task_id
stringlengths
8
10
docker_image
stringlengths
17
19
basedir
stringclasses
157 values
target_functions
listlengths
1
3
crash_type
stringclasses
85 values
project_name
stringclasses
157 values
sanitizer
stringclasses
3 values
sanitizer_output
stringlengths
1.13k
6.5M
language
stringclasses
2 values
vuln_commit
stringlengths
40
40
fix
stringlengths
69
110
vulnerability_description
stringlengths
38
824
arvo:29974
n132/arvo:29974-vul
/src/wireshark
[ { "end_line": 4429, "function_name": "dissect_tcpopt_sack", "start_line": 4304, "target_file": "/src/wireshark/epan/dissectors/packet-tcp.c" } ]
Index-out-of-bounds
wireshark
ubsan
oss-fuzzshark: disabling: udp oss-fuzzshark: disabling: udplite oss-fuzzshark: disabling: ospf oss-fuzzshark: disabling: bgp oss-fuzzshark: disabling: dhcp oss-fuzzshark: disabling: json oss-fuzzshark: disabling: snort oss-fuzzshark: configured for dissector: ip INFO: Running with entropic power schedule (0xFF, 100). I...
c
ccd8529440e37c8debe91a3b31229548704df82f
https://github.com/wireshark/wireshark/commit/ce19a2512eaa76b066bc9885444354c4df2bf210
A vulnerability exists in the TCP implementation where the absence of a SACK range check allows writing past the ends of the sack_left_edge and sack_right_edge arrays.
arvo:30051
n132/arvo:30051-vul
/src/sudo
[ { "end_line": 781, "function_name": "sudoers_parse_ldif", "start_line": 567, "target_file": "/src/sudo/plugins/sudoers/parse_ldif.c" } ]
UNKNOWN WRITE
sudo
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4027853160 INFO: Loaded 1 modules (10247 inline 8-bit counters): 10247 [0x925720, 0x927f27), INFO: Loaded 1 PC tables (10247 PCs): 10247 [0x927f28,0x94ff98), /out/fuzz_sudoers_parse: Running 1 inputs 1 time(s) each. Running: /tmp/poc : invalid LDIF...
c
8781560e1bf30e2b7fa564865d138f663bbfa125
https://github.com/sudo-project/sudo/commit/419c8952402b5b5642a0d093aa713819f26a36e3
A vulnerability exists where ldif_to_sudoers() is called even when there are no roles to convert.
arvo:30090
n132/arvo:30090-vul
/src/fluent-bit
[ { "end_line": 225, "function_name": "flb_parser_json_do", "start_line": 29, "target_file": "/src/fluent-bit/src/flb_parser_json.c" } ]
Heap-buffer-overflow READ {*}
fluent-bit
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/flb-it-fuzz-parser_fuzzer_OSSFUZZ [2025/04/10 14:24:36] [ info] Configuration: [2025/04/10 14:24:36] [ info] flush time | 5.000000 seconds [2025/04/10 14:24:36] [ info] grace | 5 seconds [2025/04/10 14:24:36] [ info] daemon ...
c
9c992e46578845ea8a222b9cef42c323634c77a6
https://github.com/fluent/fluent-bit/commit/6e6cb845e96de2474456aceb8d6ffdf42b19942c
A type confusion bug exists in the JSON parser, which can lead to incorrect handling of data types during parsing.
arvo:30093
n132/arvo:30093-vul
/src/fluent-bit
[ { "end_line": 483, "function_name": "ra_translate_keymap", "start_line": 416, "target_file": "/src/fluent-bit/src/flb_record_accessor.c" } ]
Stack-buffer-overflow READ {*}
fluent-bit
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/flb-it-fuzz-record_ac_fuzzer_OSSFUZZ [2025/04/10 04:17:11] [error] [sp] bad input character '' at line -1094795586 ================================================================= ==19950==ERROR: AddressSanitizer: stack-buffer-overflow on...
c
2766d32cb4699a271128c056e452cff51031a0d0
https://github.com/fluent/fluent-bit/commit/0ec1a7b309ec29904d9f855c495dcd550da74d57
null
arvo:30112
n132/arvo:30112-vul
/src/opensc
[ { "end_line": 952, "function_name": "sc_pkcs15emu_oberthur_add_data", "start_line": 856, "target_file": "/src/opensc/src/libopensc/pkcs15-oberthur.c" } ]
Heap-buffer-overflow READ {*}
opensc
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader ================================================================= ==58075==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60c000000180 at pc 0x000000499097 bp 0x7ffff5a959f0 sp 0x7ffff5a951b8 READ of size 254 ...
c
9c91a4327e6db579f7f964f147fd6e94a0e1b85e
https://github.com/OpenSC/OpenSC/commit/17d8980cde7be597afc366b7e311d0d7cadcb1f4
null
arvo:30113
n132/arvo:30113-vul
/src/c-blosc2
[ { "end_line": 1145, "function_name": "frame_get_usermeta", "start_line": 1056, "target_file": "/src/c-blosc2/blosc/frame.c" } ]
UNKNOWN READ
c-blosc2
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1928156616 INFO: Loaded 1 modules (65370 inline 8-bit counters): 65370 [0xaf1fc8, 0xb01f22), INFO: Loaded 1 PC tables (65370 PCs): 65370 [0x781aa8,0x881048), /out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Undefined...
c
f18a6d4644ef960d7ac1e75742bdacfd691d8bc5
https://github.com/Blosc/c-blosc2/commit/9d81c680a0a9e9a6ac081bb1061c00a1ab3feaac
A vulnerability exists in which the code attempts to read usermeta past the frame, triggering an ASAN sanitizer check.
arvo:3012
n132/arvo:3012-vul
/src/librawspeed
[ { "end_line": 110, "function_name": "OrfDecoder::decodeRawInternal", "start_line": 63, "target_file": "/src/librawspeed/src/librawspeed/decoders/OrfDecoder.cpp" }, { "end_line": 301, "function_name": "OrfDecoder::decodeCompressed", "start_line": 141, "target_file": "/src/librawsp...
Use-after-poison WRITE 2
librawspeed
asan
INFO: Seed: 1942819145 INFO: Loaded 1 modules (13713 guards): [0xad27b0, 0xadfdf4), /out/TiffParserFuzzer-GetDecoder-Decode: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==3432==ERROR: AddressSanitizer: use-after-poison on address 0x7f0069255802 a...
cpp
301c84ac1fe8827c0ba5f6a291bf052f1430ea81
https://github.com/darktable-org/rawspeed/commit/4e3e6cbc15022fd78b214034c7dfacc719ba418c
A vulnerability exists in OrfDecoder where image dimensions are not checked before processing, potentially allowing invalid or malicious input to be handled. The decodeCompressed() function is involved in this issue.
arvo:30181
n132/arvo:30181-vul
/src/wolfmqtt
[ { "end_line": 754, "function_name": "MqttEncode_Connect", "start_line": 611, "target_file": "/src/wolfmqtt/src/mqtt_packet.c" } ]
Heap-buffer-overflow WRITE 1
wolfmqtt
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2495873999 INFO: Loaded 1 modules (14419 inline 8-bit counters): 14419 [0x83c0030, 0x83c3883), INFO: Loaded 1 PC tables (14419 PCs): 14419 [0x833be3c,0x83580d4), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =============...
cpp
d7ac40ba2e1fb3d37590dcbca2aca2b9f142a6d2
https://github.com/wolfSSL/wolfMQTT/commit/af1c98b16ef3fb90c7c1714d61f069b38d479588
A NULL username in the relevant code path does not require extra length, potentially leading to a security vulnerability.
arvo:30234
n132/arvo:30234-vul
/src/selinux
[ { "end_line": 317, "function_name": "cil_destroy_blockinherit", "start_line": 297, "target_file": "/src/selinux/libsepol/cil/src/cil_build_ast.c" } ]
Heap-use-after-free READ 4
selinux
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 601048975 INFO: Loaded 1 modules (14431 inline 8-bit counters): 14431 [0x9566b0, 0x959f0f), INFO: Loaded 1 PC tables (14431 PCs): 14431 [0x959f10,0x992500), /out/secilc-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Recursive blockinher...
c
1048f8d329a0e34a2529b3376fb085c5e6b3db0d
https://github.com/SELinuxProject/selinux/commit/eba0ffee01ee11bb4fc3f6505d9cf69693088621
A heap-use-after-free vulnerability exists in libsepol/cil when using optional blockinherit. When secilc compiles a policy where an optional block contains blockinherit statements, and one of the inherited blocks does not exist, the optional block is disabled at pass 3 (CIL_PASS_BLKIN_LINK). The function __cil_resolve_...
arvo:30236
n132/arvo:30236-vul
/src/sudo
[ { "end_line": 3296, "function_name": "yyparse", "start_line": 1401, "target_file": "/src/sudo/plugins/sudoers/gram.c" } ]
Heap-double-free
sudo
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4012234423 INFO: Loaded 1 modules (3524 inline 8-bit counters): 3524 [0x841960, 0x842724), INFO: Loaded 1 PC tables (3524 PCs): 3524 [0x842728,0x850368), /out/fuzz_sudoers: Running 1 inputs 1 time(s) each. Running: /tmp/poc sudoers:2:42: syntax err...
c
d2901f4121e5490f9d1128458a8e229f4870b3cd
https://github.com/sudo-project/sudo/commit/bd4e8bc699ba1355c5579f345b4521017b8454f1
Options are not removed from the leak list before being freed, which can lead to security vulnerabilities.
arvo:30253
n132/arvo:30253-vul
/src/c-blosc2
[ { "end_line": 493, "function_name": "get_header_info", "start_line": 388, "target_file": "/src/c-blosc2/blosc/frame.c" } ]
Memcpy-param-overlap
c-blosc2
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/decompress_frame_fuzzer < INPUT_FILE or /out/decompress_frame_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags...
cpp
e362bb0bed6bbc50062c1a0df6d6f2be273962ba
https://github.com/Blosc/c-blosc2/commit/dd0e099a4cf51ec01064065778b1d3bfb314f201
null
arvo:30324
n132/arvo:30324-vul
/src/libraw
[ { "end_line": 2064, "function_name": "LibRaw::apply_tiff", "start_line": 1517, "target_file": "/src/libraw/src/metadata/tiff.cpp" } ]
Heap-buffer-overflow WRITE {*}
libraw
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/libraw_cr2_fuzzer < INPUT_FILE or /out/libraw_cr2_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/libra...
cpp
371161a06d7f98f231a001dad4af2dfb463e270a
https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e
null
arvo:30340
n132/arvo:30340-vul
/src/relic
[ { "end_line": 131, "function_name": "bn_rsh", "start_line": 105, "target_file": "/src/relic/src/bn/relic_bn_shift.c" } ]
Heap-use-after-free WRITE 8
relic
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/cryptofuzz-relic ================================================================= ==3603==ERROR: AddressSanitizer: heap-use-after-free on address 0x612000016d30 at pc 0x00000073d737 bp 0x7ffc33ee81f0 sp 0x7ffc33ee81e8 WRITE of size 8 at 0x...
cpp
1cca0a522ca280c7c8ba5e1288a54d9ecde627b4
https://github.com/relic-toolkit/relic/commit/e2cb33534a9b9b32dd530d687dada1bafbdf7179
null
arvo:30482
n132/arvo:30482-vul
/src/relic
[ { "end_line": 137, "function_name": "bn_mul_karat_imp", "start_line": 50, "target_file": "/src/relic/src/bn/relic_bn_mul.c" } ]
Use-of-uninitialized-value
relic
msan
INFO: found LLVMFuzzerCustomMutator (0x8af560). Disabling -len_control by default. INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1587390669 INFO: Loaded 1 modules (71869 inline 8-bit counters): 71869 [0x1d14140, 0x1d259fd), INFO: Loaded 1 PC tables (71869 PCs): 71869 [0x1d25a00,0x1e3e5d0), /ou...
cpp
bbc7669d7cd5257fd473b7e3b585bb571de28eec
https://github.com/relic-toolkit/relic/commit/0886abbb8596c875ccf25981e4cde3a4dd902365
null
arvo:30507
n132/arvo:30507-vul
/src/serenity
[ { "end_line": 423, "function_name": "decode_frame", "start_line": 308, "target_file": "/src/serenity/Userland/Libraries/LibGfx/GIFLoader.cpp" } ]
Global-buffer-overflow READ 4
serenity
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/FuzzGIFLoader ================================================================= ==1417==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000000625250 at pc 0x00000050b89e bp 0x7ffc76abc6f0 sp 0x7ffc76abc6e8 READ of size 4 at 0x0...
cpp
9aa91e6c6f267c843b92cf57eeae289ccae82799
https://github.com/SerenityOS/serenity/commit/ce5fe2a6e807b819866b4f429ca6f7a2d74445b7
A read buffer overflow occurs in the interlaced GIF decode process within LibGfx, specifically in GIFLoader.cpp at line 402. The previous fix does not fully address the issue, and the vulnerability remains at this location.
arvo:30684
n132/arvo:30684-vul
/src/flatbuffers
[ { "end_line": 1583, "function_name": "Parser::ParseVector", "start_line": 1478, "target_file": "/src/flatbuffers/src/idl_parser.cpp" } ]
Heap-buffer-overflow WRITE 1
flatbuffers
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1886682582 INFO: Loaded 1 modules (14511 inline 8-bit counters): 14511 [0x5a1f90, 0x5a583f), INFO: Loaded 1 PC tables (14511 PCs): 14511 [0x5a5840,0x5de330), /out/parser_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===================...
cpp
6f3e45eca1fde7a68cb72fd4499a3647f719c9db
https://github.com/google/flatbuffers/commit/fee095410b0969765b5c2545c10e585f69e961b0
null
arvo:30717
n132/arvo:30717-vul
/src/selinux
[ { "end_line": 115, "function_name": "cil_copy_block", "start_line": 98, "target_file": "/src/selinux/libsepol/cil/src/cil_copy_ast.c" } ]
UNKNOWN READ
selinux
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2866085386 INFO: Loaded 1 modules (14867 inline 8-bit counters): 14867 [0x95f310, 0x962d23), INFO: Loaded 1 PC tables (14867 PCs): 14867 [0x962d28,0x99ce58), /out/secilc-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:DE...
c
b839e9a1cb78d67c18df8b2e75e2fa53cca74392
https://github.com/SELinuxProject/selinux/commit/d155b410d4bbc90d28f361b966f0429598da8188
null
arvo:30748
n132/arvo:30748-vul
/src/c-blosc2
[ { "end_line": 1195, "function_name": "frame_get_metalayers_from_header", "start_line": 1086, "target_file": "/src/c-blosc2/blosc/frame.c" } ]
Negative-size-param
c-blosc2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 5502380 INFO: Loaded 1 modules (40801 inline 8-bit counters): 40801 [0x873e140, 0x87480a1), INFO: Loaded 1 PC tables (40801 PCs): 40801 [0x86a08a4,0x86f03ac), /out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==3726==...
c
98f51f9f1446e2bb70cf098c860401feed6e3b14
https://github.com/Blosc/c-blosc2/commit/1f79b650f75becece4a5346f49f29bea71daa72c
A negative-size-param issue occurs when reading content_len in the frame_get_metalayers function, leading to a potential security vulnerability.
arvo:30752
n132/arvo:30752-vul
/src/mdbtools
[ { "end_line": 75, "function_name": "decompressed_to_utf8_with_iconv", "start_line": 52, "target_file": "/src/mdbtools/src/libmdb/iconv.c" } ]
Segv on unknown address
mdbtools
asan
offset 34360262656 is beyond EOF Oops! didn't get a full page at 16777472 Warning: defaulting to brute force read warning: Invalid data location detected in mdb_crack_row. AddressSanitizer:DEADLYSIGNAL ================================================================= ==27657==ERROR: AddressSanitizer: SEGV on unknown ad...
c
0e3a627ee6b3828b8dde3a0c105bf73454c45959
https://github.com/mdbtools/mdbtools/commit/89e23615828ea64af9858e5942d6bc4d82c458a6
null
arvo:30775
n132/arvo:30775-vul
/src/selinux
[ { "end_line": 2506, "function_name": "cil_resolve_blockinherit_copy", "start_line": 2462, "target_file": "/src/selinux/libsepol/cil/src/cil_resolve_ast.c" } ]
UNKNOWN READ
selinux
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 404830629 INFO: Loaded 1 modules (15004 inline 8-bit counters): 15004 [0x9cc478, 0x9cff14), INFO: Loaded 1 PC tables (15004 PCs): 15004 [0x9cff18,0xa0a8d8), /out/secilc-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc MemorySanitizer:DEAD...
c
5681c6275b5ad9cf3d84af243a66b900a0628f72
https://github.com/SELinuxProject/selinux/commit/74d00a8decebf940d95064ff60042dcb2cbcc2c0
null
arvo:30800
n132/arvo:30800-vul
/src/opensc
[ { "end_line": 1215, "function_name": "iasecc_process_fci", "start_line": 1125, "target_file": "/src/opensc/src/libopensc/card-iasecc.c" } ]
Stack-buffer-overflow READ 1
opensc
asan
INFO: Seed: 3675025298 INFO: Loaded 1 modules (21956 inline 8-bit counters): 21956 [0xc0dfe0, 0xc135a4), INFO: Loaded 1 PC tables (21956 PCs): 21956 [0x8d5368,0x92afa8), /out/fuzz_pkcs15_reader: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==58...
c
1252aca9f10771ef5ba8405e73cf2da50827958f
https://github.com/OpenSC/OpenSC/commit/ae1cf0be90396fb6c0be95829bf0d3eecbd2fd1c
A stack buffer overflow occurs in the iasecc module when an empty ACL is returned.
arvo:30868
n132/arvo:30868-vul
/src/c-blosc2
[ { "end_line": 1494, "function_name": "frame_get_vlmetalayers", "start_line": 1436, "target_file": "/src/c-blosc2/blosc/frame.c" } ]
Heap-buffer-overflow READ 1
c-blosc2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3146337438 INFO: Loaded 1 modules (40884 inline 8-bit counters): 40884 [0x8745200, 0x874f1b4), INFO: Loaded 1 PC tables (40884 PCs): 40884 [0x86a7644,0x86f73e4), /out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =====...
c
d5622cd1a6247a8740bef1511b8b2b5ed0cfbfcb
https://github.com/Blosc/c-blosc2/commit/767a0d9302dce5d7467014cfd64f91a1b266e6d9
A heap-buffer-overflow vulnerability exists due to the lack of checks when reading the trailer outside of the frame boundaries.
arvo:30983
n132/arvo:30983-vul
/src/ots
[ { "end_line": 103, "function_name": "OpenTypeSILF::Parse", "start_line": 14, "target_file": "/src/ots/src/silf.cc" } ]
Use-of-uninitialized-value
ots
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1381650114 INFO: Loaded 1 modules (22754 inline 8-bit counters): 22754 [0xc7ce38, 0xc8271a), INFO: Loaded 1 PC tables (22754 PCs): 22754 [0xc82720,0xcdb540), /out/ots-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==999==WARNING: Memory...
cpp
c162298f36fb869769cb04268d9341d13186720a
https://github.com/khaledhosny/ots/commit/6e9a697bd9a76475d2d947fb1a371e8f7a6edb32
A vulnerability exists in graphite where the decompressed buffer is not zero-initialized. The lz4 library does not fully initialize the buffer, even though it claims the decompressed size matches the requested size.
arvo:30999
n132/arvo:30999-vul
/src/php-src
[ { "end_line": 2391, "function_name": "increment_string", "start_line": 2307, "target_file": "/src/php-src/Zend/zend_operators.c" } ]
UNKNOWN READ
php-src
msan
INFO: Seed: 1892275911 INFO: Loaded 1 modules (131554 inline 8-bit counters): 131554 [0x1e5b640, 0x1e7b822), INFO: Loaded 1 PC tables (131554 PCs): 131554 [0x1e7b828,0x207d648), /out/php-fuzz-execute: Running 1 inputs 1 time(s) each. Running: /tmp/poc MemorySanitizer:DEADLYSIGNAL ==141061==ERROR: MemorySanitizer: S...
cpp
0cdc634fc4f233034c37234d98f5ff3d6cf216b2
https://github.com/php/php-src/commit/353f7ffb6b3f6e7c3aed8b3ed51182a973e120b8
A vulnerability exists where the delref operation occurs before successful allocation, which can lead to inconsistent reference counts after an out-of-memory (OOM) condition. This issue is particularly notable in some string/array separation cases.
arvo:31042
n132/arvo:31042-vul
/src/sudo
[ { "end_line": 358, "function_name": "LLVMFuzzerTestOneInput", "start_line": 186, "target_file": "/src/sudo/plugins/sudoers/regress/fuzz/fuzz_policy.c" }, { "end_line": 990, "function_name": "set_cmnd", "start_line": 912, "target_file": "/src/sudo/plugins/sudoers/sudoers.c" } ]
UNKNOWN WRITE
sudo
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2360500043 INFO: Loaded 1 modules (5132 inline 8-bit counters): 5132 [0x55f7490cff00, 0x55f7490d130c), INFO: Loaded 1 PC tables (5132 PCs): 5132 [0x55f7490d1310,0x55f7490e53d0), /out/fuzz_policy: Running 1 inputs 1 time(s) each. Running: /tmp/poc f...
c
c09169e812aac4f54801b6ca2b565fff52ecd518
https://github.com/sudo-project/sudo/commit/ae3a098d2f0988b63a780523a006a3db8e8b3872
A vulnerability exists where user_cmnd is not always dynamically allocated, even though it is freed in sudo_user_free(). The policy functions set user_cmnd directly instead of always setting argv. Additionally, sudoers_policy_main() can be called with an argc of 0, which is not intended.
arvo:31050
n132/arvo:31050-vul
/src/selinux
[ { "end_line": 3972, "function_name": "__cil_resolve_ast_last_child_helper", "start_line": 3926, "target_file": "/src/selinux/libsepol/cil/src/cil_resolve_ast.c" } ]
Use-of-uninitialized-value
selinux
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3472398253 INFO: Loaded 1 modules (14458 inline 8-bit counters): 14458 [0x9b91e8, 0x9bca62), INFO: Loaded 1 PC tables (14458 PCs): 14458 [0x9bca68,0x9f5208), /out/secilc-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Failed to resolve c...
c
038817036f36aadf762c8a3061500903b22b8213
https://github.com/SELinuxProject/selinux/commit/0451adebdf153eee1f69914141311114a0130982
null
arvo:31057
n132/arvo:31057-vul
/src/selinux
[ { "end_line": 6566, "function_name": "cil_build_ast", "start_line": 6540, "target_file": "/src/selinux/libsepol/cil/src/cil_build_ast.c" } ]
Use-of-uninitialized-value
selinux
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2794472240 INFO: Loaded 1 modules (14885 inline 8-bit counters): 14885 [0x9c62c8, 0x9c9ced), INFO: Loaded 1 PC tables (14885 PCs): 14885 [0x9c9cf0,0xa03f40), /out/secilc-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==3383==WARNING: Me...
c
8a74c05b97050bd226d61fc162e04dcdf8e91247
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
null
arvo:31065
n132/arvo:31065-vul
/src/selinux
[ { "end_line": 58, "function_name": "cil_reset_classpermission", "start_line": 51, "target_file": "/src/selinux/libsepol/cil/src/cil_reset_ast.c" } ]
Heap-use-after-free READ 8
selinux
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2283326505 INFO: Loaded 1 modules (14853 inline 8-bit counters): 14853 [0x95f350, 0x962d55), INFO: Loaded 1 PC tables (14853 PCs): 14853 [0x962d58,0x99cda8), /out/secilc-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===================...
c
e13c8162656665f9ec1c76a033cae5b011b8c658
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
A vulnerability exists in libsepol/cil where the classperms list of a classpermission rule is not destroyed when resetting the classpermission. The classperms list is created and filled in when classpermissionset rules are processed, so the classpermission rule does not own any part of the list and should not retain an...
arvo:31120
n132/arvo:31120-vul
/src/c-blosc2
[ { "end_line": 1752, "function_name": "get_coffset", "start_line": 1734, "target_file": "/src/c-blosc2/blosc/frame.c" } ]
Heap-use-after-free READ 4
c-blosc2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1275430309 INFO: Loaded 1 modules (40905 inline 8-bit counters): 40905 [0x8745280, 0x874f249), INFO: Loaded 1 PC tables (40905 PCs): 40905 [0x86a7bc4,0x86f7a0c), /out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =====...
cpp
969fb4cbb617801876fb5ddefc73778935ff1a56
https://github.com/Blosc/c-blosc2/commit/e411d87705c65db2aafb0e774092fe57647fb31c
A heap-buffer-overflow occurs when reading a chunk outside of the frame boundary, leading to a security vulnerability.
arvo:31121
n132/arvo:31121-vul
/src/wireshark
[ { "end_line": 359, "function_name": "dissect_vjc_uncomp", "start_line": 246, "target_file": "/src/wireshark/epan/dissectors/packet-vj-comp.c" } ]
Heap-buffer-overflow READ 1
wireshark
asan
Warning: AFL++ tools will need to set AFL_MAP_SIZE to 383424 to be able to run this instrumented program! Running LLVMFuzzerInitialize ... oss-fuzzshark: disabling: udp oss-fuzzshark: disabling: udplite oss-fuzzshark: disabling: ospf oss-fuzzshark: disabling: bgp oss-fuzzshark: disabling: dhcp oss-fuzzshark: disabling:...
c
81cc0ad06cac97ff5fdba3329cc557e05f4dc79f
https://github.com/wireshark/wireshark/commit/72c9b4b1e8e9bb5ae0ffc4493f3fd86b06c014d8
A vulnerability exists in the VJ compression implementation where, when handling uncompressed packets, there are missing bounds checks before allocating or reading memory. The code allocates memory based on the entire packet contents rather than limiting it to the size of the IP header plus the maximum needed size of t...
arvo:31124
n132/arvo:31124-vul
/src/selinux
[ { "end_line": 40, "function_name": "cil_reset_perm", "start_line": 37, "target_file": "/src/selinux/libsepol/cil/src/cil_reset_ast.c" } ]
Heap-use-after-free READ 8
selinux
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 968397115 INFO: Loaded 1 modules (14853 inline 8-bit counters): 14853 [0x95f350, 0x962d55), INFO: Loaded 1 PC tables (14853 PCs): 14853 [0x962d58,0x99cda8), /out/secilc-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ====================...
c
f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
A vulnerability exists in libsepol/cil where the classperm list is not destroyed when resetting map perms. Map perms use the classperms field, which is a pointer to a list of classperms created and added to during the resolution of classmapping rules. Since the map permission does not own the data in the list, failing ...
arvo:31179
n132/arvo:31179-vul
/src/leptonica
[ { "end_line": 33, "function_name": "LLVMFuzzerTestOneInput", "start_line": 3, "target_file": "/src/leptonica/prog/fuzzing/flipdetect_fuzzer.cc" } ]
Use-of-uninitialized-value
leptonica
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2467700698 INFO: Loaded 1 modules (115570 inline 8-bit counters): 115570 [0x1b4c328, 0x1b6869a), INFO: Loaded 1 PC tables (115570 PCs): 115570 [0x1b686a0,0x1d2bdc0), /out/flipdetect_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==74808...
cpp
9ca045147dedbecf48d678bf6885bf2ca62e29dd
https://github.com/DanBloomberg/leptonica/commit/43050bffb966f7438ff177a6f78bc90915889df7
An uninitialized value is used in the makeOrientDecision() function.
arvo:31181
n132/arvo:31181-vul
/src/libraw
[ { "end_line": 1147, "function_name": "LibRaw::identify", "start_line": 179, "target_file": "/src/libraw/src/metadata/identify.cpp" } ]
Heap-buffer-overflow READ 1
libraw
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1900819783 INFO: Loaded 1 modules (18115 inline 8-bit counters): 18115 [0xab77b0, 0xabbe73), INFO: Loaded 1 PC tables (18115 PCs): 18115 [0x7a5428,0x7ec058), /out/libraw_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===================...
cpp
371161a06d7f98f231a001dad4af2dfb463e270a
https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e
null
arvo:31198
n132/arvo:31198-vul
/src/wireshark
[ { "end_line": 77, "function_name": "subset_find_guint8", "start_line": 61, "target_file": "/src/wireshark/epan/tvbuff_subset.c" } ]
Stack-buffer-overflow WRITE {*}
wireshark
asan
Warning: AFL++ tools will need to set AFL_MAP_SIZE to 385024 to be able to run this instrumented program! Running LLVMFuzzerInitialize ... oss-fuzzshark: disabling: udp oss-fuzzshark: disabling: udplite oss-fuzzshark: disabling: ospf oss-fuzzshark: disabling: bgp oss-fuzzshark: disabling: dhcp oss-fuzzshark: disabling:...
c
22cf2cb345b16f9783165e9cfc80ed9a97a11ca0
https://github.com/wireshark/wireshark/commit/2ba52cdc0e4216dafdfc32498fc0210c99449ec9
null
arvo:31250
n132/arvo:31250-vul
/src/sudo
[ { "end_line": 89, "function_name": "set_cmnd_path", "start_line": 84, "target_file": "/src/sudo/plugins/sudoers/stubs.c" } ]
UNKNOWN WRITE
sudo
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_sudoers ================================================================= ==44225==ERROR: AddressSanitizer: attempting double-free on 0x602000000090 in thread T0: SCARINESS: 42 (double-free) #0 0x55bb44ad66a2 in free /src/llvm-proj...
c
5fc6b8c1776bbb35290b8851f2e4bc349c806f3c
https://github.com/sudo-project/sudo/commit/322e0b3693fa43d281ffe082a1e08e523e8dd17f
The set_cmnd_path() stub returns a status of FOUND even though it does not modify user_cmnd, which can lead to incorrect behavior when resetting user_cmnd based on a new runchroot.
arvo:31276
n132/arvo:31276-vul
/src/p11-kit
[ { "end_line": 352, "function_name": "proto_read_attribute_array", "start_line": 289, "target_file": "/src/p11-kit/p11-kit/rpc-server.c" } ]
UNKNOWN WRITE
p11-kit
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4051609780 INFO: Loaded 1 modules (26595 inline 8-bit counters): 26595 [0x987cc0, 0x98e4a3), INFO: Loaded 1 PC tables (26595 PCs): 26595 [0x98e4a8,0x9f62d8), /out/rpc_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSanit...
c
34b568727ff98ebb36f45a3d63c07f165c58219b
https://github.com/p11-glue/p11-kit/commit/b3243a754763f6df19351593781b88e277a324bc
A vulnerability exists in the rpc-server where parsing CKF_ARRAY_ATTRIBUTE allows nested attribute arrays. The current internal API cannot determine the actual size of data that needs to be stored, as ulValueLen is set to the attribute count times sizeof(CK_ATTRIBUTE), leading to potential issues with memory allocation...
arvo:31301
n132/arvo:31301-vul
/src/libass
[ { "end_line": 203, "function_name": "fnv_32a_buf", "start_line": 186, "target_file": "/src/libass/libass/ass_utils.h" } ]
Heap-buffer-overflow READ 1
libass
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3069947096 INFO: Loaded 1 modules (33751 inline 8-bit counters): 33751 [0xd28a70, 0xd30e47), INFO: Loaded 1 PC tables (33751 PCs): 33751 [0xd30e48,0xdb4bb8), /out/libass_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===================...
cpp
a93e17f5ffe526e68c88d69141dbf495523376e2
https://github.com/libass/libass/commit/8f987713dd0fa791c5c511c13bb27021fa653fb0
A crash occurs when the hash function is called with zero-length buffers, as it does not handle empty strings.
arvo:31306
n132/arvo:31306-vul
/src/fluent-bit
[ { "end_line": 190, "function_name": "LLVMFuzzerTestOneInput", "start_line": 13, "target_file": "/src/fluent-bit/tests/internal/fuzzers/utils_fuzzer.c" } ]
UNKNOWN WRITE
fluent-bit
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2730340325 INFO: Loaded 1 modules (2883 inline 8-bit counters): 2883 [0x889260, 0x889da3), INFO: Loaded 1 PC tables (2883 PCs): 2883 [0x889da8,0x8951d8), /out/flb-it-fuzz-utils_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each. Running: /tmp/poc [202...
c
16f4084f36c78d1c121a78aafb7dc1db5fe699e9
https://github.com/fluent/fluent-bit/commit/b4036d78e0963f9051bea9501437852d0bf6772e
null
arvo:31332
n132/arvo:31332-vul
/src/md4c
[ { "end_line": 5702, "function_name": "md_is_container_mark", "start_line": 5646, "target_file": "/src/md4c/src/md4c.c" } ]
Heap-buffer-overflow READ 1
md4c
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3857336753 INFO: Loaded 1 modules (3223 inline 8-bit counters): 3223 [0x85e0f0, 0x85ed87), INFO: Loaded 1 PC tables (3223 PCs): 3223 [0x5ec750,0x5f90c0), /out/fuzz-mdhtml: Running 1 inputs 1 time(s) each. Running: /tmp/poc =========================...
c
933388a6573ed04ee267ccfbc0625f6f6306313d
https://github.com/mity/md4c/commit/260cd3394d45bd51f2002936a63401419658ecd7
A buffer overflow occurs on input in c-string format such as: "\n# h1\nc hh##e2ked\n\n A | rong__ ___strong \u0000\u0000\u0000\u0000\u0000\u0000\a\u0000\u0000\u0000\u0000\n# h1\nh# #2\n### h3\n#### h4\u0000\u0000\u0000\u0000\u0000\u0000\u0000\u0000\\\n##### h5\n#*#####\u0000\n6"
arvo:31333
n132/arvo:31333-vul
/src/md4c
[ { "end_line": 2351, "function_name": "md_is_inline_link_spec", "start_line": 2256, "target_file": "/src/md4c/src/md4c.c" } ]
Heap-buffer-overflow READ 1
md4c
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2686091767 INFO: Loaded 1 modules (3224 inline 8-bit counters): 3224 [0x85e0f0, 0x85ed88), INFO: Loaded 1 PC tables (3224 PCs): 3224 [0x5ec770,0x5f90f0), /out/fuzz-mdhtml: Running 1 inputs 1 time(s) each. Running: /tmp/poc =========================...
c
eeb32ecc9ed35615226cb11f112d34b46c9b204a
https://github.com/mity/md4c/commit/f436c3029850c138e54a0de055d61db45130409e
null
arvo:31340
n132/arvo:31340-vul
/src/libiec61850
[ { "end_line": 59, "function_name": "getIndefiniteLength", "start_line": 27, "target_file": "/src/libiec61850/src/mms/asn1/ber_decode.c" } ]
Heap-buffer-overflow READ 1
libiec61850
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3278931693 INFO: Loaded 1 modules (1218 inline 8-bit counters): 1218 [0x7d2db0, 0x7d3272), INFO: Loaded 1 PC tables (1218 PCs): 1218 [0x58a688,0x58f2a8), /out/fuzz_mms_decode: Running 1 inputs 1 time(s) each. Running: /tmp/poc =====================...
c
22580c5aa121aeb8c03834503c4aeb58600bd866
https://github.com/mz-automation/libiec61850/commit/aac6caaa22c2c6f017d3926856c54646155ff898
null
arvo:31419
n132/arvo:31419-vul
/src/libredwg
[ { "end_line": 61, "function_name": "enforce_null_termination", "start_line": 43, "target_file": "/src/libredwg/examples/llvmfuzz.c" } ]
Heap-buffer-overflow READ 7
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2296933256 INFO: Loaded 1 modules (459887 inline 8-bit counters): 459887 [0x420c3a0, 0x427c80f), INFO: Loaded 1 PC tables (459887 PCs): 459887 [0x369a170,0x3d9e860), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
c
6a9a54104842850c7c193d82dc9250c0edf12ee9
https://github.com/LibreDWG/libredwg/commit/df82e56d5561e05529dff3369106f08a647b8a8a
null
arvo:31425
n132/arvo:31425-vul
/src/libredwg
[ { "end_line": 1539, "function_name": "decode_R13_R2000", "start_line": 819, "target_file": "/src/libredwg/src/decode.c" } ]
Heap-buffer-overflow READ 16
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1020800887 INFO: Loaded 1 modules (381900 inline 8-bit counters): 381900 [0x3581230, 0x35de5fc), INFO: Loaded 1 PC tables (381900 PCs): 381900 [0x2b85e30,0x3159af0), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
c
1b908d0d9eb2da3ada7f1f3caf067fc0041dfc3d
https://github.com/LibreDWG/libredwg/commit/5bffcdd304f3a4be044dcfb89ca16839c2cceee6
A vulnerability exists in the decode_R13_2000 function in the decode module, where invalid classes are not properly checked.
arvo:31509
n132/arvo:31509-vul
/src/fluent-bit
[ { "end_line": 200, "function_name": "LLVMFuzzerTestOneInput", "start_line": 13, "target_file": "/src/fluent-bit/tests/internal/fuzzers/utils_fuzzer.c" } ]
UNKNOWN READ
fluent-bit
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3900441783 INFO: Loaded 1 modules (5996 inline 8-bit counters): 5996 [0x7d1360, 0x7d2acc), INFO: Loaded 1 PC tables (5996 PCs): 5996 [0x7d2ad0,0x7ea190), /out/flb-it-fuzz-utils_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each. Running: /tmp/poc [202...
cpp
7803d59d9d64ffcfd205a3ad5679eeb86c3138ce
https://github.com/fluent/fluent-bit/commit/c62ad5a5f315af1c09894ccb9ae55b31b27a964f
null
arvo:31540
n132/arvo:31540-vul
/src/opensc
[ { "end_line": 738, "function_name": "sc_pkcs15emu_oberthur_add_cert", "start_line": 656, "target_file": "/src/opensc/src/libopensc/pkcs15-oberthur.c" } ]
Heap-buffer-overflow READ {*}
opensc
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader ================================================================= ==58073==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60600000011c at pc 0x000000499097 bp 0x7ffe4bc7afb0 sp 0x7ffe4bc7a778 READ of size 254 ...
c
4512676795e094ad68f41e32e9b553cc30c5f87b
https://github.com/OpenSC/OpenSC/commit/40c50a3a4219308aae90f6efd7b10213794a8d86
null
arvo:31552
n132/arvo:31552-vul
/src/c-blosc2
[ { "end_line": 1458, "function_name": "blosc_d", "start_line": 1202, "target_file": "/src/c-blosc2/blosc/blosc2.c" } ]
UNKNOWN READ
c-blosc2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3859443853 INFO: Loaded 1 modules (40930 inline 8-bit counters): 40930 [0x8747280, 0x8751262), INFO: Loaded 1 PC tables (40930 PCs): 40930 [0x86a9cc4,0x86f9bd4), /out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Addre...
c
2324c9516ee9ea321d312b28a644236aa9ee1d9d
https://github.com/Blosc/c-blosc2/commit/6c7e68cbd611d9a19808c29417eb731e1b4eb829
null
arvo:31591
n132/arvo:31591-vul
/src/libredwg
[ { "end_line": 78, "function_name": "bit_advance_position", "start_line": 54, "target_file": "/src/libredwg/src/bits.c" } ]
Heap-buffer-overflow READ 1
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2218255303 INFO: Loaded 1 modules (503763 inline 8-bit counters): 503763 [0x4755ec0, 0x47d0e93), INFO: Loaded 1 PC tables (503763 PCs): 503763 [0x3b18c10,0x42c8940), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
c
bb967665384d2f2539f81d773d0c8099e6e30aa3
https://github.com/LibreDWG/libredwg/commit/259072193fa0562587b3d971adb949aea3887091
null
arvo:31705
n132/arvo:31705-vul
/src/c-blosc2
[ { "end_line": 2043, "function_name": "frame_get_lazychunk", "start_line": 1877, "target_file": "/src/c-blosc2/blosc/frame.c" } ]
Invalid-free
c-blosc2
asan
================================================================= ==6313==ERROR: AddressSanitizer: attempting free on address which was not malloc()-ed: 0x7f0bfa0cc85e in thread T0 SCARINESS: 40 (bad-free) #0 0x49eac2 in free /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:127:3 #1 0x5f34f2 in fram...
c
776beaf88a7f32ca09ba1d5abc8c7ac4d9144d48
https://github.com/Blosc/c-blosc2/commit/1a79d783cc791faf12fa9f6f6f92c26fb8be4967
A null-dereference read occurs when attempting to free a chunk that has already been freed, leading to a security vulnerability.
arvo:31741
n132/arvo:31741-vul
/src/libredwg
[ { "end_line": 78, "function_name": "bit_advance_position", "start_line": 54, "target_file": "/src/libredwg/src/bits.c" } ]
Heap-buffer-overflow READ 1
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2034097672 INFO: Loaded 1 modules (503763 inline 8-bit counters): 503763 [0x4755ec0, 0x47d0e93), INFO: Loaded 1 PC tables (503763 PCs): 503763 [0x3b18c10,0x42c8940), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
c
bb967665384d2f2539f81d773d0c8099e6e30aa3
https://github.com/LibreDWG/libredwg/commit/259072193fa0562587b3d971adb949aea3887091
null
arvo:31789
n132/arvo:31789-vul
/src/libredwg
[ { "end_line": 246, "function_name": "dxf_skip_ws", "start_line": 226, "target_file": "/src/libredwg/src/in_dxf.c" } ]
Heap-buffer-overflow READ 1
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4196862596 INFO: Loaded 1 modules (400608 inline 8-bit counters): 400608 [0x375b1a0, 0x37bce80), INFO: Loaded 1 PC tables (400608 PCs): 400608 [0x2d19570,0x3336370), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
c
c7c28820892b3ca75960e621a4413dca3fe70b99
https://github.com/LibreDWG/libredwg/commit/1f291651e70ebe7a2b808e1f6ae4f15770aeeea8
A vulnerability exists in the indxf module where the dxf_skip_ws function lacks sufficient overflow protection, potentially leading to security issues.
arvo:31902
n132/arvo:31902-vul
/src/gpac
[ { "end_line": 232, "function_name": "abst_box_read", "start_line": 76, "target_file": "/src/gpac/src/isomedia/box_code_adobe.c" } ]
Heap-buffer-overflow READ 9
gpac
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1305510858 INFO: Loaded 1 modules (187168 inline 8-bit counters): 187168 [0x1ccf5d0, 0x1cfd0f0), INFO: Loaded 1 PC tables (187168 PCs): 187168 [0x1cfd0f0,0x1fd82f0), /out/fuzz_parse: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==============...
c
05f453ec48710066582e3c3f4b71f6a9dc849f2a
https://github.com/gpac/gpac/commit/758135e91e623d7dfe7f6aaad7aeb3f791b7a4e5
null
arvo:31961
n132/arvo:31961-vul
/src/binutils-gdb
[ { "end_line": 9907, "function_name": "print_insn", "start_line": 9388, "target_file": "/src/binutils-gdb/opcodes/i386-dis.c" } ]
Global-buffer-overflow WRITE 4
binutils-gdb
asan
Warning: AFL++ tools will need to set AFL_MAP_SIZE to 175744 to be able to run this instrumented program! ================================================================= ==299771==ERROR: AddressSanitizer: global-buffer-overflow on address 0x00000515a6dc at pc 0x000000709458 bp 0x7ffc53776d10 sp 0x7ffc53776d08 WRITE o...
c
68cb21837f09fd9c12fe4ced7b14f892be929c4f
https://github.com/bminor/binutils-gdb/commit/78c84bf926fc263a588c96c7cd313fb9a9988b4b
A vulnerability exists in i386-dis.c within the print_insn function, where incorrect decoding of nop/reserved space (0f18 ... 0x1f) occurs due to a typo.
arvo:31985
n132/arvo:31985-vul
/src/libraw
[ { "end_line": 1147, "function_name": "LibRaw::identify", "start_line": 179, "target_file": "/src/libraw/src/metadata/identify.cpp" } ]
Use-of-uninitialized-value
libraw
msan
INFO: Seed: 792883694 INFO: Loaded 1 modules (18059 inline 8-bit counters): 18059 [0xba1c30, 0xba62bb), INFO: Loaded 1 PC tables (18059 PCs): 18059 [0x8b9168,0x8ffa18), /out/libraw_cr2_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc unknown file: data corrupted at 564 ==54052==WARNING: MemorySanitizer: u...
cpp
371161a06d7f98f231a001dad4af2dfb463e270a
https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e
null
arvo:32040
n132/arvo:32040-vul
/src/c-blosc2
[ { "end_line": 746, "function_name": "blosc_read_header", "start_line": 668, "target_file": "/src/c-blosc2/blosc/blosc2.c" } ]
Heap-buffer-overflow WRITE 2
c-blosc2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2191174504 INFO: Loaded 1 modules (40507 inline 8-bit counters): 40507 [0x874a520, 0x875435b), INFO: Loaded 1 PC tables (40507 PCs): 40507 [0x86ace64,0x86fc03c), /out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =====...
c
f1f42afb9a7f6b554a71270e5060dc7d33b66145
https://github.com/Blosc/c-blosc2/commit/e670bb4036fd7c840b1c206b8739f292346b1aa9
null
arvo:32068
n132/arvo:32068-vul
/src/c-blosc2
[ { "end_line": 1596, "function_name": "init_thread_context", "start_line": 1559, "target_file": "/src/c-blosc2/blosc/blosc2.c" } ]
UNKNOWN READ
c-blosc2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4096146152 INFO: Loaded 1 modules (40971 inline 8-bit counters): 40971 [0x87482e0, 0x87522eb), INFO: Loaded 1 PC tables (40971 PCs): 40971 [0x86aaa04,0x86faa5c), /out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Addre...
cpp
27b004bf27c9879226da557b6055e3f151af8a9a
https://github.com/Blosc/c-blosc2/commit/91789b65699fed69b8e31b22b3c02d435b38a24b
null
arvo:32092
n132/arvo:32092-vul
/src/selinux
[ { "end_line": 115, "function_name": "cil_copy_block", "start_line": 98, "target_file": "/src/selinux/libsepol/cil/src/cil_copy_ast.c" } ]
Heap-buffer-overflow READ 8
selinux
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1419082038 INFO: Loaded 1 modules (14867 inline 8-bit counters): 14867 [0x95f310, 0x962d23), INFO: Loaded 1 PC tables (14867 PCs): 14867 [0x962d28,0x99ce58), /out/secilc-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===================...
c
b839e9a1cb78d67c18df8b2e75e2fa53cca74392
https://github.com/SELinuxProject/selinux/commit/d155b410d4bbc90d28f361b966f0429598da8188
null
arvo:32140
n132/arvo:32140-vul
/src/c-blosc2
[ { "end_line": 746, "function_name": "blosc_read_header", "start_line": 668, "target_file": "/src/c-blosc2/blosc/blosc2.c" } ]
Negative-size-param
c-blosc2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3649389301 INFO: Loaded 1 modules (40507 inline 8-bit counters): 40507 [0x874a520, 0x875435b), INFO: Loaded 1 PC tables (40507 PCs): 40507 [0x86ace64,0x86fc03c), /out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =====...
c
f1f42afb9a7f6b554a71270e5060dc7d33b66145
https://github.com/Blosc/c-blosc2/commit/e670bb4036fd7c840b1c206b8739f292346b1aa9
null
arvo:32149
n132/arvo:32149-vul
/src/opensc
[ { "end_line": 647, "function_name": "sc_pkcs15emu_oberthur_add_pubkey", "start_line": 570, "target_file": "/src/opensc/src/libopensc/pkcs15-oberthur.c" } ]
Heap-buffer-overflow READ 1
opensc
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader ================================================================= ==58074==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000000501 at pc 0x0000009d8833 bp 0x7ffe52a79bd0 sp 0x7ffe52a79bc8 READ of size 1 at...
c
fc0df4e5d578e5926a59dbf3a34ce737424464ba
https://github.com/OpenSC/OpenSC/commit/05648b0604bf3e498e8d42dff3c6e7c56a5bf749
null
arvo:32177
n132/arvo:32177-vul
/src/selinux
[ { "end_line": 67, "function_name": "cil_reset_classperms_set", "start_line": 60, "target_file": "/src/selinux/libsepol/cil/src/cil_reset_ast.c" } ]
Heap-use-after-free READ 8
selinux
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2463731698 INFO: Loaded 1 modules (14853 inline 8-bit counters): 14853 [0x95f350, 0x962d55), INFO: Loaded 1 PC tables (14853 PCs): 14853 [0x962d58,0x99cda8), /out/secilc-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===================...
c
2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
A vulnerability exists in libsepol/cil where the function cil_reset_classperms_set() resets the classpermission pointed to by the set field in struct cil_classperms_set. Since cil_classperms_set does not create the cil_classpermission, it should not reset it, as this can lead to unintended side effects. The set field i...
arvo:32178
n132/arvo:32178-vul
/src/pcl
[ { "end_line": 324, "function_name": "PLYReader::vertexListPropertyContentCallback", "start_line": 310, "target_file": "/src/pcl/io/src/ply_io.cpp" } ]
Container-overflow WRITE 4
pcl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3844587475 INFO: Loaded 1 modules (17059 inline 8-bit counters): 17059 [0xa174f0, 0xa1b793), INFO: Loaded 1 PC tables (17059 PCs): 17059 [0xa1b798,0xa5e1c8), /out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===============...
cpp
09e914b0b3b13c07710e814d71df3ff958945ba3
https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae
null
arvo:32184
n132/arvo:32184-vul
/src/pcl
[ { "end_line": 134, "function_name": "pcl::PLYReader::amendProperty", "start_line": 117, "target_file": "/src/pcl/io/src/ply_io.cpp" } ]
Heap-buffer-overflow READ 1
pcl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 377556916 INFO: Loaded 1 modules (17057 inline 8-bit counters): 17057 [0xa174b0, 0xa1b751), INFO: Loaded 1 PC tables (17057 PCs): 17057 [0xa1b758,0xa5e168), /out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc [pcl::PLYReader]...
cpp
4fe0737e913421c21744213cd22f165184bfb608
https://github.com/PointCloudLibrary/pcl/commit/7d52b107223ef8adec990608e8685392b48d79c6
null
arvo:32202
n132/arvo:32202-vul
/src/opensc
[ { "end_line": 651, "function_name": "sc_pkcs15emu_oberthur_add_pubkey", "start_line": 571, "target_file": "/src/opensc/src/libopensc/pkcs15-oberthur.c" } ]
Heap-buffer-overflow READ {*}
opensc
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15_reader ================================================================= ==58076==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000000500 at pc 0x000000499097 bp 0x7ffd5d9ac350 sp 0x7ffd5d9abb18 READ of size 254 ...
c
715c17c469f6c463dd511a5deb229da4de9ee100
https://github.com/OpenSC/OpenSC/commit/5d4daf6c92e4668f5458f380f3cacea3e879d91a
A buffer overflow exists in the oberthur module due to an overlooked boundary check.
arvo:32221
n132/arvo:32221-vul
/src/pcl
[ { "end_line": 324, "function_name": "PLYReader::vertexListPropertyContentCallback", "start_line": 310, "target_file": "/src/pcl/io/src/ply_io.cpp" } ]
UNKNOWN READ
pcl
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3422014972 INFO: Loaded 1 modules (23077 inline 8-bit counters): 23077 [0x958fb0, 0x95e9d5), INFO: Loaded 1 PC tables (23077 PCs): 23077 [0x95e9d8,0x9b8c28), /out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc [pcl::PLYReader...
cpp
09e914b0b3b13c07710e814d71df3ff958945ba3
https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae
null
arvo:32275
n132/arvo:32275-vul
/src/libredwg
[ { "end_line": 12295, "function_name": "dxf_objects_read", "start_line": 12260, "target_file": "/src/libredwg/src/in_dxf.c" } ]
Heap-use-after-free READ 2
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2536706859 INFO: Loaded 1 modules (470720 inline 8-bit counters): 470720 [0x435c8e0, 0x43cf7a0), INFO: Loaded 1 PC tables (470720 PCs): 470720 [0x37c3290,0x3ef1e90), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
c
23a5dd6de69ea81f79948e620306248c51b5f034
https://github.com/LibreDWG/libredwg/commit/5b27162afa44042bd43dec3fed8a1177c2c43ebb
A use-after-free vulnerability exists in the handling of the indxf structure, where the code frees only the pair instead of properly managing memory, leading to potential access of freed memory.
arvo:32451
n132/arvo:32451-vul
/src/wuffs
[ { "end_line": 16638, "function_name": "wuffs_base__pixel_swizzler__bgr__bgra_premul__src", "start_line": 16610, "target_file": "/src/wuffs/release/c/wuffs-unsupported-snapshot.c" } ]
UNKNOWN WRITE
wuffs
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2875110902 INFO: Loaded 1 modules (2050 inline 8-bit counters): 2050 [0x8232ef0, 0x82336f2), INFO: Loaded 1 PC tables (2050 PCs): 2050 [0x81ece98,0x81f0ea8), /out/pixel_swizzler_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSani...
c
77bbe685bfc2d2eca7862336945ccb019918686b
https://github.com/google/wuffs/commit/b645180357d2ba2a5dcd610fff4ffe2872540dad
null
arvo:32482
n132/arvo:32482-vul
/src/lxc
[ { "end_line": 711, "function_name": "lxc_safe_int64_residual", "start_line": 668, "target_file": "/src/lxc/src/lxc/string_utils.c" } ]
Use-of-uninitialized-value
lxc
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2714421070 INFO: Loaded 1 modules (18982 inline 8-bit counters): 18982 [0xac99f8, 0xace41e), INFO: Loaded 1 PC tables (18982 PCs): 18982 [0xace420,0xb18680), /out/fuzz-lxc-config-read: Running 1 inputs 1 time(s) each. Running: /tmp/poc Uninitialize...
c
6a374b65e718d24b3764588d159175222de70e1f
https://github.com/lxc/lxc/commit/c45833e39c85c5e16270aa4122b1929dd086127a
The lxc_safe_int64_residual() function in string_utils does not always memset the buffer, which may lead to security vulnerabilities.
arvo:32521
n132/arvo:32521-vul
/src/lxc
[ { "end_line": 1056, "function_name": "rt_sig_num", "start_line": 1025, "target_file": "/src/lxc/src/lxc/confile_utils.c" } ]
Heap-buffer-overflow READ 1
lxc
asan
================================================================= ==88795==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60400000003b at pc 0x0000005d7bc1 bp 0x7ffc0337ef40 sp 0x7ffc0337ef38 READ of size 1 at 0x60400000003b thread T0 SCARINESS: 12 (1-byte-read-heap-buffer-overflow) #0 0x5d7bc0 in rt_si...
c
c04f422182501585e2e92a238dc416ce21ff077d
https://github.com/lxc/lxc/commit/b8e539f44814cd1760c7dc21c027d7e6c51b72fd
A vulnerability exists in confile_utils where real-time signal parsing is incorrect, potentially leading to improper handling of signals.
arvo:3257
n132/arvo:3257-vul
/src/librawspeed
[ { "end_line": 226, "function_name": "SamsungV0Decompressor::decompressStrip", "start_line": 125, "target_file": "/src/librawspeed/src/librawspeed/decompressors/SamsungV0Decompressor.cpp" } ]
Use-after-poison READ 2
librawspeed
asan
INFO: Seed: 894000248 INFO: Loaded 1 modules (13457 guards): 13457 [0xafe450, 0xb0b694), /out/TiffDecoderFuzzer-SrwDecoder: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==3418==ERROR: AddressSanitizer: use-after-poison on address 0x613000000088 ...
cpp
84a13edad484015fe153120fc65f276f98288e65
https://github.com/darktable-org/rawspeed/commit/7d47c5de57aa4abdc6e7426756601a0a55efc7df
The SamsungV0Decompressor allows upward prediction for the last block, which is invalid because 16 pixels of the row are processed at a time, but the line size is not guaranteed to be a multiple of 16. This can lead to incorrect processing for the last block. In the downward case, conditional writing prevents this issu...
arvo:32638
n132/arvo:32638-vul
/src/libvips
[ { "end_line": 219, "function_name": "lzw__next_code", "start_line": 155, "target_file": "/src/libvips/libvips/foreign/libnsgif/lzw.c" } ]
Heap-buffer-overflow READ 1
libvips
asan
Warning: AFL++ tools will need to set AFL_MAP_SIZE to 78464 to be able to run this instrumented program! Running LLVMFuzzerInitialize ... continue... ================================================================= ==128888==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62a000005249 at pc 0x000000fb3ca1 b...
c
77ccd04cbe3939c5680b1b4e0aeebbb71febd6d8
https://github.com/libvips/libvips/commit/9f15567f2cf9388aa0f180c3f33e4d24989f1edf
null
arvo:3265
n132/arvo:3265-vul
/src/librawspeed
[ { "end_line": 317, "function_name": "SamsungV2Decompressor::decompressRow", "start_line": 162, "target_file": "/src/librawspeed/src/librawspeed/decompressors/SamsungV2Decompressor.cpp" } ]
Use-after-poison READ 2
librawspeed
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/TiffDecoderFuzzer-SrwDecoder < INPUT_FILE or /out/TiffDecoderFuzzer-SrwDecoder INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz ...
cpp
648eef8958198e9b919f8394b73bcbb4d360b6bf
https://github.com/darktable-org/rawspeed/commit/2ea14db02b9003eed69cdf66eeaae98a70c69b03
In SamsungV2Decompressor::decompressRow(), during the "complex case" for the first 16 pixels of a row, motion (and thus slideOffset) may cause refpixel to point outside the row bounds.
arvo:32807
n132/arvo:32807-vul
/src/opensc
[ { "end_line": 1010, "function_name": "sc_pkcs15emu_oberthur_add_data", "start_line": 906, "target_file": "/src/opensc/src/libopensc/pkcs15-oberthur.c" } ]
Heap-buffer-overflow READ 1
opensc
asan
================================================================= ==58084==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000067d at pc 0x000000ea7f0b bp 0x7ffe477aeb30 sp 0x7ffe477aeb28 READ of size 1 at 0x60200000067d thread T0 SCARINESS: 12 (1-byte-read-heap-buffer-overflow) #0 0xea7f0a in sc_pk...
c
4b3c6dec07c2bd81b4989e378829e1124abff134
https://github.com/OpenSC/OpenSC/commit/cae5c71f90cc5b364efe14040923fd5aa3b5dd90
The oberthur module does not handle 1B OIDs, which can lead to a security vulnerability.
arvo:3285
n132/arvo:3285-vul
/src/openthread
[ { "end_line": 296, "function_name": "Leader::HandleCommissioningSet", "start_line": 199, "target_file": "/src/openthread/src/core/thread/network_data_leader_ftd.cpp" } ]
Stack-buffer-overflow READ 1
openthread
asan
INFO: Seed: 485891961 INFO: Loaded 1 modules (12962 guards): 12962 [0x9cd3d0, 0x9d9e58), /out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==15240:15240==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fa92184571f a...
cpp
606044814001a0ddaa44471ac77753ca32ded712
https://github.com/openthread/openthread/commit/9f73f679508490ce5e2c5e0f7c3d7c52cbafa93c
null
arvo:33041
n132/arvo:33041-vul
/src/libucl
[ { "end_line": 1956, "function_name": "ucl_inherit_handler", "start_line": 1908, "target_file": "/src/libucl/src/ucl_util.c" } ]
Heap-buffer-overflow READ 6
libucl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3018099703 INFO: Loaded 1 modules (3063 inline 8-bit counters): 3063 [0x80aa30, 0x80b627), INFO: Loaded 1 PC tables (3063 PCs): 3063 [0x5b5d98,0x5c1d08), /out/ucl_add_string_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===============...
cpp
3a94514709b7d0d3420f96549172059bfaac2b65
https://github.com/vstakhov/libucl/commit/54a5b5943b49060d4ca7b345bc80f9b0cb2cdc94
null
arvo:3305
n132/arvo:3305-vul
/src/openjpeg
[ { "end_line": 2093, "function_name": "opj_tcd_mct_decode", "start_line": 1956, "target_file": "/src/openjpeg/src/lib/openjp2/tcd.c" } ]
Heap-buffer-overflow READ 4
openjpeg
asan
INFO: Seed: 3164882130 INFO: Loaded 1 modules (6954 guards): 6954 [0x98c040, 0x992ce8), /out/opj_decompress_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==1820==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000dc4 at p...
cpp
c67e1cd73f6c1fca081f5445af4f65b240c40edc
https://github.com/uclouvain/openjpeg/commit/cc893a4ebfaf8c42cf1221ac82c83df91e77340b
The function opj_tcd_mct_decode() contains insufficient checks to verify that MCT can be performed safely, potentially leading to a security vulnerability.
arvo:33059
n132/arvo:33059-vul
/src/libredwg
[ { "end_line": 1313, "function_name": "dxf_header_read", "start_line": 1045, "target_file": "/src/libredwg/src/in_dxf.c" }, { "end_line": 1161, "function_name": "SUMMARY_T", "start_line": 1137, "target_file": "/src/libredwg/src/in_dxf.c" } ]
Segv on unknown address
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2684472352 INFO: Loaded 1 modules (503763 inline 8-bit counters): 503763 [0x4755ec0, 0x47d0e93), INFO: Loaded 1 PC tables (503763 PCs): 503763 [0x3b18bf0,0x42c8920), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer...
c
0880ca6688895e79c3672ea4bce906039bca744e
https://github.com/LibreDWG/libredwg/commit/bb967665384d2f2539f81d773d0c8099e6e30aa3
A segmentation fault occurs on an unknown address in `dwg_free_summaryinfo` due to `dwg.summaryinfo.props[0].value` being an uninitialized pointer. This happens when `dwg_read_dxf` fails and creates a partially initialized summary info object.
arvo:33069
n132/arvo:33069-vul
/src/wasm3
[ { "end_line": 119, "function_name": "ParseSection_Type", "start_line": 40, "target_file": "/src/wasm3/source/m3_parse.c" } ]
Use-of-uninitialized-value
wasm3
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 229980027 INFO: Loaded 1 modules (3077 inline 8-bit counters): 3077 [0x82f4e8, 0x8300ed), INFO: Loaded 1 PC tables (3077 PCs): 3077 [0x5d6668,0x5e26b8), /out/fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==1290==WARNING: MemorySanitize...
c
9d5474209e5d23398cfe74a75f248f98db60f128
https://github.com/wasm3/wasm3/commit/e7084d13903029784f74706cd8fdd70277d2ecab
null
arvo:33085
n132/arvo:33085-vul
/src/wasm3
[ { "end_line": 2247, "function_name": "Compile_BlockStatements", "start_line": 2206, "target_file": "/src/wasm3/source/m3_compile.c" }, { "end_line": 340, "function_name": "EvaluateExpression", "start_line": 270, "target_file": "/src/wasm3/source/m3_env.c" } ]
Use-of-uninitialized-value
wasm3
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3372437959 INFO: Loaded 1 modules (3069 inline 8-bit counters): 3069 [0x82e4a0, 0x82f09d), INFO: Loaded 1 PC tables (3069 PCs): 3069 [0x5d63f8,0x5e23c8), /out/fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==1290==WARNING: MemorySanitiz...
c
6e23938356d3cdbfaa9273c3955b3accf5afa038
https://github.com/wasm3/wasm3/commit/79255ba1dbbb476e57a5f450eb0bbe1b84ef0f01
null
arvo:33150
n132/arvo:33150-vul
/src/libredwg
[ { "end_line": 12017, "function_name": "dxf_tables_read", "start_line": 11862, "target_file": "/src/libredwg/src/in_dxf.c" } ]
Object-size
libredwg
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4074967026 INFO: Loaded 1 modules (900852 inline 8-bit counters): 900852 [0x4385208, 0x44610fc), INFO: Loaded 1 PC tables (900852 PCs): 900852 [0x26b37d8,0x3472718), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehavio...
c
67beaabb175760ba0a3a061425045b9a5ae12775
https://github.com/LibreDWG/libredwg/commit/b37f533870d4921888cbbd633a738d3e6e95109e
The indxf module contains multiple NULL pointer dereferences of _ctrl->entries, which can lead to security vulnerabilities.
arvo:33196
n132/arvo:33196-vul
/src/wasm3
[ { "end_line": 2247, "function_name": "Compile_BlockStatements", "start_line": 2206, "target_file": "/src/wasm3/source/m3_compile.c" }, { "end_line": 340, "function_name": "EvaluateExpression", "start_line": 270, "target_file": "/src/wasm3/source/m3_env.c" } ]
Heap-buffer-overflow WRITE 4
wasm3
asan
================================================================= ==432==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000020 at pc 0x0000004ea145 bp 0x7fffc8afc270 sp 0x7fffc8afc268 WRITE of size 4 at 0x602000000020 thread T0 SCARINESS: 46 (4-byte-write-heap-buffer-overflow-far-from-bounds) #0 0...
c
6e23938356d3cdbfaa9273c3955b3accf5afa038
https://github.com/wasm3/wasm3/commit/79255ba1dbbb476e57a5f450eb0bbe1b84ef0f01
null
arvo:33217
n132/arvo:33217-vul
/src/pcl
[ { "end_line": 409, "function_name": "pcl::PLYReader::vertexAlphaCallback", "start_line": 399, "target_file": "/src/pcl/io/src/ply_io.cpp" } ]
Heap-buffer-overflow WRITE 4
pcl
asan
[pcl::PLYReader] /tmp/libfuzzer.880:3: ignoring line 'propertyAuiply' [pcl::PLYReader] /tmp/libfuzzer.880:7: ignoring line 'proxerlplyveret2' [pcl::PLYReader] /tmp/libfuzzer.880:8: ignoring line 'pro [pcl::PLYReader] /tmp/libfuzzer.880:9: ignoring line '0lemr.face 13' ===================================================...
cpp
09e914b0b3b13c07710e814d71df3ff958945ba3
https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae
null
arvo:3322
n132/arvo:3322-vul
/src/openthread
[ { "end_line": 296, "function_name": "Leader::HandleCommissioningSet", "start_line": 199, "target_file": "/src/openthread/src/core/thread/network_data_leader_ftd.cpp" } ]
Stack-buffer-overflow READ 2
openthread
asan
INFO: Seed: 2587289480 INFO: Loaded 1 modules (12962 guards): 12962 [0x9cd3d0, 0x9d9e58), /out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==15237:15237==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f50a528071f ...
cpp
606044814001a0ddaa44471ac77753ca32ded712
https://github.com/openthread/openthread/commit/9f73f679508490ce5e2c5e0f7c3d7c52cbafa93c
null
arvo:33237
n132/arvo:33237-vul
/src/wasm3
[ { "end_line": 481, "function_name": "InitDataSegments", "start_line": 455, "target_file": "/src/wasm3/source/m3_env.c" } ]
Heap-buffer-overflow READ {*}
wasm3
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3385261926 INFO: Loaded 1 modules (3062 inline 8-bit counters): 3062 [0x825300, 0x825ef6), INFO: Loaded 1 PC tables (3062 PCs): 3062 [0x5c9cb8,0x5d5c18), /out/fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==============================...
c
970849df176802c871eb0fd512f1e2b4d39d105b
https://github.com/wasm3/wasm3/commit/a6b4a11f80a05a17995a036b643c37adb3c3dc62
null
arvo:33240
n132/arvo:33240-vul
/src/wasm3
[ { "end_line": 118, "function_name": "ParseSection_Type", "start_line": 40, "target_file": "/src/wasm3/source/m3_parse.c" } ]
Heap-buffer-overflow WRITE 1
wasm3
asan
================================================================= ==431==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000020 at pc 0x0000004d8d4a bp 0x7fff5fa7f8f0 sp 0x7fff5fa7f8e8 WRITE of size 1 at 0x602000000020 thread T0 SCARINESS: 31 (1-byte-write-heap-buffer-overflow) #0 0x4d8d49 in Parse...
c
970849df176802c871eb0fd512f1e2b4d39d105b
https://github.com/wasm3/wasm3/commit/a6b4a11f80a05a17995a036b643c37adb3c3dc62
null
arvo:33251
n132/arvo:33251-vul
/src/c-blosc2
[ { "end_line": 1313, "function_name": "get_meta_from_header", "start_line": 1206, "target_file": "/src/c-blosc2/blosc/frame.c" } ]
Heap-buffer-overflow READ 6
c-blosc2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2838210575 INFO: Loaded 1 modules (40924 inline 8-bit counters): 40924 [0x8760ca0, 0x876ac7c), INFO: Loaded 1 PC tables (40924 PCs): 40924 [0x86c2544,0x8712424), /out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =====...
c
4d2510757d797781aed92193012294e7732afe9a
https://github.com/Blosc/c-blosc2/commit/8a058b7a6be4d7e47a9af5831c454fca8c725dd4
A heap-buffer-overflow occurs when reading frame metalayers due to improper boundary checking with the variable header_pos in the code. The header_pos variable is used to check boundaries when reading names and offsets, but increasing header_pos when seeking to another offset in the header to read metadata leads to out...
arvo:33264
n132/arvo:33264-vul
/src/c-blosc2
[ { "end_line": 2723, "function_name": "_blosc_getitem", "start_line": 2575, "target_file": "/src/c-blosc2/blosc/blosc2.c" } ]
Heap-buffer-overflow READ {*}
c-blosc2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1884806367 INFO: Loaded 1 modules (44208 inline 8-bit counters): 44208 [0xdca180, 0xdd4e30), INFO: Loaded 1 PC tables (44208 PCs): 44208 [0xac4c70,0xb71770), /out/decompress_frame_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =========...
c
77b7dfd41f4b8ae7cc12c8babd547829a84435da
https://github.com/Blosc/c-blosc2/commit/4a727370b1c2e9746434c00bf2236db86c31ea5c
null
arvo:33318
n132/arvo:33318-vul
/src/wasm3
[ { "end_line": 450, "function_name": "Push", "start_line": 417, "target_file": "/src/wasm3/source/m3_compile.c" }, { "end_line": 322, "function_name": "EvaluateExpression", "start_line": 247, "target_file": "/src/wasm3/source/m3_env.c" } ]
Heap-buffer-overflow WRITE 8
wasm3
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2755559315 INFO: Loaded 1 modules (3135 inline 8-bit counters): 3135 [0x827380, 0x827fbf), INFO: Loaded 1 PC tables (3135 PCs): 3135 [0x5cba58,0x5d7e48), /out/fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==============================...
cpp
7dd44291c7e6d60f6c358c83557e4e9c8b028e53
https://github.com/wasm3/wasm3/commit/b48695bb940e55c0baa0a3d5740cf48e03643b58
A stack overflow can occur in the EvaluateExpression function due to insufficient detection mechanisms.
arvo:33457
n132/arvo:33457-vul
/src/wasm3
[ { "end_line": 64, "function_name": "NewCodePage", "start_line": 15, "target_file": "/src/wasm3/source/m3_code.c" } ]
Heap-buffer-overflow WRITE 4
wasm3
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1082924794 INFO: Loaded 1 modules (3291 inline 8-bit counters): 3291 [0x82e7d0, 0x82f4ab), INFO: Loaded 1 PC tables (3291 PCs): 3291 [0x5d3f90,0x5e0d40), /out/fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==============================...
c
58488085f2d3b317a2e52515d1278cd1f90516d1
https://github.com/wasm3/wasm3/commit/8f3986a66c390e1125493531648b828099fab982
null
arvo:33474
n132/arvo:33474-vul
/src/geos
[ { "end_line": 270, "function_name": "OverlayNG::computeEdgeOverlay", "start_line": 206, "target_file": "/src/geos/src/operation/overlayng/OverlayNG.cpp" } ]
Stack-use-after-scope READ 8
geos
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3401105747 INFO: Loaded 1 modules (49715 inline 8-bit counters): 49715 [0xd4e408, 0xd5a63b), INFO: Loaded 1 PC tables (49715 PCs): 49715 [0xd5a640,0xe1c970), /out/fuzz_geo2: Running 1 inputs 1 time(s) each. Running: /tmp/poc =======================...
cpp
5f4af4116e39ec9f859d8a64adc74cd4f4ffb349
https://git.osgeo.org/gitea/geos/geos/commit/f593230f5907260096202ef0302abe99b81c0bf7
A security vulnerability exists where the stack allocated envelope is not properly ensured to be available to edgeNodingBuilder, potentially leading to unsafe behavior.
arvo:33554
n132/arvo:33554-vul
/src/wasm3
[ { "end_line": 327, "function_name": "TouchSlot", "start_line": 322, "target_file": "/src/wasm3/source/m3_compile.c" } ]
Heap-buffer-overflow WRITE 8
wasm3
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzzer ================================================================= ==1280==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d0000000d0 at pc 0x0000004fa775 bp 0x7ffdb91d2910 sp 0x7ffdb91d2908 WRITE of size 8 at 0x60d000000...
cpp
7db4a5c3b47db9a1f7f0a61c57a8dc72f7425462
https://github.com/wasm3/wasm3/commit/321ba58316e77b5f4d977897aaa4bdbe43a5e38b
null
arvo:33556
n132/arvo:33556-vul
/src/lxc
[ { "end_line": 2185, "function_name": "parse_lxc_mntopts", "start_line": 2128, "target_file": "/src/lxc/src/lxc/conf.c" } ]
Heap-buffer-overflow WRITE {*}
lxc
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3809674574 INFO: Loaded 1 modules (19097 inline 8-bit counters): 19097 [0xacb4c0, 0xacff59), INFO: Loaded 1 PC tables (19097 PCs): 19097 [0xacff60,0xb1a8f0), /out/fuzz-lxc-define-load: Running 1 inputs 1 time(s) each. Running: /tmp/poc ============...
c
d97d9e9ff9ece65106901d4d6a548296d4bbbcbd
https://github.com/lxc/lxc/commit/2e5c468aa59b6458d2894e7b5c730ca251e84b57
A buffer overrun occurs in the parse_lxc_mntopts() function in conf, where the dest buffer is not properly bounded.
arvo:33663
n132/arvo:33663-vul
/src/wasm3
[ { "end_line": 49, "function_name": "LLVMFuzzerTestOneInput", "start_line": 15, "target_file": "/src/wasm3/platforms/app_fuzz/fuzzer.c" } ]
UNKNOWN WRITE
wasm3
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1645362868 INFO: Loaded 1 modules (3370 inline 8-bit counters): 3370 [0x82d420, 0x82e14a), INFO: Loaded 1 PC tables (3370 PCs): 3370 [0x5d0938,0x5ddbd8), /out/fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:DEADLYSIGNAL ...
c
bc32ee0367d6736edd41c4d94b96cca5d096aaa8
https://github.com/wasm3/wasm3/commit/8cb2fd424309fa6ff70cf00bfcedc4e66d3355c0
null
arvo:3376
n132/arvo:3376-vul
/src/openthread
[ { "end_line": 299, "function_name": "Leader::HandleCommissioningSet", "start_line": 199, "target_file": "/src/openthread/src/core/thread/network_data_leader_ftd.cpp" } ]
Stack-buffer-overflow READ 2
openthread
asan
INFO: Seed: 3473626803 INFO: Loaded 1 modules (13038 guards): 13038 [0x9ce3d0, 0x9daf88), /out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==15244:15244==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f2d2ac8071f ...
cpp
0139cc4195e77fe15ee5f684745d16aa990d01f6
https://github.com/openthread/openthread/commit/ba148cf5bf7fa7cc445fb53c4aa88886d01e76d0
A security vulnerability exists in HandleCommissioningSet() due to missing validation when reading the Commissioning Session ID TLV, which may allow processing of malformed or malicious TLVs.
arvo:33762
n132/arvo:33762-vul
/src/pcl
[ { "end_line": 324, "function_name": "PLYReader::vertexListPropertyContentCallback", "start_line": 310, "target_file": "/src/pcl/io/src/ply_io.cpp" } ]
Heap-buffer-overflow WRITE 8
pcl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2394693894 INFO: Loaded 1 modules (17059 inline 8-bit counters): 17059 [0xa174f0, 0xa1b793), INFO: Loaded 1 PC tables (17059 PCs): 17059 [0xa1b798,0xa5e1c8), /out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===============...
cpp
09e914b0b3b13c07710e814d71df3ff958945ba3
https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae
null
arvo:33844
n132/arvo:33844-vul
/src/binutils-gdb
[ { "end_line": 416, "function_name": "vms_traverse_index", "start_line": 244, "target_file": "/src/binutils-gdb/bfd/vms-lib.c" } ]
Stack-buffer-overflow READ {*}
binutils-gdb
asan
INFO: Seed: 2918566430 INFO: Loaded 1 modules (144671 inline 8-bit counters): 144671 [0x1a9eb50, 0x1ac206f), INFO: Loaded 1 PC tables (144671 PCs): 144671 [0x140fdb8,0x1644fa8), /out/fuzz_bfd: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==5724...
c
5318ba65f8641ddc05e330c8545f9922cd3c48d6
https://github.com/bminor/binutils-gdb/commit/c38c6234f2b2425431d28449f609172aa2de549c
A stack-buffer-overflow occurs in vms-lib.c at line 367 within the vms_traverse_index function due to not accounting for the vms_kbn size when performing sanity checks on keylen.
arvo:33854
n132/arvo:33854-vul
/src/serenity
[ { "end_line": 1981, "function_name": "Parser::parse_heredoc_initiation_record", "start_line": 1913, "target_file": "/src/serenity/Userland/Shell/Parser.cpp" } ]
Bad-cast
serenity
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 423026438 INFO: Loaded 1 modules (69909 inline 8-bit counters): 69909 [0xdd2970, 0xde3a85), INFO: Loaded 1 PC tables (69909 PCs): 69909 [0xde3a88,0xef4bd8), /out/FuzzShell: Running 1 inputs 1 time(s) each. Running: /tmp/poc /src/serenity/Userland/S...
cpp
f18895c0d632f771ea7dc5d2d8d96852707a7960
https://github.com/SerenityOS/serenity/commit/f1d49d391ee3b466b758e8d6d2301eccd1eb382c
A security vulnerability exists in the Shell where non-bareword nodes are allowed as part of a heredoc key.
arvo:33927
n132/arvo:33927-vul
/src/sleuthkit
[ { "end_line": 1676, "function_name": "hfs_find_highest_inum_cb", "start_line": 1660, "target_file": "/src/sleuthkit/tsk/fs/hfs.c" } ]
Heap-buffer-overflow READ 1
sleuthkit
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2874948304 INFO: Loaded 1 modules (18770 inline 8-bit counters): 18770 [0xaf8cb8, 0xafd60a), INFO: Loaded 1 PC tables (18770 PCs): 18770 [0x7ec7f8,0x835d18), /out/sleuthkit_fls_hfs_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ========...
cpp
634c3ceaa9405c434867d9516bb4fc211fb7acdb
https://github.com/sleuthkit/sleuthkit/commit/9cabe33ee9c6f1098e7866c0d05217d948e0b19c
null
arvo:33956
n132/arvo:33956-vul
/src/zstd
[ { "end_line": 2129, "function_name": "ZSTD_compressBlock_lazy_extDict_generic", "start_line": 1937, "target_file": "/src/zstd/lib/compress/zstd_lazy.c" } ]
UNKNOWN READ
zstd
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/dictionary_stream_round_trip AddressSanitizer:DEADLYSIGNAL ================================================================= ==527==ERROR: AddressSanitizer: SEGV on unknown address 0x62f10000b1a0 (pc 0x000000610bb9 bp 0x7ffc20664a70 sp 0x7f...
cpp
6f40571ae2feb8bfa0a56f9871b6ee3084085fc2
https://github.com/facebook/zstd/commit/e6c8a5dd40359801bf297dca3be48e38c85ed6c2
null
arvo:33991
n132/arvo:33991-vul
/src/readstat
[ { "end_line": 764, "function_name": "sav_process_row", "start_line": 682, "target_file": "/src/readstat/src/spss/readstat_sav_read.c" } ]
Heap-buffer-overflow READ 1
readstat
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3136895310 INFO: Loaded 1 modules (1483 inline 8-bit counters): 1483 [0x7e1480, 0x7e1a4b), INFO: Loaded 1 PC tables (1483 PCs): 1483 [0x5949f0,0x59a6a0), /out/fuzz_format_sav: Running 1 inputs 1 time(s) each. Running: /tmp/poc =====================...
c
38d4418e00e67e5a064e2f0995b500336e7c92de
https://github.com/WizardMac/ReadStat/commit/c7baae72b36acdc24f56ad48d3e859850fdbdc2b
A buffer overflow occurs if raw_str_used underflows and becomes a very large number, which is then used as the size of a string.
arvo:34013
n132/arvo:34013-vul
/src/php-src
[ { "end_line": 56, "function_name": "fuzzer_execute_ex", "start_line": 38, "target_file": "/src/php-src/sapi/fuzzer/fuzzer-execute.c" } ]
Stack-use-after-return READ 4
php-src
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4210945017 INFO: Loaded 1 modules (133255 inline 8-bit counters): 133255 [0x96d7560, 0x96f7de7), INFO: Loaded 1 PC tables (133255 PCs): 133255 [0x96f7de8,0x97fc220), /out/php-fuzz-execute: Running 1 inputs 1 time(s) each. Running: /tmp/poc ========...
cpp
e5b6f43ec7813392d83ea586b7902e0396a1f792
https://github.com/php/php-src/commit/ed33262dbbc9a39c43c5de75be6aa89c1a3a71a8
A vulnerability exists where destructors are not disabled on fuzzer bailout. When a bailout switches from a fiber back to the main stack, the code attempts to destroy the fiber, which is unsafe and can lead to errors. This behavior deviates from the normal handling of fatal errors, where destructors are typically disab...
arvo:34025
n132/arvo:34025-vul
/src/fluent-bit
[ { "end_line": 483, "function_name": "ra_translate_keymap", "start_line": 416, "target_file": "/src/fluent-bit/src/flb_record_accessor.c" } ]
Stack-buffer-overflow READ {*}
fluent-bit
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3845903800 INFO: Loaded 1 modules (5841 inline 8-bit counters): 5841 [0x8c5ae0, 0x8c71b1), INFO: Loaded 1 PC tables (5841 PCs): 5841 [0x8c71b8,0x8ddec8), /out/flb-it-fuzz-record_ac_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each. Running: /tmp/poc ...
c
2766d32cb4699a271128c056e452cff51031a0d0
https://github.com/fluent/fluent-bit/commit/0ec1a7b309ec29904d9f855c495dcd550da74d57
null