... | c | 22580c5aa121aeb8c03834503c4aeb58600bd866 | https://github.com/mz-automation/libiec61850/commit/aac6caaa22c2c6f017d3926856c54646155ff898 | null |
arvo:31419 | n132/arvo:31419-vul | /src/libredwg | [
{
"end_line": 61,
"function_name": "enforce_null_termination",
"start_line": 43,
"target_file": "/src/libredwg/examples/llvmfuzz.c"
}
] | Heap-buffer-overflow READ 7 | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2296933256
INFO: Loaded 1 modules (459887 inline 8-bit counters): 459887 [0x420c3a0, 0x427c80f),
INFO: Loaded 1 PC tables (459887 PCs): 459887 [0x369a170,0x3d9e860),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | c | 6a9a54104842850c7c193d82dc9250c0edf12ee9 | https://github.com/LibreDWG/libredwg/commit/df82e56d5561e05529dff3369106f08a647b8a8a | null |
arvo:31425 | n132/arvo:31425-vul | /src/libredwg | [
{
"end_line": 1539,
"function_name": "decode_R13_R2000",
"start_line": 819,
"target_file": "/src/libredwg/src/decode.c"
}
] | Heap-buffer-overflow READ 16 | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1020800887
INFO: Loaded 1 modules (381900 inline 8-bit counters): 381900 [0x3581230, 0x35de5fc),
INFO: Loaded 1 PC tables (381900 PCs): 381900 [0x2b85e30,0x3159af0),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | c | 1b908d0d9eb2da3ada7f1f3caf067fc0041dfc3d | https://github.com/LibreDWG/libredwg/commit/5bffcdd304f3a4be044dcfb89ca16839c2cceee6 | A vulnerability exists in the decode_R13_2000 function in the decode module, where invalid classes are not properly checked. |
arvo:31509 | n132/arvo:31509-vul | /src/fluent-bit | [
{
"end_line": 200,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 13,
"target_file": "/src/fluent-bit/tests/internal/fuzzers/utils_fuzzer.c"
}
] | UNKNOWN READ | fluent-bit | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3900441783
INFO: Loaded 1 modules (5996 inline 8-bit counters): 5996 [0x7d1360, 0x7d2acc),
INFO: Loaded 1 PC tables (5996 PCs): 5996 [0x7d2ad0,0x7ea190),
/out/flb-it-fuzz-utils_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
[202... | cpp | 7803d59d9d64ffcfd205a3ad5679eeb86c3138ce | https://github.com/fluent/fluent-bit/commit/c62ad5a5f315af1c09894ccb9ae55b31b27a964f | null |
arvo:31540 | n132/arvo:31540-vul | /src/opensc | [
{
"end_line": 738,
"function_name": "sc_pkcs15emu_oberthur_add_cert",
"start_line": 656,
"target_file": "/src/opensc/src/libopensc/pkcs15-oberthur.c"
}
] | Heap-buffer-overflow READ {*} | opensc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader
=================================================================
==58073==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60600000011c at pc 0x000000499097 bp 0x7ffe4bc7afb0 sp 0x7ffe4bc7a778
READ of size 254 ... | c | 4512676795e094ad68f41e32e9b553cc30c5f87b | https://github.com/OpenSC/OpenSC/commit/40c50a3a4219308aae90f6efd7b10213794a8d86 | null |
arvo:31552 | n132/arvo:31552-vul | /src/c-blosc2 | [
{
"end_line": 1458,
"function_name": "blosc_d",
"start_line": 1202,
"target_file": "/src/c-blosc2/blosc/blosc2.c"
}
] | UNKNOWN READ | c-blosc2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3859443853
INFO: Loaded 1 modules (40930 inline 8-bit counters): 40930 [0x8747280, 0x8751262),
INFO: Loaded 1 PC tables (40930 PCs): 40930 [0x86a9cc4,0x86f9bd4),
/out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Addre... | c | 2324c9516ee9ea321d312b28a644236aa9ee1d9d | https://github.com/Blosc/c-blosc2/commit/6c7e68cbd611d9a19808c29417eb731e1b4eb829 | null |
arvo:31591 | n132/arvo:31591-vul | /src/libredwg | [
{
"end_line": 78,
"function_name": "bit_advance_position",
"start_line": 54,
"target_file": "/src/libredwg/src/bits.c"
}
] | Heap-buffer-overflow READ 1 | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2218255303
INFO: Loaded 1 modules (503763 inline 8-bit counters): 503763 [0x4755ec0, 0x47d0e93),
INFO: Loaded 1 PC tables (503763 PCs): 503763 [0x3b18c10,0x42c8940),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | c | bb967665384d2f2539f81d773d0c8099e6e30aa3 | https://github.com/LibreDWG/libredwg/commit/259072193fa0562587b3d971adb949aea3887091 | null |
arvo:31705 | n132/arvo:31705-vul | /src/c-blosc2 | [
{
"end_line": 2043,
"function_name": "frame_get_lazychunk",
"start_line": 1877,
"target_file": "/src/c-blosc2/blosc/frame.c"
}
] | Invalid-free | c-blosc2 | asan | =================================================================
==6313==ERROR: AddressSanitizer: attempting free on address which was not malloc()-ed: 0x7f0bfa0cc85e in thread T0
SCARINESS: 40 (bad-free)
#0 0x49eac2 in free /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:127:3
#1 0x5f34f2 in fram... | c | 776beaf88a7f32ca09ba1d5abc8c7ac4d9144d48 | https://github.com/Blosc/c-blosc2/commit/1a79d783cc791faf12fa9f6f6f92c26fb8be4967 | A null-dereference read occurs when attempting to free a chunk that has already been freed, leading to a security vulnerability. |
arvo:31741 | n132/arvo:31741-vul | /src/libredwg | [
{
"end_line": 78,
"function_name": "bit_advance_position",
"start_line": 54,
"target_file": "/src/libredwg/src/bits.c"
}
] | Heap-buffer-overflow READ 1 | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2034097672
INFO: Loaded 1 modules (503763 inline 8-bit counters): 503763 [0x4755ec0, 0x47d0e93),
INFO: Loaded 1 PC tables (503763 PCs): 503763 [0x3b18c10,0x42c8940),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | c | bb967665384d2f2539f81d773d0c8099e6e30aa3 | https://github.com/LibreDWG/libredwg/commit/259072193fa0562587b3d971adb949aea3887091 | null |
arvo:31789 | n132/arvo:31789-vul | /src/libredwg | [
{
"end_line": 246,
"function_name": "dxf_skip_ws",
"start_line": 226,
"target_file": "/src/libredwg/src/in_dxf.c"
}
] | Heap-buffer-overflow READ 1 | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4196862596
INFO: Loaded 1 modules (400608 inline 8-bit counters): 400608 [0x375b1a0, 0x37bce80),
INFO: Loaded 1 PC tables (400608 PCs): 400608 [0x2d19570,0x3336370),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | c | c7c28820892b3ca75960e621a4413dca3fe70b99 | https://github.com/LibreDWG/libredwg/commit/1f291651e70ebe7a2b808e1f6ae4f15770aeeea8 | A vulnerability exists in the indxf module where the dxf_skip_ws function lacks sufficient overflow protection, potentially leading to security issues. |
arvo:31902 | n132/arvo:31902-vul | /src/gpac | [
{
"end_line": 232,
"function_name": "abst_box_read",
"start_line": 76,
"target_file": "/src/gpac/src/isomedia/box_code_adobe.c"
}
] | Heap-buffer-overflow READ 9 | gpac | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1305510858
INFO: Loaded 1 modules (187168 inline 8-bit counters): 187168 [0x1ccf5d0, 0x1cfd0f0),
INFO: Loaded 1 PC tables (187168 PCs): 187168 [0x1cfd0f0,0x1fd82f0),
/out/fuzz_parse: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==============... | c | 05f453ec48710066582e3c3f4b71f6a9dc849f2a | https://github.com/gpac/gpac/commit/758135e91e623d7dfe7f6aaad7aeb3f791b7a4e5 | null |
arvo:31961 | n132/arvo:31961-vul | /src/binutils-gdb | [
{
"end_line": 9907,
"function_name": "print_insn",
"start_line": 9388,
"target_file": "/src/binutils-gdb/opcodes/i386-dis.c"
}
] | Global-buffer-overflow WRITE 4 | binutils-gdb | asan | Warning: AFL++ tools will need to set AFL_MAP_SIZE to 175744 to be able to run this instrumented program!
=================================================================
==299771==ERROR: AddressSanitizer: global-buffer-overflow on address 0x00000515a6dc at pc 0x000000709458 bp 0x7ffc53776d10 sp 0x7ffc53776d08
WRITE o... | c | 68cb21837f09fd9c12fe4ced7b14f892be929c4f | https://github.com/bminor/binutils-gdb/commit/78c84bf926fc263a588c96c7cd313fb9a9988b4b | A vulnerability exists in i386-dis.c within the print_insn function, where incorrect decoding of nop/reserved space (0f18 ... 0x1f) occurs due to a typo. |
arvo:31985 | n132/arvo:31985-vul | /src/libraw | [
{
"end_line": 1147,
"function_name": "LibRaw::identify",
"start_line": 179,
"target_file": "/src/libraw/src/metadata/identify.cpp"
}
] | Use-of-uninitialized-value | libraw | msan | INFO: Seed: 792883694
INFO: Loaded 1 modules (18059 inline 8-bit counters): 18059 [0xba1c30, 0xba62bb),
INFO: Loaded 1 PC tables (18059 PCs): 18059 [0x8b9168,0x8ffa18),
/out/libraw_cr2_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
unknown file: data corrupted at 564
==54052==WARNING: MemorySanitizer: u... | cpp | 371161a06d7f98f231a001dad4af2dfb463e270a | https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e | null |
arvo:32040 | n132/arvo:32040-vul | /src/c-blosc2 | [
{
"end_line": 746,
"function_name": "blosc_read_header",
"start_line": 668,
"target_file": "/src/c-blosc2/blosc/blosc2.c"
}
] | Heap-buffer-overflow WRITE 2 | c-blosc2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2191174504
INFO: Loaded 1 modules (40507 inline 8-bit counters): 40507 [0x874a520, 0x875435b),
INFO: Loaded 1 PC tables (40507 PCs): 40507 [0x86ace64,0x86fc03c),
/out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=====... | c | f1f42afb9a7f6b554a71270e5060dc7d33b66145 | https://github.com/Blosc/c-blosc2/commit/e670bb4036fd7c840b1c206b8739f292346b1aa9 | null |
arvo:32068 | n132/arvo:32068-vul | /src/c-blosc2 | [
{
"end_line": 1596,
"function_name": "init_thread_context",
"start_line": 1559,
"target_file": "/src/c-blosc2/blosc/blosc2.c"
}
] | UNKNOWN READ | c-blosc2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4096146152
INFO: Loaded 1 modules (40971 inline 8-bit counters): 40971 [0x87482e0, 0x87522eb),
INFO: Loaded 1 PC tables (40971 PCs): 40971 [0x86aaa04,0x86faa5c),
/out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Addre... | cpp | 27b004bf27c9879226da557b6055e3f151af8a9a | https://github.com/Blosc/c-blosc2/commit/91789b65699fed69b8e31b22b3c02d435b38a24b | null |
arvo:32092 | n132/arvo:32092-vul | /src/selinux | [
{
"end_line": 115,
"function_name": "cil_copy_block",
"start_line": 98,
"target_file": "/src/selinux/libsepol/cil/src/cil_copy_ast.c"
}
] | Heap-buffer-overflow READ 8 | selinux | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1419082038
INFO: Loaded 1 modules (14867 inline 8-bit counters): 14867 [0x95f310, 0x962d23),
INFO: Loaded 1 PC tables (14867 PCs): 14867 [0x962d28,0x99ce58),
/out/secilc-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===================... | c | b839e9a1cb78d67c18df8b2e75e2fa53cca74392 | https://github.com/SELinuxProject/selinux/commit/d155b410d4bbc90d28f361b966f0429598da8188 | null |
arvo:32140 | n132/arvo:32140-vul | /src/c-blosc2 | [
{
"end_line": 746,
"function_name": "blosc_read_header",
"start_line": 668,
"target_file": "/src/c-blosc2/blosc/blosc2.c"
}
] | Negative-size-param | c-blosc2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3649389301
INFO: Loaded 1 modules (40507 inline 8-bit counters): 40507 [0x874a520, 0x875435b),
INFO: Loaded 1 PC tables (40507 PCs): 40507 [0x86ace64,0x86fc03c),
/out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=====... | c | f1f42afb9a7f6b554a71270e5060dc7d33b66145 | https://github.com/Blosc/c-blosc2/commit/e670bb4036fd7c840b1c206b8739f292346b1aa9 | null |
arvo:32149 | n132/arvo:32149-vul | /src/opensc | [
{
"end_line": 647,
"function_name": "sc_pkcs15emu_oberthur_add_pubkey",
"start_line": 570,
"target_file": "/src/opensc/src/libopensc/pkcs15-oberthur.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader
=================================================================
==58074==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000000501 at pc 0x0000009d8833 bp 0x7ffe52a79bd0 sp 0x7ffe52a79bc8
READ of size 1 at... | c | fc0df4e5d578e5926a59dbf3a34ce737424464ba | https://github.com/OpenSC/OpenSC/commit/05648b0604bf3e498e8d42dff3c6e7c56a5bf749 | null |
arvo:32177 | n132/arvo:32177-vul | /src/selinux | [
{
"end_line": 67,
"function_name": "cil_reset_classperms_set",
"start_line": 60,
"target_file": "/src/selinux/libsepol/cil/src/cil_reset_ast.c"
}
] | Heap-use-after-free READ 8 | selinux | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2463731698
INFO: Loaded 1 modules (14853 inline 8-bit counters): 14853 [0x95f350, 0x962d55),
INFO: Loaded 1 PC tables (14853 PCs): 14853 [0x962d58,0x99cda8),
/out/secilc-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===================... | c | 2d35fcc7e9e976a2346b1de20e54f8663e8a6cba | https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8 | A vulnerability exists in libsepol/cil where the function cil_reset_classperms_set() resets the classpermission pointed to by the set field in struct cil_classperms_set. Since cil_classperms_set does not create the cil_classpermission, it should not reset it, as this can lead to unintended side effects. The set field i... |
arvo:32178 | n132/arvo:32178-vul | /src/pcl | [
{
"end_line": 324,
"function_name": "PLYReader::vertexListPropertyContentCallback",
"start_line": 310,
"target_file": "/src/pcl/io/src/ply_io.cpp"
}
] | Container-overflow WRITE 4 | pcl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3844587475
INFO: Loaded 1 modules (17059 inline 8-bit counters): 17059 [0xa174f0, 0xa1b793),
INFO: Loaded 1 PC tables (17059 PCs): 17059 [0xa1b798,0xa5e1c8),
/out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===============... | cpp | 09e914b0b3b13c07710e814d71df3ff958945ba3 | https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae | null |
arvo:32184 | n132/arvo:32184-vul | /src/pcl | [
{
"end_line": 134,
"function_name": "pcl::PLYReader::amendProperty",
"start_line": 117,
"target_file": "/src/pcl/io/src/ply_io.cpp"
}
] | Heap-buffer-overflow READ 1 | pcl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 377556916
INFO: Loaded 1 modules (17057 inline 8-bit counters): 17057 [0xa174b0, 0xa1b751),
INFO: Loaded 1 PC tables (17057 PCs): 17057 [0xa1b758,0xa5e168),
/out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
[pcl::PLYReader]... | cpp | 4fe0737e913421c21744213cd22f165184bfb608 | https://github.com/PointCloudLibrary/pcl/commit/7d52b107223ef8adec990608e8685392b48d79c6 | null |
arvo:32202 | n132/arvo:32202-vul | /src/opensc | [
{
"end_line": 651,
"function_name": "sc_pkcs15emu_oberthur_add_pubkey",
"start_line": 571,
"target_file": "/src/opensc/src/libopensc/pkcs15-oberthur.c"
}
] | Heap-buffer-overflow READ {*} | opensc | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader
=================================================================
==58076==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000000500 at pc 0x000000499097 bp 0x7ffd5d9ac350 sp 0x7ffd5d9abb18
READ of size 254 ... | c | 715c17c469f6c463dd511a5deb229da4de9ee100 | https://github.com/OpenSC/OpenSC/commit/5d4daf6c92e4668f5458f380f3cacea3e879d91a | A buffer overflow exists in the oberthur module due to an overlooked boundary check. |
arvo:32221 | n132/arvo:32221-vul | /src/pcl | [
{
"end_line": 324,
"function_name": "PLYReader::vertexListPropertyContentCallback",
"start_line": 310,
"target_file": "/src/pcl/io/src/ply_io.cpp"
}
] | UNKNOWN READ | pcl | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3422014972
INFO: Loaded 1 modules (23077 inline 8-bit counters): 23077 [0x958fb0, 0x95e9d5),
INFO: Loaded 1 PC tables (23077 PCs): 23077 [0x95e9d8,0x9b8c28),
/out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
[pcl::PLYReader... | cpp | 09e914b0b3b13c07710e814d71df3ff958945ba3 | https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae | null |
arvo:32275 | n132/arvo:32275-vul | /src/libredwg | [
{
"end_line": 12295,
"function_name": "dxf_objects_read",
"start_line": 12260,
"target_file": "/src/libredwg/src/in_dxf.c"
}
] | Heap-use-after-free READ 2 | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2536706859
INFO: Loaded 1 modules (470720 inline 8-bit counters): 470720 [0x435c8e0, 0x43cf7a0),
INFO: Loaded 1 PC tables (470720 PCs): 470720 [0x37c3290,0x3ef1e90),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | c | 23a5dd6de69ea81f79948e620306248c51b5f034 | https://github.com/LibreDWG/libredwg/commit/5b27162afa44042bd43dec3fed8a1177c2c43ebb | A use-after-free vulnerability exists in the handling of the indxf structure, where the code frees only the pair instead of properly managing memory, leading to potential access of freed memory. |
arvo:32451 | n132/arvo:32451-vul | /src/wuffs | [
{
"end_line": 16638,
"function_name": "wuffs_base__pixel_swizzler__bgr__bgra_premul__src",
"start_line": 16610,
"target_file": "/src/wuffs/release/c/wuffs-unsupported-snapshot.c"
}
] | UNKNOWN WRITE | wuffs | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2875110902
INFO: Loaded 1 modules (2050 inline 8-bit counters): 2050 [0x8232ef0, 0x82336f2),
INFO: Loaded 1 PC tables (2050 PCs): 2050 [0x81ece98,0x81f0ea8),
/out/pixel_swizzler_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSani... | c | 77bbe685bfc2d2eca7862336945ccb019918686b | https://github.com/google/wuffs/commit/b645180357d2ba2a5dcd610fff4ffe2872540dad | null |
arvo:32482 | n132/arvo:32482-vul | /src/lxc | [
{
"end_line": 711,
"function_name": "lxc_safe_int64_residual",
"start_line": 668,
"target_file": "/src/lxc/src/lxc/string_utils.c"
}
] | Use-of-uninitialized-value | lxc | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2714421070
INFO: Loaded 1 modules (18982 inline 8-bit counters): 18982 [0xac99f8, 0xace41e),
INFO: Loaded 1 PC tables (18982 PCs): 18982 [0xace420,0xb18680),
/out/fuzz-lxc-config-read: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialize... | c | 6a374b65e718d24b3764588d159175222de70e1f | https://github.com/lxc/lxc/commit/c45833e39c85c5e16270aa4122b1929dd086127a | The lxc_safe_int64_residual() function in string_utils does not always memset the buffer, which may lead to security vulnerabilities. |
arvo:32521 | n132/arvo:32521-vul | /src/lxc | [
{
"end_line": 1056,
"function_name": "rt_sig_num",
"start_line": 1025,
"target_file": "/src/lxc/src/lxc/confile_utils.c"
}
] | Heap-buffer-overflow READ 1 | lxc | asan | =================================================================
==88795==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60400000003b at pc 0x0000005d7bc1 bp 0x7ffc0337ef40 sp 0x7ffc0337ef38
READ of size 1 at 0x60400000003b thread T0
SCARINESS: 12 (1-byte-read-heap-buffer-overflow)
#0 0x5d7bc0 in rt_si... | c | c04f422182501585e2e92a238dc416ce21ff077d | https://github.com/lxc/lxc/commit/b8e539f44814cd1760c7dc21c027d7e6c51b72fd | A vulnerability exists in confile_utils where real-time signal parsing is incorrect, potentially leading to improper handling of signals. |
arvo:3257 | n132/arvo:3257-vul | /src/librawspeed | [
{
"end_line": 226,
"function_name": "SamsungV0Decompressor::decompressStrip",
"start_line": 125,
"target_file": "/src/librawspeed/src/librawspeed/decompressors/SamsungV0Decompressor.cpp"
}
] | Use-after-poison READ 2 | librawspeed | asan | INFO: Seed: 894000248
INFO: Loaded 1 modules (13457 guards): 13457 [0xafe450, 0xb0b694),
/out/TiffDecoderFuzzer-SrwDecoder: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==3418==ERROR: AddressSanitizer: use-after-poison on address 0x613000000088 ... | cpp | 84a13edad484015fe153120fc65f276f98288e65 | https://github.com/darktable-org/rawspeed/commit/7d47c5de57aa4abdc6e7426756601a0a55efc7df | The SamsungV0Decompressor allows upward prediction for the last block, which is invalid because 16 pixels of the row are processed at a time, but the line size is not guaranteed to be a multiple of 16. This can lead to incorrect processing for the last block. In the downward case, conditional writing prevents this issu... |
arvo:32638 | n132/arvo:32638-vul | /src/libvips | [
{
"end_line": 219,
"function_name": "lzw__next_code",
"start_line": 155,
"target_file": "/src/libvips/libvips/foreign/libnsgif/lzw.c"
}
] | Heap-buffer-overflow READ 1 | libvips | asan | Warning: AFL++ tools will need to set AFL_MAP_SIZE to 78464 to be able to run this instrumented program!
Running LLVMFuzzerInitialize ...
continue...
=================================================================
==128888==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62a000005249 at pc 0x000000fb3ca1 b... | c | 77ccd04cbe3939c5680b1b4e0aeebbb71febd6d8 | https://github.com/libvips/libvips/commit/9f15567f2cf9388aa0f180c3f33e4d24989f1edf | null |
arvo:3265 | n132/arvo:3265-vul | /src/librawspeed | [
{
"end_line": 317,
"function_name": "SamsungV2Decompressor::decompressRow",
"start_line": 162,
"target_file": "/src/librawspeed/src/librawspeed/decompressors/SamsungV2Decompressor.cpp"
}
] | Use-after-poison READ 2 | librawspeed | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/TiffDecoderFuzzer-SrwDecoder < INPUT_FILE
or
/out/TiffDecoderFuzzer-SrwDecoder INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz ... | cpp | 648eef8958198e9b919f8394b73bcbb4d360b6bf | https://github.com/darktable-org/rawspeed/commit/2ea14db02b9003eed69cdf66eeaae98a70c69b03 | In SamsungV2Decompressor::decompressRow(), during the "complex case" for the first 16 pixels of a row, motion (and thus slideOffset) may cause refpixel to point outside the row bounds. |
arvo:32807 | n132/arvo:32807-vul | /src/opensc | [
{
"end_line": 1010,
"function_name": "sc_pkcs15emu_oberthur_add_data",
"start_line": 906,
"target_file": "/src/opensc/src/libopensc/pkcs15-oberthur.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | =================================================================
==58084==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000067d at pc 0x000000ea7f0b bp 0x7ffe477aeb30 sp 0x7ffe477aeb28
READ of size 1 at 0x60200000067d thread T0
SCARINESS: 12 (1-byte-read-heap-buffer-overflow)
#0 0xea7f0a in sc_pk... | c | 4b3c6dec07c2bd81b4989e378829e1124abff134 | https://github.com/OpenSC/OpenSC/commit/cae5c71f90cc5b364efe14040923fd5aa3b5dd90 | The oberthur module does not handle 1B OIDs, which can lead to a security vulnerability. |
arvo:3285 | n132/arvo:3285-vul | /src/openthread | [
{
"end_line": 296,
"function_name": "Leader::HandleCommissioningSet",
"start_line": 199,
"target_file": "/src/openthread/src/core/thread/network_data_leader_ftd.cpp"
}
] | Stack-buffer-overflow READ 1 | openthread | asan | INFO: Seed: 485891961
INFO: Loaded 1 modules (12962 guards): 12962 [0x9cd3d0, 0x9d9e58),
/out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==15240:15240==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fa92184571f a... | cpp | 606044814001a0ddaa44471ac77753ca32ded712 | https://github.com/openthread/openthread/commit/9f73f679508490ce5e2c5e0f7c3d7c52cbafa93c | null |
arvo:33041 | n132/arvo:33041-vul | /src/libucl | [
{
"end_line": 1956,
"function_name": "ucl_inherit_handler",
"start_line": 1908,
"target_file": "/src/libucl/src/ucl_util.c"
}
] | Heap-buffer-overflow READ 6 | libucl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3018099703
INFO: Loaded 1 modules (3063 inline 8-bit counters): 3063 [0x80aa30, 0x80b627),
INFO: Loaded 1 PC tables (3063 PCs): 3063 [0x5b5d98,0x5c1d08),
/out/ucl_add_string_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===============... | cpp | 3a94514709b7d0d3420f96549172059bfaac2b65 | https://github.com/vstakhov/libucl/commit/54a5b5943b49060d4ca7b345bc80f9b0cb2cdc94 | null |
arvo:3305 | n132/arvo:3305-vul | /src/openjpeg | [
{
"end_line": 2093,
"function_name": "opj_tcd_mct_decode",
"start_line": 1956,
"target_file": "/src/openjpeg/src/lib/openjp2/tcd.c"
}
] | Heap-buffer-overflow READ 4 | openjpeg | asan | INFO: Seed: 3164882130
INFO: Loaded 1 modules (6954 guards): 6954 [0x98c040, 0x992ce8),
/out/opj_decompress_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==1820==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000dc4 at p... | cpp | c67e1cd73f6c1fca081f5445af4f65b240c40edc | https://github.com/uclouvain/openjpeg/commit/cc893a4ebfaf8c42cf1221ac82c83df91e77340b | The function opj_tcd_mct_decode() contains insufficient checks to verify that MCT can be performed safely, potentially leading to a security vulnerability. |
arvo:33059 | n132/arvo:33059-vul | /src/libredwg | [
{
"end_line": 1313,
"function_name": "dxf_header_read",
"start_line": 1045,
"target_file": "/src/libredwg/src/in_dxf.c"
},
{
"end_line": 1161,
"function_name": "SUMMARY_T",
"start_line": 1137,
"target_file": "/src/libredwg/src/in_dxf.c"
}
] | Segv on unknown address | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2684472352
INFO: Loaded 1 modules (503763 inline 8-bit counters): 503763 [0x4755ec0, 0x47d0e93),
INFO: Loaded 1 PC tables (503763 PCs): 503763 [0x3b18bf0,0x42c8920),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer... | c | 0880ca6688895e79c3672ea4bce906039bca744e | https://github.com/LibreDWG/libredwg/commit/bb967665384d2f2539f81d773d0c8099e6e30aa3 | A segmentation fault occurs on an unknown address in `dwg_free_summaryinfo` due to `dwg.summaryinfo.props[0].value` being an uninitialized pointer. This happens when `dwg_read_dxf` fails and creates a partially initialized summary info object. |
arvo:33069 | n132/arvo:33069-vul | /src/wasm3 | [
{
"end_line": 119,
"function_name": "ParseSection_Type",
"start_line": 40,
"target_file": "/src/wasm3/source/m3_parse.c"
}
] | Use-of-uninitialized-value | wasm3 | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 229980027
INFO: Loaded 1 modules (3077 inline 8-bit counters): 3077 [0x82f4e8, 0x8300ed),
INFO: Loaded 1 PC tables (3077 PCs): 3077 [0x5d6668,0x5e26b8),
/out/fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==1290==WARNING: MemorySanitize... | c | 9d5474209e5d23398cfe74a75f248f98db60f128 | https://github.com/wasm3/wasm3/commit/e7084d13903029784f74706cd8fdd70277d2ecab | null |
arvo:33085 | n132/arvo:33085-vul | /src/wasm3 | [
{
"end_line": 2247,
"function_name": "Compile_BlockStatements",
"start_line": 2206,
"target_file": "/src/wasm3/source/m3_compile.c"
},
{
"end_line": 340,
"function_name": "EvaluateExpression",
"start_line": 270,
"target_file": "/src/wasm3/source/m3_env.c"
}
] | Use-of-uninitialized-value | wasm3 | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3372437959
INFO: Loaded 1 modules (3069 inline 8-bit counters): 3069 [0x82e4a0, 0x82f09d),
INFO: Loaded 1 PC tables (3069 PCs): 3069 [0x5d63f8,0x5e23c8),
/out/fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==1290==WARNING: MemorySanitiz... | c | 6e23938356d3cdbfaa9273c3955b3accf5afa038 | https://github.com/wasm3/wasm3/commit/79255ba1dbbb476e57a5f450eb0bbe1b84ef0f01 | null |
arvo:33150 | n132/arvo:33150-vul | /src/libredwg | [
{
"end_line": 12017,
"function_name": "dxf_tables_read",
"start_line": 11862,
"target_file": "/src/libredwg/src/in_dxf.c"
}
] | Object-size | libredwg | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4074967026
INFO: Loaded 1 modules (900852 inline 8-bit counters): 900852 [0x4385208, 0x44610fc),
INFO: Loaded 1 PC tables (900852 PCs): 900852 [0x26b37d8,0x3472718),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehavio... | c | 67beaabb175760ba0a3a061425045b9a5ae12775 | https://github.com/LibreDWG/libredwg/commit/b37f533870d4921888cbbd633a738d3e6e95109e | The indxf module contains multiple NULL pointer dereferences of _ctrl->entries, which can lead to security vulnerabilities. |
arvo:33196 | n132/arvo:33196-vul | /src/wasm3 | [
{
"end_line": 2247,
"function_name": "Compile_BlockStatements",
"start_line": 2206,
"target_file": "/src/wasm3/source/m3_compile.c"
},
{
"end_line": 340,
"function_name": "EvaluateExpression",
"start_line": 270,
"target_file": "/src/wasm3/source/m3_env.c"
}
] | Heap-buffer-overflow WRITE 4 | wasm3 | asan | =================================================================
==432==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000020 at pc 0x0000004ea145 bp 0x7fffc8afc270 sp 0x7fffc8afc268
WRITE of size 4 at 0x602000000020 thread T0
SCARINESS: 46 (4-byte-write-heap-buffer-overflow-far-from-bounds)
#0 0... | c | 6e23938356d3cdbfaa9273c3955b3accf5afa038 | https://github.com/wasm3/wasm3/commit/79255ba1dbbb476e57a5f450eb0bbe1b84ef0f01 | null |
arvo:33217 | n132/arvo:33217-vul | /src/pcl | [
{
"end_line": 409,
"function_name": "pcl::PLYReader::vertexAlphaCallback",
"start_line": 399,
"target_file": "/src/pcl/io/src/ply_io.cpp"
}
] | Heap-buffer-overflow WRITE 4 | pcl | asan | [pcl::PLYReader] /tmp/libfuzzer.880:3: ignoring line 'propertyAuiply'
[pcl::PLYReader] /tmp/libfuzzer.880:7: ignoring line 'proxerlplyveret2'
[pcl::PLYReader] /tmp/libfuzzer.880:8: ignoring line 'pro
[pcl::PLYReader] /tmp/libfuzzer.880:9: ignoring line '0lemr.face 13'
===================================================... | cpp | 09e914b0b3b13c07710e814d71df3ff958945ba3 | https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae | null |
arvo:3322 | n132/arvo:3322-vul | /src/openthread | [
{
"end_line": 296,
"function_name": "Leader::HandleCommissioningSet",
"start_line": 199,
"target_file": "/src/openthread/src/core/thread/network_data_leader_ftd.cpp"
}
] | Stack-buffer-overflow READ 2 | openthread | asan | INFO: Seed: 2587289480
INFO: Loaded 1 modules (12962 guards): 12962 [0x9cd3d0, 0x9d9e58),
/out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==15237:15237==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f50a528071f ... | cpp | 606044814001a0ddaa44471ac77753ca32ded712 | https://github.com/openthread/openthread/commit/9f73f679508490ce5e2c5e0f7c3d7c52cbafa93c | null |
arvo:33237 | n132/arvo:33237-vul | /src/wasm3 | [
{
"end_line": 481,
"function_name": "InitDataSegments",
"start_line": 455,
"target_file": "/src/wasm3/source/m3_env.c"
}
] | Heap-buffer-overflow READ {*} | wasm3 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3385261926
INFO: Loaded 1 modules (3062 inline 8-bit counters): 3062 [0x825300, 0x825ef6),
INFO: Loaded 1 PC tables (3062 PCs): 3062 [0x5c9cb8,0x5d5c18),
/out/fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==============================... | c | 970849df176802c871eb0fd512f1e2b4d39d105b | https://github.com/wasm3/wasm3/commit/a6b4a11f80a05a17995a036b643c37adb3c3dc62 | null |
arvo:33240 | n132/arvo:33240-vul | /src/wasm3 | [
{
"end_line": 118,
"function_name": "ParseSection_Type",
"start_line": 40,
"target_file": "/src/wasm3/source/m3_parse.c"
}
] | Heap-buffer-overflow WRITE 1 | wasm3 | asan | =================================================================
==431==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000020 at pc 0x0000004d8d4a bp 0x7fff5fa7f8f0 sp 0x7fff5fa7f8e8
WRITE of size 1 at 0x602000000020 thread T0
SCARINESS: 31 (1-byte-write-heap-buffer-overflow)
#0 0x4d8d49 in Parse... | c | 970849df176802c871eb0fd512f1e2b4d39d105b | https://github.com/wasm3/wasm3/commit/a6b4a11f80a05a17995a036b643c37adb3c3dc62 | null |
arvo:33251 | n132/arvo:33251-vul | /src/c-blosc2 | [
{
"end_line": 1313,
"function_name": "get_meta_from_header",
"start_line": 1206,
"target_file": "/src/c-blosc2/blosc/frame.c"
}
] | Heap-buffer-overflow READ 6 | c-blosc2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2838210575
INFO: Loaded 1 modules (40924 inline 8-bit counters): 40924 [0x8760ca0, 0x876ac7c),
INFO: Loaded 1 PC tables (40924 PCs): 40924 [0x86c2544,0x8712424),
/out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=====... | c | 4d2510757d797781aed92193012294e7732afe9a | https://github.com/Blosc/c-blosc2/commit/8a058b7a6be4d7e47a9af5831c454fca8c725dd4 | A heap-buffer-overflow occurs when reading frame metalayers due to improper boundary checking with the variable header_pos in the code. The header_pos variable is used to check boundaries when reading names and offsets, but increasing header_pos when seeking to another offset in the header to read metadata leads to out... |
arvo:33264 | n132/arvo:33264-vul | /src/c-blosc2 | [
{
"end_line": 2723,
"function_name": "_blosc_getitem",
"start_line": 2575,
"target_file": "/src/c-blosc2/blosc/blosc2.c"
}
] | Heap-buffer-overflow READ {*} | c-blosc2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1884806367
INFO: Loaded 1 modules (44208 inline 8-bit counters): 44208 [0xdca180, 0xdd4e30),
INFO: Loaded 1 PC tables (44208 PCs): 44208 [0xac4c70,0xb71770),
/out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=========... | c | 77b7dfd41f4b8ae7cc12c8babd547829a84435da | https://github.com/Blosc/c-blosc2/commit/4a727370b1c2e9746434c00bf2236db86c31ea5c | null |
arvo:33318 | n132/arvo:33318-vul | /src/wasm3 | [
{
"end_line": 450,
"function_name": "Push",
"start_line": 417,
"target_file": "/src/wasm3/source/m3_compile.c"
},
{
"end_line": 322,
"function_name": "EvaluateExpression",
"start_line": 247,
"target_file": "/src/wasm3/source/m3_env.c"
}
] | Heap-buffer-overflow WRITE 8 | wasm3 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2755559315
INFO: Loaded 1 modules (3135 inline 8-bit counters): 3135 [0x827380, 0x827fbf),
INFO: Loaded 1 PC tables (3135 PCs): 3135 [0x5cba58,0x5d7e48),
/out/fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==============================... | cpp | 7dd44291c7e6d60f6c358c83557e4e9c8b028e53 | https://github.com/wasm3/wasm3/commit/b48695bb940e55c0baa0a3d5740cf48e03643b58 | A stack overflow can occur in the EvaluateExpression function due to insufficient detection mechanisms. |
arvo:33457 | n132/arvo:33457-vul | /src/wasm3 | [
{
"end_line": 64,
"function_name": "NewCodePage",
"start_line": 15,
"target_file": "/src/wasm3/source/m3_code.c"
}
] | Heap-buffer-overflow WRITE 4 | wasm3 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1082924794
INFO: Loaded 1 modules (3291 inline 8-bit counters): 3291 [0x82e7d0, 0x82f4ab),
INFO: Loaded 1 PC tables (3291 PCs): 3291 [0x5d3f90,0x5e0d40),
/out/fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==============================... | c | 58488085f2d3b317a2e52515d1278cd1f90516d1 | https://github.com/wasm3/wasm3/commit/8f3986a66c390e1125493531648b828099fab982 | null |
arvo:33474 | n132/arvo:33474-vul | /src/geos | [
{
"end_line": 270,
"function_name": "OverlayNG::computeEdgeOverlay",
"start_line": 206,
"target_file": "/src/geos/src/operation/overlayng/OverlayNG.cpp"
}
] | Stack-use-after-scope READ 8 | geos | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3401105747
INFO: Loaded 1 modules (49715 inline 8-bit counters): 49715 [0xd4e408, 0xd5a63b),
INFO: Loaded 1 PC tables (49715 PCs): 49715 [0xd5a640,0xe1c970),
/out/fuzz_geo2: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=======================... | cpp | 5f4af4116e39ec9f859d8a64adc74cd4f4ffb349 | https://git.osgeo.org/gitea/geos/geos/commit/f593230f5907260096202ef0302abe99b81c0bf7 | A security vulnerability exists where the stack allocated envelope is not properly ensured to be available to edgeNodingBuilder, potentially leading to unsafe behavior. |
arvo:33554 | n132/arvo:33554-vul | /src/wasm3 | [
{
"end_line": 327,
"function_name": "TouchSlot",
"start_line": 322,
"target_file": "/src/wasm3/source/m3_compile.c"
}
] | Heap-buffer-overflow WRITE 8 | wasm3 | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzzer
=================================================================
==1280==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d0000000d0 at pc 0x0000004fa775 bp 0x7ffdb91d2910 sp 0x7ffdb91d2908
WRITE of size 8 at 0x60d000000... | cpp | 7db4a5c3b47db9a1f7f0a61c57a8dc72f7425462 | https://github.com/wasm3/wasm3/commit/321ba58316e77b5f4d977897aaa4bdbe43a5e38b | null |
arvo:33556 | n132/arvo:33556-vul | /src/lxc | [
{
"end_line": 2185,
"function_name": "parse_lxc_mntopts",
"start_line": 2128,
"target_file": "/src/lxc/src/lxc/conf.c"
}
] | Heap-buffer-overflow WRITE {*} | lxc | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3809674574
INFO: Loaded 1 modules (19097 inline 8-bit counters): 19097 [0xacb4c0, 0xacff59),
INFO: Loaded 1 PC tables (19097 PCs): 19097 [0xacff60,0xb1a8f0),
/out/fuzz-lxc-define-load: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
============... | c | d97d9e9ff9ece65106901d4d6a548296d4bbbcbd | https://github.com/lxc/lxc/commit/2e5c468aa59b6458d2894e7b5c730ca251e84b57 | A buffer overrun occurs in the parse_lxc_mntopts() function in conf, where the dest buffer is not properly bounded. |
arvo:33663 | n132/arvo:33663-vul | /src/wasm3 | [
{
"end_line": 49,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 15,
"target_file": "/src/wasm3/platforms/app_fuzz/fuzzer.c"
}
] | UNKNOWN WRITE | wasm3 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1645362868
INFO: Loaded 1 modules (3370 inline 8-bit counters): 3370 [0x82d420, 0x82e14a),
INFO: Loaded 1 PC tables (3370 PCs): 3370 [0x5d0938,0x5ddbd8),
/out/fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEADLYSIGNAL
... | c | bc32ee0367d6736edd41c4d94b96cca5d096aaa8 | https://github.com/wasm3/wasm3/commit/8cb2fd424309fa6ff70cf00bfcedc4e66d3355c0 | null |
arvo:3376 | n132/arvo:3376-vul | /src/openthread | [
{
"end_line": 299,
"function_name": "Leader::HandleCommissioningSet",
"start_line": 199,
"target_file": "/src/openthread/src/core/thread/network_data_leader_ftd.cpp"
}
] | Stack-buffer-overflow READ 2 | openthread | asan | INFO: Seed: 3473626803
INFO: Loaded 1 modules (13038 guards): 13038 [0x9ce3d0, 0x9daf88),
/out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==15244:15244==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f2d2ac8071f ... | cpp | 0139cc4195e77fe15ee5f684745d16aa990d01f6 | https://github.com/openthread/openthread/commit/ba148cf5bf7fa7cc445fb53c4aa88886d01e76d0 | A security vulnerability exists in HandleCommissioningSet() due to missing validation when reading the Commissioning Session ID TLV, which may allow processing of malformed or malicious TLVs. |
arvo:33762 | n132/arvo:33762-vul | /src/pcl | [
{
"end_line": 324,
"function_name": "PLYReader::vertexListPropertyContentCallback",
"start_line": 310,
"target_file": "/src/pcl/io/src/ply_io.cpp"
}
] | Heap-buffer-overflow WRITE 8 | pcl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2394693894
INFO: Loaded 1 modules (17059 inline 8-bit counters): 17059 [0xa174f0, 0xa1b793),
INFO: Loaded 1 PC tables (17059 PCs): 17059 [0xa1b798,0xa5e1c8),
/out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===============... | cpp | 09e914b0b3b13c07710e814d71df3ff958945ba3 | https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae | null |
arvo:33844 | n132/arvo:33844-vul | /src/binutils-gdb | [
{
"end_line": 416,
"function_name": "vms_traverse_index",
"start_line": 244,
"target_file": "/src/binutils-gdb/bfd/vms-lib.c"
}
] | Stack-buffer-overflow READ {*} | binutils-gdb | asan | INFO: Seed: 2918566430
INFO: Loaded 1 modules (144671 inline 8-bit counters): 144671 [0x1a9eb50, 0x1ac206f),
INFO: Loaded 1 PC tables (144671 PCs): 144671 [0x140fdb8,0x1644fa8),
/out/fuzz_bfd: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==5724... | c | 5318ba65f8641ddc05e330c8545f9922cd3c48d6 | https://github.com/bminor/binutils-gdb/commit/c38c6234f2b2425431d28449f609172aa2de549c | A stack-buffer-overflow occurs in vms-lib.c at line 367 within the vms_traverse_index function due to not accounting for the vms_kbn size when performing sanity checks on keylen. |
arvo:33854 | n132/arvo:33854-vul | /src/serenity | [
{
"end_line": 1981,
"function_name": "Parser::parse_heredoc_initiation_record",
"start_line": 1913,
"target_file": "/src/serenity/Userland/Shell/Parser.cpp"
}
] | Bad-cast | serenity | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 423026438
INFO: Loaded 1 modules (69909 inline 8-bit counters): 69909 [0xdd2970, 0xde3a85),
INFO: Loaded 1 PC tables (69909 PCs): 69909 [0xde3a88,0xef4bd8),
/out/FuzzShell: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
/src/serenity/Userland/S... | cpp | f18895c0d632f771ea7dc5d2d8d96852707a7960 | https://github.com/SerenityOS/serenity/commit/f1d49d391ee3b466b758e8d6d2301eccd1eb382c | A security vulnerability exists in the Shell where non-bareword nodes are allowed as part of a heredoc key. |
arvo:33927 | n132/arvo:33927-vul | /src/sleuthkit | [
{
"end_line": 1676,
"function_name": "hfs_find_highest_inum_cb",
"start_line": 1660,
"target_file": "/src/sleuthkit/tsk/fs/hfs.c"
}
] | Heap-buffer-overflow READ 1 | sleuthkit | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2874948304
INFO: Loaded 1 modules (18770 inline 8-bit counters): 18770 [0xaf8cb8, 0xafd60a),
INFO: Loaded 1 PC tables (18770 PCs): 18770 [0x7ec7f8,0x835d18),
/out/sleuthkit_fls_hfs_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
========... | cpp | 634c3ceaa9405c434867d9516bb4fc211fb7acdb | https://github.com/sleuthkit/sleuthkit/commit/9cabe33ee9c6f1098e7866c0d05217d948e0b19c | null |
arvo:33956 | n132/arvo:33956-vul | /src/zstd | [
{
"end_line": 2129,
"function_name": "ZSTD_compressBlock_lazy_extDict_generic",
"start_line": 1937,
"target_file": "/src/zstd/lib/compress/zstd_lazy.c"
}
] | UNKNOWN READ | zstd | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/dictionary_stream_round_trip
AddressSanitizer:DEADLYSIGNAL
=================================================================
==527==ERROR: AddressSanitizer: SEGV on unknown address 0x62f10000b1a0 (pc 0x000000610bb9 bp 0x7ffc20664a70 sp 0x7f... | cpp | 6f40571ae2feb8bfa0a56f9871b6ee3084085fc2 | https://github.com/facebook/zstd/commit/e6c8a5dd40359801bf297dca3be48e38c85ed6c2 | null |
arvo:33991 | n132/arvo:33991-vul | /src/readstat | [
{
"end_line": 764,
"function_name": "sav_process_row",
"start_line": 682,
"target_file": "/src/readstat/src/spss/readstat_sav_read.c"
}
] | Heap-buffer-overflow READ 1 | readstat | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3136895310
INFO: Loaded 1 modules (1483 inline 8-bit counters): 1483 [0x7e1480, 0x7e1a4b),
INFO: Loaded 1 PC tables (1483 PCs): 1483 [0x5949f0,0x59a6a0),
/out/fuzz_format_sav: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=====================... | c | 38d4418e00e67e5a064e2f0995b500336e7c92de | https://github.com/WizardMac/ReadStat/commit/c7baae72b36acdc24f56ad48d3e859850fdbdc2b | A buffer overflow occurs if raw_str_used underflows and becomes a very large number, which is then used as the size of a string. |
arvo:34013 | n132/arvo:34013-vul | /src/php-src | [
{
"end_line": 56,
"function_name": "fuzzer_execute_ex",
"start_line": 38,
"target_file": "/src/php-src/sapi/fuzzer/fuzzer-execute.c"
}
] | Stack-use-after-return READ 4 | php-src | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4210945017
INFO: Loaded 1 modules (133255 inline 8-bit counters): 133255 [0x96d7560, 0x96f7de7),
INFO: Loaded 1 PC tables (133255 PCs): 133255 [0x96f7de8,0x97fc220),
/out/php-fuzz-execute: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
========... | cpp | e5b6f43ec7813392d83ea586b7902e0396a1f792 | https://github.com/php/php-src/commit/ed33262dbbc9a39c43c5de75be6aa89c1a3a71a8 | A vulnerability exists where destructors are not disabled on fuzzer bailout. When a bailout switches from a fiber back to the main stack, the code attempts to destroy the fiber, which is unsafe and can lead to errors. This behavior deviates from the normal handling of fatal errors, where destructors are typically disab... |
arvo:34025 | n132/arvo:34025-vul | /src/fluent-bit | [
{
"end_line": 483,
"function_name": "ra_translate_keymap",
"start_line": 416,
"target_file": "/src/fluent-bit/src/flb_record_accessor.c"
}
] | Stack-buffer-overflow READ {*} | fluent-bit | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3845903800
INFO: Loaded 1 modules (5841 inline 8-bit counters): 5841 [0x8c5ae0, 0x8c71b1),
INFO: Loaded 1 PC tables (5841 PCs): 5841 [0x8c71b8,0x8ddec8),
/out/flb-it-fuzz-record_ac_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
... | c | 2766d32cb4699a271128c056e452cff51031a0d0 | https://github.com/fluent/fluent-bit/commit/0ec1a7b309ec29904d9f855c495dcd550da74d57 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.