task_id
stringlengths
8
10
docker_image
stringlengths
17
19
basedir
stringclasses
157 values
target_functions
listlengths
1
3
crash_type
stringclasses
85 values
project_name
stringclasses
157 values
sanitizer
stringclasses
3 values
sanitizer_output
stringlengths
1.13k
6.5M
language
stringclasses
2 values
vuln_commit
stringlengths
40
40
fix
stringlengths
69
110
vulnerability_description
stringlengths
38
824
arvo:34069
n132/arvo:34069-vul
/src/sleuthkit
[ { "end_line": 1676, "function_name": "hfs_find_highest_inum_cb", "start_line": 1660, "target_file": "/src/sleuthkit/tsk/fs/hfs.c" } ]
Heap-buffer-overflow READ 1
sleuthkit
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2506760103 INFO: Loaded 1 modules (18770 inline 8-bit counters): 18770 [0xaf8cb8, 0xafd60a), INFO: Loaded 1 PC tables (18770 PCs): 18770 [0x7ec7f8,0x835d18), /out/sleuthkit_fls_hfs_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ========...
cpp
634c3ceaa9405c434867d9516bb4fc211fb7acdb
https://github.com/sleuthkit/sleuthkit/commit/9cabe33ee9c6f1098e7866c0d05217d948e0b19c
null
arvo:34116
n132/arvo:34116-vul
/src/fluent-bit
[ { "end_line": 232, "function_name": "flb_parser_json_do", "start_line": 29, "target_file": "/src/fluent-bit/src/flb_parser_json.c" } ]
Heap-double-free
fluent-bit
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/flb-it-fuzz-parser_fuzzer_OSSFUZZ [2025/04/10 07:44:52] [ info] Configuration: [2025/04/10 07:44:52] [ info] flush time | 5.000000 seconds [2025/04/10 07:44:52] [ info] grace | 5 seconds [2025/04/10 07:44:52] [ info] daemon ...
cpp
8a3d5029d3e5e9237d39bb17d7acd40c08067862
https://github.com/fluent/fluent-bit/commit/0111149ce44b28cb6b5af710009bd3a2c14d8eb9
A double-free vulnerability exists in the JSON parser, which can lead to memory corruption or crashes.
arvo:34134
n132/arvo:34134-vul
/src/pcl
[ { "end_line": 293, "function_name": "PLYReader::vertexScalarPropertyCallback", "start_line": 279, "target_file": "/src/pcl/io/src/ply_io.cpp" } ]
Heap-buffer-overflow WRITE 4
pcl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3829060578 INFO: Loaded 1 modules (17059 inline 8-bit counters): 17059 [0xa174f0, 0xa1b793), INFO: Loaded 1 PC tables (17059 PCs): 17059 [0xa1b798,0xa5e1c8), /out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===============...
cpp
09e914b0b3b13c07710e814d71df3ff958945ba3
https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae
null
arvo:34298
n132/arvo:34298-vul
/src/espeak-ng
[ { "end_line": 544, "function_name": "LookupLetter", "start_line": 477, "target_file": "/src/espeak-ng/src/libespeak-ng/numbers.c" } ]
Heap-use-after-free READ 4
espeak-ng
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2741214098 INFO: Loaded 1 modules (10291 inline 8-bit counters): 10291 [0x8bf420, 0x8c1c53), INFO: Loaded 1 PC tables (10291 PCs): 10291 [0x8c1c58,0x8e9f88), /out/ssml-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =====================...
c
1f76c4b8bd320714aa61ad8abb527c5d92cc5164
https://github.com/espeak-ng/espeak-ng/commit/1da9ad10e80f2e2365c4c00b532fe908b4b8fe19
null
arvo:34332
n132/arvo:34332-vul
/src/espeak-ng
[ { "end_line": 2702, "function_name": "TranslateClause", "start_line": 1940, "target_file": "/src/espeak-ng/src/libespeak-ng/translate.c" } ]
Stack-buffer-overflow READ 16
espeak-ng
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 83496935 INFO: Loaded 1 modules (10263 inline 8-bit counters): 10263 [0x8bf1e0, 0x8c19f7), INFO: Loaded 1 PC tables (10263 PCs): 10263 [0x8c19f8,0x8e9b68), /out/ssml-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =======================...
c
7b9c99cec7b0c517049d39cbbee610c3a8407fa4
https://github.com/espeak-ng/espeak-ng/commit/26a675543c63832e37ec780a6c30e49707df1db4
null
arvo:3438
n132/arvo:3438-vul
/src/librawspeed
[ { "end_line": 77, "function_name": "UncompressedDecompressor::sanityCheck", "start_line": 68, "target_file": "/src/librawspeed/src/librawspeed/decompressors/UncompressedDecompressor.cpp" } ]
Use-of-uninitialized-value
librawspeed
msan
INFO: Seed: 36543392 INFO: Loaded 1 modules (11427 guards): 11427 [0xc70010, 0xc7b29c), /out/FiffParserFuzzer-GetDecoder-Decode: Running 1 inputs 1 time(s) each. Running: /tmp/poc Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside [0x71e000000080, 64) ==3430==WARNING: MemorySanitizer: use-of-u...
cpp
d0b1f77c39ca6c1590512f445725d8c41c233c06
https://github.com/darktable-org/rawspeed/commit/ea2ce48df48c754e0e1fd459101085b344c70eaf
The vulnerability occurs in UncompressedDecompressor::sanityCheck(), where the function does not always throw an exception if there is not enough data, potentially allowing truncated cases to be mishandled.
arvo:344
n132/arvo:344-vul
/src/json
[ { "end_line": 7120, "function_name": "from_msgpack_internal", "start_line": 6896, "target_file": "/src/json/src/json.hpp" } ]
Heap-buffer-overflow READ 1
json
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1416559770 INFO: Loaded 1 modules (921 inline 8-bit counters): 921 [0x6599c8, 0x659d61), INFO: Loaded 1 PC tables (921 PCs): 921 [0x604ad8,0x608468), /out/fuzzer-parse_msgpack: Running 1 inputs 1 time(s) each. Running: /tmp/poc ====================...
cpp
383a29a924af973e4cf9d5d2054a60f7d718f0d3
https://github.com/nlohmann/json/commit/f0edab2363ae7dd50ee04bfacdb56f47ed6e7fb7
null
arvo:34461
n132/arvo:34461-vul
/src/libxml2
[ { "end_line": 1121, "function_name": "xmlXIncludeCopyRange", "start_line": 923, "target_file": "/src/libxml2/xinclude.c" } ]
Heap-use-after-free READ 4
libxml2
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/xml < INPUT_FILE or /out/xml INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/xml [-N] afl-fuzz will run N iter...
cpp
53983804ce7f8a9fbe2316286e74bc9f60629694
https://gitlab.gnome.org/GNOME/libxml2/-/commit/8f5ccada05ddd4a1ff8e399ad39fc7cd4bd33325
The functions xmlAddChild() and xmlAddNextSibling() may not attach their second argument, leading to potential issues if the return value is not used instead of the second argument directly.
arvo:3447
n132/arvo:3447-vul
/src/librawspeed
[ { "end_line": 143, "function_name": "FixBadPixelsList", "start_line": 101, "target_file": "/src/librawspeed/src/librawspeed/common/DngOpcodes.cpp" } ]
Heap-buffer-overflow READ 1
librawspeed
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/TiffDecoderFuzzer-DngDecoder < INPUT_FILE or /out/TiffDecoderFuzzer-DngDecoder INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz ...
cpp
55b420a23ab58bb7dc62fb582f205e65d6445270
https://github.com/darktable-org/rawspeed/commit/78846115eaaa0ad13bb36ab87b5d6be2ebd2dc02
The vulnerability exists in DngOpcodes::FixBadPixelsList within the handling of iRectangle2D fullImage, where isPointInside()/isThisInside() considers both points to be valid, potentially resulting in invalid information due to an off-by-one error.
arvo:34533
n132/arvo:34533-vul
/src/espeak-ng
[ { "end_line": 986, "function_name": "ReadClause", "start_line": 467, "target_file": "/src/espeak-ng/src/libespeak-ng/readclause.c" } ]
Heap-buffer-overflow READ 1
espeak-ng
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1021579763 INFO: Loaded 1 modules (10287 inline 8-bit counters): 10287 [0x8bf420, 0x8c1c4f), INFO: Loaded 1 PC tables (10287 PCs): 10287 [0x8c1c50,0x8e9f40), /out/ssml-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =====================...
c
9de65fcb96f7150e899a882460ab8caa57c6efac
https://github.com/espeak-ng/espeak-ng/commit/9decedb8c229e1a4219baceaab7a3d656e889e31
null
arvo:34582
n132/arvo:34582-vul
/src/mruby
[ { "end_line": 2223, "function_name": "mrb_alias_method", "start_line": 2197, "target_file": "/src/mruby/src/class.c" } ]
Use-of-uninitialized-value
mruby
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 556986905 INFO: Loaded 1 modules (14387 inline 8-bit counters): 14387 [0xa4366d, 0xa46ea0), INFO: Loaded 1 PC tables (14387 PCs): 14387 [0x7a10e0,0x7d9410), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc #<Module:0x72f0000101...
c
a3f779c5b6db75d479478a1e774c7e696b92f107
https://github.com/mruby/mruby/commit/e323cd0c6ebdeeb42c267a5fe28cec87ae2f00a0
null
arvo:3461
n132/arvo:3461-vul
/src/librawspeed
[ { "end_line": 144, "function_name": "NefDecoder::decodeRawInternal", "start_line": 65, "target_file": "/src/librawspeed/src/librawspeed/decoders/NefDecoder.cpp" }, { "end_line": 188, "function_name": "NikonDecompressor::decompress", "start_line": 114, "target_file": "/src/libraws...
Use-after-poison WRITE 2
librawspeed
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/TiffDecoderFuzzer-NefDecoder < INPUT_FILE or /out/TiffDecoderFuzzer-NefDecoder INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz ...
cpp
a17791452ef33b56e59ff9f7047775cf523b63f2
https://github.com/darktable-org/rawspeed/commit/55b420a23ab58bb7dc62fb582f205e65d6445270
NikonDecompressor does not enforce that width is a multiple of 2.
arvo:34652
n132/arvo:34652-vul
/src/mruby
[ { "end_line": 363, "function_name": "mrb_format_float", "start_line": 79, "target_file": "/src/mruby/src/fmt_fp.c" } ]
Heap-buffer-overflow WRITE 1
mruby
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2302434623 INFO: Loaded 1 modules (14379 inline 8-bit counters): 14379 [0xa5daf0, 0xa6131b), INFO: Loaded 1 PC tables (14379 PCs): 14379 [0x757bd8,0x78fe88), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ====================...
c
afbc199ed3b0820f156681548bf91290a2be48f4
https://github.com/mruby/mruby/commit/063b49ab8e6a10212c7f88e5b114b90fe59296f7
A vulnerability in fmt_fp.c allows a buffer overflow due to lack of truncation of precision.
arvo:34657
n132/arvo:34657-vul
/src/bitcoin-core
[ { "end_line": 378, "function_name": "ArgsManager::ParseParameters", "start_line": 299, "target_file": "/src/bitcoin-core/src/util/system.cpp" } ]
Heap-buffer-overflow READ 4
bitcoin-core
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 946282615 INFO: Loaded 1 modules (179953 inline 8-bit counters): 179953 [0x564128629288, 0x564128655179), INFO: Loaded 1 PC tables (179953 PCs): 179953 [0x564128655180,0x564128914090), /out/system: Running 1 inputs 1 time(s) each. Running: /tmp/poc...
cpp
260b1d74fee17b64f7a69eca30e4811b961325b5
https://github.com/bitcoin/bitcoin/commit/791f985a60726febca3053453c2710407529fd0a
null
arvo:34691
n132/arvo:34691-vul
/src/mruby
[ { "end_line": 621, "function_name": "mrb_ary_shift_m", "start_line": 581, "target_file": "/src/mruby/src/array.c" } ]
UNKNOWN READ
mruby
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/mruby_fuzzer line 2:795: warning: ambiguous first argument; put parentheses or even spaces AddressSanitizer:DEADLYSIGNAL ================================================================= ==2714==ERROR: AddressSanitizer: SEGV on unknown addr...
c
c019d8d34d2db5de218802d923e6d0197a2ffca0
https://github.com/mruby/mruby/commit/9a72869043e0377ec549a325a074e592f82ef5ed
A vulnerability exists in array.c where negative shift sizes are not checked.
arvo:34695
n132/arvo:34695-vul
/src/fribidi
[ { "end_line": 1432, "function_name": "fribidi_get_par_embedding_levels_ex", "start_line": 514, "target_file": "/src/fribidi/lib/fribidi-bidi.c" } ]
Segv on unknown address
fribidi
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 916491027 INFO: Loaded 1 modules (955 inline 8-bit counters): 955 [0x7a73d8, 0x7a7793), INFO: Loaded 1 PC tables (955 PCs): 955 [0x7a7798,0x7ab348), /out/fribidi-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc MemorySanitizer:DEADLYSIGNA...
c
3ccfb68d2ce9ace5e83fb96b6da45de637522804
https://github.com/fribidi/fribidi/commit/441c173cbb3562f4b89745ac2bbaaa632b4fe9f5
A vulnerability exists where the isolate level can be decreased even if it is already zero.
arvo:34718
n132/arvo:34718-vul
/src/espeak-ng
[ { "end_line": 2702, "function_name": "TranslateClause", "start_line": 1940, "target_file": "/src/espeak-ng/src/libespeak-ng/translate.c" } ]
Global-buffer-overflow READ 4
espeak-ng
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3564941029 INFO: Loaded 1 modules (10263 inline 8-bit counters): 10263 [0x8bf1e0, 0x8c19f7), INFO: Loaded 1 PC tables (10263 PCs): 10263 [0x8c19f8,0x8e9b68), /out/ssml-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =====================...
c
7b9c99cec7b0c517049d39cbbee610c3a8407fa4
https://github.com/espeak-ng/espeak-ng/commit/26a675543c63832e37ec780a6c30e49707df1db4
null
arvo:34755
n132/arvo:34755-vul
/src/libucl
[ { "end_line": 557, "function_name": "ucl_expand_variable", "start_line": 507, "target_file": "/src/libucl/src/ucl_parser.c" } ]
Heap-buffer-overflow READ 1
libucl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1224562556 INFO: Loaded 1 modules (3063 inline 8-bit counters): 3063 [0x807a30, 0x808627), INFO: Loaded 1 PC tables (3063 PCs): 3063 [0x5b3d18,0x5bfc88), /out/ucl_add_string_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===============...
c
852f752708ae0aca40c50976931cbab5277d236c
https://github.com/vstakhov/libucl/commit/f9e544672e24d349f0c69074495f14427b5c8f4e
An out-of-bounds read occurs in ucl_expand_variable when the input ends with a '$', as calling ucl_check_variable in this case results in reading beyond the buffer.
arvo:34766
n132/arvo:34766-vul
/src/libredwg
[ { "end_line": 12096, "function_name": "dxf_tables_read", "start_line": 11941, "target_file": "/src/libredwg/src/in_dxf.c" } ]
UNKNOWN WRITE
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2589232610 INFO: Loaded 1 modules (471864 inline 8-bit counters): 471864 [0x4355380, 0x43c86b8), INFO: Loaded 1 PC tables (471864 PCs): 471864 [0x37b3e50,0x3ee71d0), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer...
c
78ffe2a4064935824b274d38cae3429c940bdc0b
https://github.com/LibreDWG/libredwg/commit/0a390fa7291ee439d2bb2bed998e76302e539b77
null
arvo:34814
n132/arvo:34814-vul
/src/jsoncons
[ { "end_line": 521, "function_name": "decimal128_to_chars", "start_line": 314, "target_file": "/src/jsoncons/include/jsoncons_ext/bson/bson_decimal128.hpp" } ]
Index-out-of-bounds
jsoncons
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3505905121 INFO: Loaded 1 modules (3067 inline 8-bit counters): 3067 [0x7ddff8, 0x7debf3), INFO: Loaded 1 PC tables (3067 PCs): 3067 [0x564298,0x570248), /out/fuzz_bson_encoder: Running 1 inputs 1 time(s) each. Running: /tmp/poc include/jsoncons_ex...
cpp
f60d3f81a327e6f96265794f809cd50e18e9596c
https://github.com/danielaparker/jsoncons/commit/c9c8d81e0e97fff0e4b9a01704ed9cc94fba928c
null
arvo:34960
n132/arvo:34960-vul
/src/fluent-bit
[ { "end_line": 591, "function_name": "parser_conf_file", "start_line": 443, "target_file": "/src/fluent-bit/src/flb_parser.c" }, { "end_line": 700, "function_name": "multiline_parser_conf_file", "start_line": 594, "target_file": "/src/fluent-bit/src/flb_parser.c" } ]
Heap-use-after-free READ 8
fluent-bit
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/flb-it-fuzz-config_fuzzer_OSSFUZZ ================================================================= ==22193==ERROR: AddressSanitizer: heap-use-after-free on address 0x607000000290 at pc 0x000000515038 bp 0x7fff046f3c00 sp 0x7fff046f3bf8 REA...
c
03f3339594bdb472315823db78ca209b7ba319fb
https://github.com/fluent/fluent-bit/commit/8f653c34c0dd46c39e2a5ebf9ff3fe9ec932fc4f
null
arvo:34973
n132/arvo:34973-vul
/src/serenity
[ { "end_line": 152, "function_name": "URLParser::parse_data_url", "start_line": 120, "target_file": "/src/serenity/AK/URLParser.cpp" } ]
Heap-use-after-free READ {*}
serenity
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2258203183 INFO: Loaded 1 modules (6833 inline 8-bit counters): 6833 [0x871028, 0x872ad9), INFO: Loaded 1 PC tables (6833 PCs): 6833 [0x872ae0,0x88d5f0), /out/FuzzURL: Running 1 inputs 1 time(s) each. Running: /tmp/poc Extension byte 0x7d in 1 posi...
cpp
f5c32252866c5d7ccbaec8b860fbe358f86b3b8c
https://github.com/SerenityOS/serenity/commit/4e8e1b7b3a2cd25ab4b69cebea32232496f4a5d3
The parsing of data URLs in URLParser does not conform to the specification, as it cannot parse the components of the MIME type and instead represents it as a string, while the specification requires parsing as a "MIME type record."
arvo:3498
n132/arvo:3498-vul
/src/librawspeed
[ { "end_line": 322, "function_name": "SamsungV2Decompressor::decompressRow", "start_line": 162, "target_file": "/src/librawspeed/src/librawspeed/decompressors/SamsungV2Decompressor.cpp" } ]
Use-after-poison READ 2
librawspeed
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/TiffDecoderFuzzer-SrwDecoder < INPUT_FILE or /out/TiffDecoderFuzzer-SrwDecoder INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz ...
cpp
d505b6d818773a70c26ba6d31e6ae88beb0ecb0c
https://github.com/darktable-org/rawspeed/commit/8cfad9ca0d21986594ef2a9c05ff286a3377f001
In SamsungV2Decompressor::decompressRow(), during the "complex case" for the last 16 pixels of the row, motion (and thus slideOffset) may result in refpixel pointing out of the row bounds.
arvo:35172
n132/arvo:35172-vul
/src/libjxl
[ { "end_line": 1901, "function_name": "JxlDecoderStatus JxlDecoderImageOutBufferSize", "start_line": 1885, "target_file": "/src/libjxl/lib/jxl/decode.cc" } ]
Heap-buffer-overflow WRITE 4
libjxl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1676859255 INFO: Loaded 1 modules (31470 inline 8-bit counters): 31470 [0x563a4ae5d068, 0x563a4ae64b56), INFO: Loaded 1 PC tables (31470 PCs): 31470 [0x563a4ae64b58,0x563a4aedfa38), /out/djxl_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/p...
cpp
e1a5e2f07efe0c32364ee42bd5aef5b1f58d6a6c
https://github.com/libjxl/libjxl/commit/85aa1491b967709701d2d2293627c5cd1c7cb96d
The vulnerability arises from not properly considering orientation in *OutBufferSize, which can lead to mismatches in computed strides and result in memory corruption and/or out-of-bounds writes.
arvo:35202
n132/arvo:35202-vul
/src/fluent-bit
[ { "end_line": 412, "function_name": "LLVMFuzzerTestOneInput", "start_line": 320, "target_file": "/src/fluent-bit/tests/internal/fuzzers/config_fuzzer.c" } ]
Heap-buffer-overflow READ {*}
fluent-bit
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3140651217 INFO: Loaded 1 modules (62444 inline 8-bit counters): 62444 [0x10cb5b0, 0x10da99c), INFO: Loaded 1 PC tables (62444 PCs): 62444 [0x10da9a0,0x11ce860), /out/flb-it-fuzz-config_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each. Running: /tmp...
c
10c3cd58658c20b989db859758a249109041070c
https://github.com/fluent/fluent-bit/commit/1c3811ba12bf924a96c916e2409a0d41c336debf
null
arvo:35209
n132/arvo:35209-vul
/src/zstd
[ { "end_line": 3536, "function_name": "ZSTD_compressSeqStore_singleBlock", "start_line": 3473, "target_file": "/src/zstd/lib/compress/zstd_compress.c" } ]
Heap-buffer-overflow WRITE 1
zstd
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1039954994 INFO: Loaded 1 modules (30457 inline 8-bit counters): 30457 [0xb1bf80, 0xb23679), INFO: Loaded 1 PC tables (30457 PCs): 30457 [0x834a20,0x8ab9b0), /out/simple_compress: Running 1 inputs 1 time(s) each. Running: /tmp/poc =================...
c
89127e5ee2f3c1e141668fa6d4ee91245f05d132
https://github.com/facebook/zstd/commit/05b6773fbcce1075edbe498a821f9a41249cf384
null
arvo:3522
n132/arvo:3522-vul
/src/zstd
[ { "end_line": 676, "function_name": "ZSTD_adjustCParams_internal", "start_line": 646, "target_file": "/src/zstd/lib/compress/zstd_compress.c" } ]
Heap-buffer-overflow WRITE {*}
zstd
asan
INFO: Seed: 3720302180 INFO: Loaded 1 modules (3932 guards): 3932 [0x911b80, 0x9158f0), /out/block_round_trip: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==399==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62a000005ae8 at pc 0x00...
cpp
ee1ed78fcb3d53182c944940e16e697c94087a8b
https://github.com/facebook/zstd/commit/c5d6dde502e4e30c7de4476e82b459361fe2f486
A vulnerability exists in ZSTD_adjustCParams() where performing `size -= 1` can cause the window size to become too small if the source size is 2^n + 1.
arvo:3530
n132/arvo:3530-vul
/src/librawspeed
[ { "end_line": 321, "function_name": "SamsungV2Decompressor::decompressRow", "start_line": 162, "target_file": "/src/librawspeed/src/librawspeed/decompressors/SamsungV2Decompressor.cpp" } ]
Use-after-poison READ 2
librawspeed
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/TiffDecoderFuzzer-SrwDecoder < INPUT_FILE or /out/TiffDecoderFuzzer-SrwDecoder INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz ...
cpp
ac49fc0c341a3546669c13440a51708bf92fadbe
https://github.com/darktable-org/rawspeed/commit/1771ccd2ae924ad6e2c3ac25f0f599acfcde28d1
A security vulnerability exists in SamsungV2Decompressor::decompressRow().
arvo:3531
n132/arvo:3531-vul
/src/librawspeed
[ { "end_line": 85, "function_name": "CrwDecoder::decodeRawInternal", "start_line": 55, "target_file": "/src/librawspeed/src/librawspeed/decoders/CrwDecoder.cpp" }, { "end_line": 312, "function_name": "CrwDecompressor::decompress", "start_line": 211, "target_file": "/src/librawspee...
Use-of-uninitialized-value
librawspeed
msan
INFO: Seed: 2567677566 INFO: Loaded 1 modules (11557 guards): 11557 [0xc7a0d0, 0xc85564), /out/CiffParserFuzzer-GetDecoder-Decode: Running 1 inputs 1 time(s) each. Running: /tmp/poc Uninitialized bytes in __msan_check_mem_is_initialized at offset 128 inside [0x709000000000, 130) ==3429==WARNING: MemorySanitizer: use...
cpp
1771ccd2ae924ad6e2c3ac25f0f599acfcde28d1
https://github.com/darktable-org/rawspeed/commit/0292f76f083f38edb113087250b30a238eeadefd
A vulnerability exists in CrwDecompressor::decompress() due to inefficient handling of row and column processing, where the code unnecessarily checks in the innermost loop whether the full row has been processed, despite the width being a multiple of 4. This can lead to potential logic errors or inefficiencies in decom...
arvo:3560
n132/arvo:3560-vul
/src/librawspeed
[ { "end_line": 139, "function_name": "NefDecoder::decodeRawInternal", "start_line": 65, "target_file": "/src/librawspeed/src/librawspeed/decoders/NefDecoder.cpp" } ]
Use-of-uninitialized-value
librawspeed
msan
INFO: Seed: 898244309 INFO: Loaded 1 modules (11530 guards): 11530 [0xc7a070, 0xc85498), /out/TiffDecoderFuzzer-NefDecoder: Running 1 inputs 1 time(s) each. Running: /tmp/poc Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside [0x7fa19fd24000, 892) ==3429==WARNING: MemorySanitizer: use-of-unini...
cpp
7a65fbbcc26df616b4d602980990929505a4dd74
https://github.com/darktable-org/rawspeed/commit/c6faf275397eb448987e635a2162d807b9608d70
A vulnerability exists in NefDecoder::decodeRawInternal() where IOException is caught, potentially suppressing important error conditions.
arvo:35640
n132/arvo:35640-vul
/src/pcl
[ { "end_line": 293, "function_name": "PLYReader::vertexScalarPropertyCallback", "start_line": 279, "target_file": "/src/pcl/io/src/ply_io.cpp" } ]
Heap-buffer-overflow WRITE 2
pcl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2028852973 INFO: Loaded 1 modules (17059 inline 8-bit counters): 17059 [0xa164f0, 0xa1a793), INFO: Loaded 1 PC tables (17059 PCs): 17059 [0xa1a798,0xa5d1c8), /out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc [pcl::PLYReader...
cpp
09e914b0b3b13c07710e814d71df3ff958945ba3
https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae
null
arvo:35804
n132/arvo:35804-vul
/src/assimp
[ { "end_line": 323, "function_name": "isNumeric", "start_line": 320, "target_file": "/src/assimp/contrib/openddlparser/include/openddlparser/OpenDDLParserUtils.h" } ]
Index-out-of-bounds
assimp
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1370002737 INFO: Loaded 1 modules (239541 inline 8-bit counters): 239541 [0x2b9f380, 0x2bd9b35), INFO: Loaded 1 PC tables (239541 PCs): 239541 [0x2bd9b38,0x2f81688), /out/assimp_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Info, T0: ...
cpp
107371657b39c8cd4bcc8d8865d9071ff17049d2
https://github.com/assimp/assimp/commit/6a3ac623b960905b3450b78e7614453dae0540ed
null
arvo:35876
n132/arvo:35876-vul
/src/php-src
[ { "end_line": 1343, "function_name": "div_function", "start_line": 1301, "target_file": "/src/php-src/Zend/zend_operators.c" } ]
Heap-use-after-free READ 4
php-src
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3163449219 INFO: Loaded 1 modules (119515 inline 8-bit counters): 119515 [0x196dc20, 0x198aefb), INFO: Loaded 1 PC tables (119515 PCs): 119515 [0x198af00,0x1b5dcb0), /out/php-fuzz-execute: Running 1 inputs 1 time(s) each. Running: /tmp/poc ========...
cpp
52a00fe776eebd0e5a3370f0e4be45f40ef999a7
https://github.com/php/php-src/commit/62ecf54f35e227d09d19ec40920f7bb8d29e9356
A use after free vulnerability exists in compound division by zero, where destroying the result operand early can lead to accessing freed memory if the division fails. The division result is not safely handled, risking use after free when the original value needs to be preserved.
arvo:35891
n132/arvo:35891-vul
/src/libjxl
[ { "end_line": 79, "function_name": "InvHSqueeze", "start_line": 17, "target_file": "/src/libjxl/lib/jxl/modular/transform/squeeze.cc" } ]
Use-of-uninitialized-value
libjxl
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1527690533 INFO: Loaded 1 modules (31019 inline 8-bit counters): 31019 [0x558b1c182938, 0x558b1c18a263), INFO: Loaded 1 PC tables (31019 PCs): 31019 [0x558b1c18a268,0x558b1c203518), /out/djxl_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/p...
cpp
ea7c9f7ff39b1385ee558ca536baac1e41b19861
https://github.com/libjxl/libjxl/commit/f8dd198a2d8ad4f4fccd591349a384bc0eff5ec9
null
arvo:35902
n132/arvo:35902-vul
/src/h3
[ { "end_line": 444, "function_name": "h3NeighborRotations", "start_line": 308, "target_file": "/src/h3/src/h3lib/lib/algos.c" } ]
Index-out-of-bounds
h3
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2549629819 INFO: Loaded 1 modules (1750 inline 8-bit counters): 1750 [0x7169c8, 0x71709e), INFO: Loaded 1 PC tables (1750 PCs): 1750 [0x4dbc08,0x4e2968), /out/h3_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc /src/h3/src/h3lib/lib/algos...
c
4ce808fd4c4b2b626da770f074fcf2d916390974
https://github.com/uber/h3/commit/fda03e297b1abe3ce8277794a7de8970601ed7c9
A potential security vulnerability exists in the kRing function, where an invalid digit can cause a segmentation fault.
arvo:36098
n132/arvo:36098-vul
/src/sleuthkit
[ { "end_line": 1185, "function_name": "APFSBtreeNodeIterator<APFSJObjBtreeNode>::init_value<void>", "start_line": 1156, "target_file": "/src/sleuthkit/tsk/fs/tsk_apfs.hpp" } ]
Heap-use-after-free READ 8
sleuthkit
asan
================================================================= ==20027==ERROR: AddressSanitizer: heap-use-after-free on address 0x6210000030e0 at pc 0x0000008534e8 bp 0x7ffe4924bc30 sp 0x7ffe4924bc28 READ of size 8 at 0x6210000030e0 thread T0 SCARINESS: 51 (8-byte-read-heap-use-after-free) #0 0x8534e7 in APFSJOb...
cpp
e2c2570a456fb2ca5635e613bfd89d1fac9cb063
https://github.com/sleuthkit/sleuthkit/commit/4518aa4e2397957959c280e50010f843d6e6107e
null
arvo:36205
n132/arvo:36205-vul
/src/php-src
[ { "end_line": 1048, "function_name": "zend_std_unset_property", "start_line": 985, "target_file": "/src/php-src/Zend/zend_object_handlers.c" } ]
Heap-use-after-free READ 8
php-src
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 400022034 INFO: Loaded 1 modules (119522 inline 8-bit counters): 119522 [0x196dce0, 0x198afc2), INFO: Loaded 1 PC tables (119522 PCs): 119522 [0x198afc8,0x1b5dde8), /out/php-fuzz-execute: Running 1 inputs 1 time(s) each. Running: /tmp/poc =========...
cpp
6fd880890ceb099d8d0b785979764d08b390699f
https://github.com/php/php-src/commit/567e53ea581d783ec69459663c7727cd6449de0a
null
arvo:3621
n132/arvo:3621-vul
/src/librawspeed
[ { "end_line": 107, "function_name": "OrfDecoder::decodeRawInternal", "start_line": 64, "target_file": "/src/librawspeed/src/librawspeed/decoders/OrfDecoder.cpp" } ]
Use-of-uninitialized-value
librawspeed
msan
INFO: Seed: 3161911407 INFO: Loaded 1 modules (11493 guards): 11493 [0xc78000, 0xc83394), /out/RawParserFuzzer-GetDecoder-Decode: Running 1 inputs 1 time(s) each. Running: /tmp/poc Uninitialized bytes in __msan_check_mem_is_initialized at offset 308 inside [0x7fb254ae2000, 16448) ==3430==WARNING: MemorySanitizer: us...
cpp
10b2886f2eef8087df5db76c16d4deb8fe3470d7
https://github.com/darktable-org/rawspeed/commit/428f6a96d7db330045cfb5e352c6df759fe79bb7
A vulnerability exists in OrfDecoder::decodeRawInternal() where IOException is caught, potentially suppressing important error handling.
arvo:36463
n132/arvo:36463-vul
/src/mupdf
[ { "end_line": 2055, "function_name": "fz_draw_clip_image_mask", "start_line": 1922, "target_file": "/src/mupdf/source/fitz/draw-device.c" } ]
Heap-use-after-free READ 1
mupdf
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3884366304 INFO: Loaded 1 modules (114847 inline 8-bit counters): 114847 [0x3847220, 0x38632bf), INFO: Loaded 1 PC tables (114847 PCs): 114847 [0x1343600,0x1503ff0), /out/pdf_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc error: cannot ...
cpp
67fd576d694d9cc171cd720cd3ea9dac8105ab64
https://github.com/ArtifexSoftware/mupdf/commit/45003f3921774577968e209a5f6900022a5cc9bf
null
arvo:36476
n132/arvo:36476-vul
/src/libtpms
[ { "end_line": 4288, "function_name": "INDEX_ORDERLY_RAM_Marshal", "start_line": 4217, "target_file": "/src/libtpms/src/tpm2/NVMarshal.c" }, { "end_line": 4393, "function_name": "INDEX_ORDERLY_RAM_Unmarshal", "start_line": 4290, "target_file": "/src/libtpms/src/tpm2/NVMarshal.c" ...
Stack-buffer-overflow READ 4
libtpms
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3559214097 INFO: Loaded 1 modules (21602 inline 8-bit counters): 21602 [0xa8f0d0, 0xa94532), INFO: Loaded 1 PC tables (21602 PCs): 21602 [0x794f40,0x7e9560), /out/fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ============================...
cpp
17255da54cf8354d02369f1323dc50cfb87e2bf4
https://github.com/stefanberger/libtpms/commit/034a5c02488cf7f0048e130177fc71c9e626e135
A vulnerability exists in the NVMarshal function in the tpm2 codebase, where the marshalling and unmarshalling of NVRAM entries in the s_indexOrderlyRam array incorrectly assumes the presence of a 0-sized terminating node. The entries may instead fill the 512-byte array completely, leaving no space for an NV_RAM_HEADER...
arvo:36500
n132/arvo:36500-vul
/src/mupdf
[ { "end_line": 2055, "function_name": "fz_draw_clip_image_mask", "start_line": 1922, "target_file": "/src/mupdf/source/fitz/draw-device.c" } ]
Use-of-uninitialized-value
mupdf
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4122252768 INFO: Loaded 1 modules (114850 inline 8-bit counters): 114850 [0x3def8ed, 0x3e0b98f), INFO: Loaded 1 PC tables (114850 PCs): 114850 [0x1908d40,0x1ac9760), /out/pdf_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc error: expecte...
cpp
67fd576d694d9cc171cd720cd3ea9dac8105ab64
https://github.com/ArtifexSoftware/mupdf/commit/45003f3921774577968e209a5f6900022a5cc9bf
null
arvo:36504
n132/arvo:36504-vul
/src/mupdf
[ { "end_line": 2055, "function_name": "fz_draw_clip_image_mask", "start_line": 1922, "target_file": "/src/mupdf/source/fitz/draw-device.c" } ]
Use-of-uninitialized-value
mupdf
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 826540038 INFO: Loaded 1 modules (114850 inline 8-bit counters): 114850 [0x3def8ed, 0x3e0b98f), INFO: Loaded 1 PC tables (114850 PCs): 114850 [0x1908d40,0x1ac9760), /out/pdf_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc error: cannot r...
cpp
67fd576d694d9cc171cd720cd3ea9dac8105ab64
https://github.com/ArtifexSoftware/mupdf/commit/45003f3921774577968e209a5f6900022a5cc9bf
null
arvo:36519
n132/arvo:36519-vul
/src/mupdf
[ { "end_line": 2055, "function_name": "fz_draw_clip_image_mask", "start_line": 1922, "target_file": "/src/mupdf/source/fitz/draw-device.c" } ]
Heap-use-after-free READ 8
mupdf
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1975959930 INFO: Loaded 1 modules (114847 inline 8-bit counters): 114847 [0x3847220, 0x38632bf), INFO: Loaded 1 PC tables (114847 PCs): 114847 [0x1343600,0x1503ff0), /out/pdf_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc error: cannot ...
cpp
67fd576d694d9cc171cd720cd3ea9dac8105ab64
https://github.com/ArtifexSoftware/mupdf/commit/45003f3921774577968e209a5f6900022a5cc9bf
null
arvo:3658
n132/arvo:3658-vul
/src/librawspeed
[ { "end_line": 221, "function_name": "ArwDecoder::decodeRawInternal", "start_line": 108, "target_file": "/src/librawspeed/src/librawspeed/decoders/ArwDecoder.cpp" } ]
Use-of-uninitialized-value
librawspeed
msan
INFO: Seed: 3114620701 INFO: Loaded 1 modules (11471 guards): 11471 [0xc77fa0, 0xc832dc), /out/RawSpeedFuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside [0x7fd2cec1f000, 7762) ==3430==WARNING: MemorySanitizer: use-of-uninitialized-val...
cpp
c3cbb05c8d4f82f6b825b59533bbb91c672118e3
https://github.com/darktable-org/rawspeed/commit/a9d287fd5a16d593aa742c4f0b2d1782a6fc12d7
A vulnerability exists in ArwDecoder where IOException's are caught, potentially suppressing important error conditions.
arvo:36663
n132/arvo:36663-vul
/src/pcl
[ { "end_line": 293, "function_name": "PLYReader::vertexScalarPropertyCallback", "start_line": 279, "target_file": "/src/pcl/io/src/ply_io.cpp" } ]
Heap-buffer-overflow WRITE 4
pcl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3567351496 INFO: Loaded 1 modules (17059 inline 8-bit counters): 17059 [0xa144f0, 0xa18793), INFO: Loaded 1 PC tables (17059 PCs): 17059 [0xa18798,0xa5b1c8), /out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc [pcl::PLYReader...
cpp
09e914b0b3b13c07710e814d71df3ff958945ba3
https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae
null
arvo:367
n132/arvo:367-vul
/src/json
[ { "end_line": 7605, "function_name": "from_cbor_internal", "start_line": 7136, "target_file": "/src/json/src/json.hpp" } ]
Heap-buffer-overflow READ 1
json
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2941806452 INFO: Loaded 1 modules (1061 inline 8-bit counters): 1061 [0x65ad98, 0x65b1bd), INFO: Loaded 1 PC tables (1061 PCs): 1061 [0x6053f8,0x609648), /out/fuzzer-parse_cbor: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===================...
cpp
d7029c37aad0e93033242123e7a7a05a1c76bed4
https://github.com/nlohmann/json/commit/cf9bf2d9136a9d1c2131f83aa493bb03f36849ab
null
arvo:36718
n132/arvo:36718-vul
/src/fluent-bit
[ { "end_line": 220, "function_name": "LLVMFuzzerTestOneInput", "start_line": 32, "target_file": "/src/fluent-bit/tests/internal/fuzzers/utils_fuzzer.c" } ]
Heap-buffer-overflow READ {*}
fluent-bit
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2996663451 INFO: Loaded 1 modules (2937 inline 8-bit counters): 2937 [0x88a320, 0x88ae99), INFO: Loaded 1 PC tables (2937 PCs): 2937 [0x88aea0,0x896630), /out/flb-it-fuzz-utils_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each. Running: /tmp/poc ====...
c
26c796fc6fb6b65a1a4ec92acf272e763a756c80
https://github.com/fluent/fluent-bit/commit/05144b2d99a4d88db561d0329e4bd97453d466e1
null
arvo:368
n132/arvo:368-vul
/src/freetype2
[ { "end_line": 1377, "function_name": "cff_blend_doBlend", "start_line": 1279, "target_file": "/src/freetype2/src/cff/cffload.c" } ]
Heap-use-after-free READ 1
freetype2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3347186936 INFO: Loaded 1 modules (22218 inline 8-bit counters): 22218 [0x8c2d58, 0x8c8422), INFO: Loaded 1 PC tables (22218 PCs): 22218 [0x7fa330,0x850fd0), /out/ftfuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ========================...
cpp
63765a8f2af9d379f5571c359fb7133b35878924
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=bdec162d921d69f63b992a74b32542b973a6c117
A vulnerability exists in `src/cff/cffload.c` within the `cff_blend_doBlend` function, where multiple `blend` operators in a row are not handled correctly. The issue arises from not adjusting `parser->stack` pointers into `subFont->blend_stack` after reallocation.
arvo:3680
n132/arvo:3680-vul
/src/librawspeed
[ { "end_line": 686, "function_name": "NefDecoder::DecodeNikonSNef", "start_line": 580, "target_file": "/src/librawspeed/src/librawspeed/decoders/NefDecoder.cpp" } ]
Use-of-uninitialized-value
librawspeed
msan
INFO: Seed: 2446076068 INFO: Loaded 1 modules (11437 guards): 11437 [0xc75e90, 0xc81144), /out/TiffDecoderFuzzer-NefDecoder: Running 1 inputs 1 time(s) each. Running: /tmp/poc Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside [0x733000000240, 144) ==3430==WARNING: MemorySanitizer: use-of-unin...
cpp
afffdab5c7577af933fe30aafa8357177df08df5
https://github.com/darktable-org/rawspeed/commit/90d9e92bdbed0af58fdce4eb3b9b3af6698746ab
The NefDecoder::DecodeNikonSNef() function accepts truncated images.
arvo:36930
n132/arvo:36930-vul
/src/mruby
[ { "end_line": 3418, "function_name": "codegen", "start_line": 1874, "target_file": "/src/mruby/mrbgems/mruby-compiler/core/codegen.c" } ]
UNKNOWN READ
mruby
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4120862395 INFO: Loaded 1 modules (15617 inline 8-bit counters): 15617 [0xa8bf50, 0xa8fc51), INFO: Loaded 1 PC tables (15617 PCs): 15617 [0x77f138,0x7bc148), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:DEA...
cpp
cd02cef465c12e111a308f87ee899d91774440db
https://github.com/mruby/mruby/commit/06f49b3f84e799f08a80b16054eda916f2d32819
A vulnerability exists in codegen.c where the value is not pushed when the loop is eliminated.
arvo:37041
n132/arvo:37041-vul
/src/pcl
[ { "end_line": 324, "function_name": "PLYReader::vertexListPropertyContentCallback", "start_line": 310, "target_file": "/src/pcl/io/src/ply_io.cpp" } ]
Heap-buffer-overflow WRITE 4
pcl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2729459170 INFO: Loaded 1 modules (17059 inline 8-bit counters): 17059 [0xa14510, 0xa187b3), INFO: Loaded 1 PC tables (17059 PCs): 17059 [0xa187b8,0xa5b1e8), /out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc [pcl::PLYReader...
cpp
09e914b0b3b13c07710e814d71df3ff958945ba3
https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae
null
arvo:37125
n132/arvo:37125-vul
/src/pcl
[ { "end_line": 293, "function_name": "PLYReader::vertexScalarPropertyCallback", "start_line": 279, "target_file": "/src/pcl/io/src/ply_io.cpp" } ]
Heap-buffer-overflow WRITE 2
pcl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 185717075 INFO: Loaded 1 modules (17059 inline 8-bit counters): 17059 [0xa13510, 0xa177b3), INFO: Loaded 1 PC tables (17059 PCs): 17059 [0xa177b8,0xa5a1e8), /out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc [pcl::PLYReader]...
cpp
09e914b0b3b13c07710e814d71df3ff958945ba3
https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae
null
arvo:37158
n132/arvo:37158-vul
/src/mruby
[ { "end_line": 1017, "function_name": "pack_M", "start_line": 958, "target_file": "/src/mruby/mrbgems/mruby-pack/src/pack.c" } ]
Use-of-uninitialized-value
mruby
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3383160667 INFO: Loaded 1 modules (15630 inline 8-bit counters): 15630 [0xa7071d, 0xa7442b), INFO: Loaded 1 PC tables (15630 PCs): 15630 [0x7c6dc0,0x803ea0), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==2591==WARNING: Mem...
c
ad194bd46bd51aa5bfd5863f3ce18dee8a347c29
https://github.com/mruby/mruby/commit/8e5e96239c4e4b4725dbff14ce9f1019e3058de8
null
arvo:37211
n132/arvo:37211-vul
/src/libexif
[ { "end_line": 237, "function_name": "exif_mnote_data_apple_identify", "start_line": 231, "target_file": "/src/libexif/libexif/apple/exif-mnote-data-apple.c" } ]
Heap-buffer-overflow READ 3
libexif
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 943780750 INFO: Loaded 1 modules (2615 inline 8-bit counters): 2615 [0x861a90, 0x8624c7), INFO: Loaded 1 PC tables (2615 PCs): 2615 [0x5f00c8,0x5fa438), /out/exif_loader_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===================...
cpp
d0ebd6eac1f67c9a7b970179c0a88ea2b229c300
https://github.com/libexif/libexif/commit/22799320cc1187868d9a572661d12f0c3f9939b5
A vulnerability exists where the identify function does not check if there is enough data before proceeding, potentially leading to issues when insufficient data is provided.
arvo:37222
n132/arvo:37222-vul
/src/libexif
[ { "end_line": 148, "function_name": "exif_mnote_data_apple_load", "start_line": 56, "target_file": "/src/libexif/libexif/apple/exif-mnote-data-apple.c" } ]
Heap-buffer-overflow READ {*}
libexif
asan
================================================================= ==30438==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61100000013f at pc 0x0000004969b7 bp 0x7fffb987b8f0 sp 0x7fffb987b0b8 READ of size 256 at 0x61100000013f thread T0 SCARINESS: 26 (multi-byte-read-heap-buffer-overflow) #0 0x4969b6 in...
cpp
ebb64dad152c48640a3f3ec6b03182c61a3eb5c6
https://github.com/libexif/libexif/commit/790fb01e1c33c5c83e7f3e051fe6c6d5c3396ade
null
arvo:37238
n132/arvo:37238-vul
/src/espeak-ng
[ { "end_line": 905, "function_name": "TranslateLetter", "start_line": 666, "target_file": "/src/espeak-ng/src/libespeak-ng/numbers.c" } ]
Heap-use-after-free READ 4
espeak-ng
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2997909771 INFO: Loaded 1 modules (10291 inline 8-bit counters): 10291 [0x8bf420, 0x8c1c53), INFO: Loaded 1 PC tables (10291 PCs): 10291 [0x8c1c58,0x8e9f88), /out/ssml-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =====================...
c
1f76c4b8bd320714aa61ad8abb527c5d92cc5164
https://github.com/espeak-ng/espeak-ng/commit/1da9ad10e80f2e2365c4c00b532fe908b4b8fe19
null
arvo:37302
n132/arvo:37302-vul
/src/spice-usbredir
[ { "end_line": 1879, "function_name": "usbredirparser_unserialize", "start_line": 1733, "target_file": "/src/spice-usbredir/usbredirparser/usbredirparser.c" } ]
Use-of-uninitialized-value
spice-usbredir
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2977798090 INFO: Loaded 1 modules (996 inline 8-bit counters): 996 [0x82a998, 0x82ad7c), INFO: Loaded 1 PC tables (996 PCs): 996 [0x82ad80,0x82ebc0), /out/usbredirparserfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==436==WARNING: Memory...
cpp
f2835023d808c3f73d7f2e495968b9568d5c2bef
https://gitlab.freedesktop.org/spice/usbredir.gite37d86c260d95eae53326b14d496ffa85e9e5934
null
arvo:37316
n132/arvo:37316-vul
/src/spice-usbredir
[ { "end_line": 1879, "function_name": "usbredirparser_unserialize", "start_line": 1733, "target_file": "/src/spice-usbredir/usbredirparser/usbredirparser.c" } ]
Use-of-uninitialized-value
spice-usbredir
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1611034802 INFO: Loaded 1 modules (996 inline 8-bit counters): 996 [0x82a998, 0x82ad7c), INFO: Loaded 1 PC tables (996 PCs): 996 [0x82ad80,0x82ebc0), /out/usbredirparserfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==436==WARNING: Memory...
cpp
f2835023d808c3f73d7f2e495968b9568d5c2bef
https://gitlab.freedesktop.org/spice/usbredir.gite37d86c260d95eae53326b14d496ffa85e9e5934
null
arvo:3732
n132/arvo:3732-vul
/src/librawspeed
[ { "end_line": 207, "function_name": "Cr2Decompressor::decodeN_X_Y", "start_line": 112, "target_file": "/src/librawspeed/src/librawspeed/decompressors/Cr2Decompressor.cpp" } ]
Use-of-uninitialized-value
librawspeed
msan
INFO: Seed: 3102954295 INFO: Loaded 1 modules (11416 guards): 11416 [0xc74e10, 0xc80070), /out/FiffParserFuzzer-GetDecoder-Decode: Running 1 inputs 1 time(s) each. Running: /tmp/poc Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside [0x714000000420, 4) ==3430==WARNING: MemorySanitizer: use-of-...
cpp
3ac134fff83de379ee69ba564e355462a628910c
https://github.com/darktable-org/rawspeed/commit/46e80e0624acf65043893f9e708fd701bdbba46b
The vulnerability in Cr2Decompressor::decodeN_X_Y() allows slices to not cover the whole image size.
arvo:37334
n132/arvo:37334-vul
/src/libexif
[ { "end_line": 159, "function_name": "exif_mnote_data_apple_load", "start_line": 56, "target_file": "/src/libexif/libexif/apple/exif-mnote-data-apple.c" } ]
UNKNOWN READ
libexif
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2725011865 INFO: Loaded 1 modules (2624 inline 8-bit counters): 2624 [0x861b10, 0x862550), INFO: Loaded 1 PC tables (2624 PCs): 2624 [0x5f04c8,0x5fa8c8), /out/exif_loader_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:D...
cpp
ead49aedb49015b4095c0d43f1f9ce913791eb52
https://github.com/libexif/libexif/commit/d61e9aaddf4f8af5aecea4935f8feb59f42141c1
null
arvo:37387
n132/arvo:37387-vul
/src/spice-usbredir
[ { "end_line": 1879, "function_name": "usbredirparser_unserialize", "start_line": 1733, "target_file": "/src/spice-usbredir/usbredirparser/usbredirparser.c" } ]
Use-of-uninitialized-value
spice-usbredir
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1007802773 INFO: Loaded 1 modules (996 inline 8-bit counters): 996 [0x82a998, 0x82ad7c), INFO: Loaded 1 PC tables (996 PCs): 996 [0x82ad80,0x82ebc0), /out/usbredirparserfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc Uninitialized bytes in...
cpp
f2835023d808c3f73d7f2e495968b9568d5c2bef
https://gitlab.freedesktop.org/spice/usbredir.gite37d86c260d95eae53326b14d496ffa85e9e5934
null
arvo:37494
n132/arvo:37494-vul
/src/assimp
[ { "end_line": 323, "function_name": "isNumeric", "start_line": 320, "target_file": "/src/assimp/contrib/openddlparser/include/openddlparser/OpenDDLParserUtils.h" } ]
Index-out-of-bounds
assimp
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4279531540 INFO: Loaded 1 modules (239541 inline 8-bit counters): 239541 [0x2b9f380, 0x2bd9b35), INFO: Loaded 1 PC tables (239541 PCs): 239541 [0x2bd9b38,0x2f81688), /out/assimp_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Info, T0: ...
cpp
107371657b39c8cd4bcc8d8865d9071ff17049d2
https://github.com/assimp/assimp/commit/6a3ac623b960905b3450b78e7614453dae0540ed
null
arvo:37575
n132/arvo:37575-vul
/src/libexif
[ { "end_line": 164, "function_name": "exif_mnote_data_apple_load", "start_line": 56, "target_file": "/src/libexif/libexif/apple/exif-mnote-data-apple.c" } ]
UNKNOWN READ
libexif
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1082176627 INFO: Loaded 1 modules (2655 inline 8-bit counters): 2655 [0x862fd0, 0x863a2f), INFO: Loaded 1 PC tables (2655 PCs): 2655 [0x5f1868,0x5fbe58), /out/exif_from_data_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitize...
cpp
a4647a5463102c4b0c5a02461edd4cc085dfc1b6
https://github.com/libexif/libexif/commit/b1e292af7d6ff811755026ec551e37e73ae07469
A vulnerability exists where the bufsize check occurs after a potential integer overflow, allowing the overflow to happen before validation.
arvo:37621
n132/arvo:37621-vul
/src/lua
[ { "end_line": 554, "function_name": "luaD_pretailcall", "start_line": 520, "target_file": "/src/lua/ldo.c" } ]
Heap-buffer-overflow READ 8
lua
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_lua ================================================================= ==212==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000d4f at pc 0x0000004ecefb bp 0x7ffc3ad36a70 sp 0x7ffc3ad36a68 READ of size 16 at 0x60300000...
c
066e0f93c4901e601d93e31fb700f8f66f95feb8
https://github.com/lua/lua/commit/cf613cdc6fa367257fc61c256f63d917350858b5
A vulnerability exists where finalizers can be called with an invalid stack. The call to 'checkstackGC' can trigger finalizers while 'ci' (CallInfo) is only partially updated, leading to inconsistent CallInfo being accessed by the finalizers.
arvo:37687
n132/arvo:37687-vul
/src/libgd
[ { "end_line": 927, "function_name": "gdImageColorTransparent", "start_line": 901, "target_file": "/src/libgd/src/gd.c" } ]
Index-out-of-bounds
libgd
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3058888415 INFO: Loaded 1 modules (2538 inline 8-bit counters): 2538 [0x7501f0, 0x750bda), INFO: Loaded 1 PC tables (2538 PCs): 2538 [0x500150,0x509ff0), /out/gif_target: Running 1 inputs 1 time(s) each. Running: /tmp/poc gd.c:922:2: runtime error:...
cpp
dceb29a6f5e8b0fb5e21d14c39013efcbb9203ee
https://github.com/libgd/libgd/commit/ba14dec6efe9d87fe80fa1d7bd3d5b0583e1320e
The vulnerability occurs because gdImageColorTransparent does not correctly handle the case when im->transparent is set to -1, which is the initial value indicating that no transparent color has been set. This results in undefined behavior due to an out-of-bounds write to im->alpha[im->transparent] in gd.c, specificall...
arvo:37812
n132/arvo:37812-vul
/src/libvips
[ { "end_line": 680, "function_name": "vips_image_guess_interpretation", "start_line": 571, "target_file": "/src/libvips/libvips/iofuncs/header.c" } ]
UNKNOWN READ
libvips
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2474735532 INFO: Loaded 1 modules (238157 inline 8-bit counters): 238157 [0x3f851b0, 0x3fbf3fd), INFO: Loaded 1 PC tables (238157 PCs): 238157 [0x3fbf400,0x43618d0), /out/jpegsave_file_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc (pr...
cpp
b9230edcbe8738b5be46137221b4d3b7ac699a55
https://github.com/libvips/libvips/commit/30897e8e3614ba8a7f2cd1d79a7020ba50a9a463
null
arvo:37866
n132/arvo:37866-vul
/src/wolfmqtt
[ { "end_line": 1016, "function_name": "MqttClient_WaitType", "start_line": 775, "target_file": "/src/wolfmqtt/src/mqtt_client.c" } ]
Heap-buffer-overflow WRITE 4
wolfmqtt
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1173602230 INFO: Loaded 1 modules (14639 inline 8-bit counters): 14639 [0x83cc460, 0x83cfd8f), INFO: Loaded 1 PC tables (14639 PCs): 14639 [0x834603c,0x83629b4), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =============...
cpp
52653a609f99bcd6be7402891b5f5aca288f3e78
https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2
null
arvo:37878
n132/arvo:37878-vul
/src/wolfmqtt
[ { "end_line": 1016, "function_name": "MqttClient_WaitType", "start_line": 775, "target_file": "/src/wolfmqtt/src/mqtt_client.c" } ]
UNKNOWN READ
wolfmqtt
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2906671187 INFO: Loaded 1 modules (22540 inline 8-bit counters): 22540 [0x8ce720, 0x8d3f2c), INFO: Loaded 1 PC tables (22540 PCs): 22540 [0x5c8128,0x6201e8), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehavior...
cpp
52653a609f99bcd6be7402891b5f5aca288f3e78
https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2
null
arvo:38018
n132/arvo:38018-vul
/src/wolfmqtt
[ { "end_line": 1776, "function_name": "MqttDecode_Auth", "start_line": 1702, "target_file": "/src/wolfmqtt/src/mqtt_packet.c" } ]
Heap-buffer-overflow READ 1
wolfmqtt
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2837848956 INFO: Loaded 1 modules (15197 inline 8-bit counters): 15197 [0x83d89e0, 0x83dc53d), INFO: Loaded 1 PC tables (15197 PCs): 15197 [0x835022c,0x836dd14), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =============...
cpp
cce1fdab8ca5e082b09b2ab00fbcf4cf38ef9430
https://github.com/wolfSSL/wolfMQTT/commit/362b34afc2584237175a2a592b4741df7104faec
null
arvo:38048
n132/arvo:38048-vul
/src/kamailio
[ { "end_line": 175, "function_name": "skip_name", "start_line": 125, "target_file": "/src/kamailio/src/core/parser/contact/contact.c" } ]
Heap-buffer-overflow READ 1
kamailio
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 523367874 INFO: Loaded 1 modules (82605 inline 8-bit counters): 82605 [0x13538b0, 0x1367b5d), INFO: Loaded 1 PC tables (82605 PCs): 82605 [0x10a91f8,0x11ebcc8), /out/fuzz_parse_msg: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===============...
cpp
96656e0dfe66aba44ec5fceb27ce5f1e088a78a4
https://github.com/kamailio/kamailio/commit/20db418f1e35f31d7a90d7cabbd22ae989b7266c
null
arvo:38052
n132/arvo:38052-vul
/src/kamailio
[ { "end_line": 175, "function_name": "skip_name", "start_line": 125, "target_file": "/src/kamailio/src/core/parser/contact/contact.c" } ]
Heap-buffer-overflow READ 1
kamailio
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 597689611 INFO: Loaded 1 modules (82605 inline 8-bit counters): 82605 [0x13538b0, 0x1367b5d), INFO: Loaded 1 PC tables (82605 PCs): 82605 [0x10a91f8,0x11ebcc8), /out/fuzz_parse_msg: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===============...
c
96656e0dfe66aba44ec5fceb27ce5f1e088a78a4
https://github.com/kamailio/kamailio/commit/20db418f1e35f31d7a90d7cabbd22ae989b7266c
null
arvo:38065
n132/arvo:38065-vul
/src/kamailio
[ { "end_line": 175, "function_name": "skip_name", "start_line": 125, "target_file": "/src/kamailio/src/core/parser/contact/contact.c" } ]
Heap-buffer-overflow READ 1
kamailio
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4023068244 INFO: Loaded 1 modules (82605 inline 8-bit counters): 82605 [0x13538b0, 0x1367b5d), INFO: Loaded 1 PC tables (82605 PCs): 82605 [0x10a91f8,0x11ebcc8), /out/fuzz_parse_msg: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==============...
cpp
96656e0dfe66aba44ec5fceb27ce5f1e088a78a4
https://github.com/kamailio/kamailio/commit/20db418f1e35f31d7a90d7cabbd22ae989b7266c
null
arvo:38146
n132/arvo:38146-vul
/src/wolfmqtt
[ { "end_line": 1016, "function_name": "MqttClient_WaitType", "start_line": 775, "target_file": "/src/wolfmqtt/src/mqtt_client.c" } ]
Heap-buffer-overflow WRITE 1
wolfmqtt
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3489331849 INFO: Loaded 1 modules (14570 inline 8-bit counters): 14570 [0x97ff70, 0x98385a), INFO: Loaded 1 PC tables (14570 PCs): 14570 [0x6d3c10,0x70cab0), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =================...
cpp
52653a609f99bcd6be7402891b5f5aca288f3e78
https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2
null
arvo:3818
n132/arvo:3818-vul
/src/librawspeed
[ { "end_line": 222, "function_name": "ArwDecoder::decodeRawInternal", "start_line": 108, "target_file": "/src/librawspeed/src/librawspeed/decoders/ArwDecoder.cpp" } ]
Use-of-uninitialized-value
librawspeed
msan
INFO: Seed: 3583265711 INFO: Loaded 1 modules (11452 guards): 11452 [0xc77d60, 0xc83050), /out/TiffDecoderFuzzer-ArwDecoder: Running 1 inputs 1 time(s) each. Running: /tmp/poc Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside [0x713000000200, 64) ==3430==WARNING: MemorySanitizer: use-of-unini...
cpp
764515f1aebe7f780d9c4b089773b0715a80ec8e
https://github.com/darktable-org/rawspeed/commit/eca4047c7f90d6893ac190126c426e40458f7bbf
A vulnerability exists in ArwDecoder::decodeRawInternal() where ARWv1 does not enforce the requirement that the image height must be a multiple of two.
arvo:38232
n132/arvo:38232-vul
/src/wolfmqtt
[ { "end_line": 630, "function_name": "MqttDecode_Props", "start_line": 478, "target_file": "/src/wolfmqtt/src/mqtt_packet.c" } ]
UNKNOWN READ
wolfmqtt
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3048544647 INFO: Loaded 1 modules (15144 inline 8-bit counters): 15144 [0x78b960, 0x78f488), INFO: Loaded 1 PC tables (15144 PCs): 15144 [0x6deba0,0x719e20), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:...
cpp
456ac9e24cfc3e1269afe9d7a864eccb39ca11bc
https://github.com/wolfSSL/wolfMQTT/commit/07527e688cfa41fa9406a1271052de3cd677069a
null
arvo:38237
n132/arvo:38237-vul
/src/wolfmqtt
[ { "end_line": 1016, "function_name": "MqttClient_WaitType", "start_line": 775, "target_file": "/src/wolfmqtt/src/mqtt_client.c" } ]
Heap-buffer-overflow WRITE 8
wolfmqtt
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 64070061 INFO: Loaded 1 modules (14542 inline 8-bit counters): 14542 [0x97ef70, 0x98283e), INFO: Loaded 1 PC tables (14542 PCs): 14542 [0x6d3990,0x70c670), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===================...
cpp
52653a609f99bcd6be7402891b5f5aca288f3e78
https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2
null
arvo:38298
n132/arvo:38298-vul
/src/mruby
[ { "end_line": 814, "function_name": "mrb_ary_splice", "start_line": 728, "target_file": "/src/mruby/src/array.c" } ]
Heap-buffer-overflow READ 8
mruby
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/mruby_fuzzer ================================================================= ==2140==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62f00000c430 at pc 0x00000050c366 bp 0x7ffdc8064640 sp 0x7ffdc8064638 READ of size 8 at 0x62f0...
cpp
cd0ffd6f1ca413f36b6239de7779ae7778e1a200
https://github.com/mruby/mruby/commit/da749d870f4a57df7a05ef4a9ae023602d48af86
A vulnerability exists in `array.c` where the tail position is not adjusted in the `mrb_ary_splice` function.
arvo:38313
n132/arvo:38313-vul
/src/c-blosc
[ { "end_line": 609, "function_name": "blosclz_compress", "start_line": 422, "target_file": "/src/c-blosc/blosc/blosclz.c" } ]
Heap-buffer-overflow WRITE 1
c-blosc
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 579938505 INFO: Loaded 1 modules (38734 inline 8-bit counters): 38734 [0xaf66e0, 0xaffe2e), INFO: Loaded 1 PC tables (38734 PCs): 38734 [0xa10428,0xaa7908), /out/compress_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==================...
c
41f3a2e95301e05579c321dc710a877732792733
https://github.com/Blosc/c-blosc/commit/8f702156e8c9ecc8bbcbabfc0d8ee38bc294dddd
null
arvo:38359
n132/arvo:38359-vul
/src/libsrtp
[ { "end_line": 3301, "function_name": "srtp_crypto_policy_set_null_cipher_hmac_null", "start_line": 3288, "target_file": "/src/libsrtp/srtp/srtp.c" } ]
Heap-buffer-overflow READ {*}
libsrtp
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/srtp-fuzzer ================================================================= ==2736==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000120 at pc 0x00000049b747 bp 0x7ffe6fb4abd0 sp 0x7ffe6fb4a398 READ of size 30 at 0x6020...
c
19e6a05567db3b16f98eee5c199dc063ed1f6f37
https://github.com/cisco/libsrtp/commit/f1d1e57a49dca345e086e01b5fccc44e723221e0
null
arvo:38369
n132/arvo:38369-vul
/src/dav1d
[ { "end_line": 3301, "function_name": "dav1d_decode_frame_init", "start_line": 2910, "target_file": "/src/dav1d/src/decode.c" } ]
Heap-buffer-overflow READ {*}
dav1d
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2986933708 INFO: Loaded 1 modules (12244 inline 8-bit counters): 12244 [0x806ac0, 0x809a94), INFO: Loaded 1 PC tables (12244 PCs): 12244 [0x809a98,0x8397d8), /out/dav1d_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ====================...
c
833c818b87464baa547a2fc5a4f10e5dd5b2ea32
https://code.videolan.org/videolan/dav1d.git69ff474a7f3a7ccc61c5e6881e45e0afe693f352
null
arvo:38387
n132/arvo:38387-vul
/src/libavc
[ { "end_line": 1936, "function_name": "ih264d_parse_decode_slice", "start_line": 1067, "target_file": "/src/libavc/decoder/ih264d_parse_slice.c" } ]
Heap-buffer-overflow READ 4
libavc
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4229541865 INFO: Loaded 1 modules (7960 inline 8-bit counters): 7960 [0x836fdb0, 0x8371cc8), INFO: Loaded 1 PC tables (7960 PCs): 7960 [0x83134f4,0x8322db4), /out/avc_dec_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==================...
c
98f2ad26bfea2ee9ef560a623c0e158d11e55985
https://android.googlesource.com/platform/external/libavc/+/d69d66fa57a73a2f75b6b19d7acbd7aaf269f87c%5E%21/
null
arvo:38439
n132/arvo:38439-vul
/src/dav1d
[ { "end_line": 3301, "function_name": "dav1d_decode_frame_init", "start_line": 2910, "target_file": "/src/dav1d/src/decode.c" } ]
Heap-buffer-overflow READ {*}
dav1d
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 533487598 INFO: Loaded 1 modules (12216 inline 8-bit counters): 12216 [0x841a140, 0x841d0f8), INFO: Loaded 1 PC tables (12216 PCs): 12216 [0x841d0f8,0x8434eb8), /out/dav1d_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =================...
c
833c818b87464baa547a2fc5a4f10e5dd5b2ea32
https://code.videolan.org/videolan/dav1d.git69ff474a7f3a7ccc61c5e6881e45e0afe693f352
null
arvo:38482
n132/arvo:38482-vul
/src/libavc
[ { "end_line": 1936, "function_name": "ih264d_parse_decode_slice", "start_line": 1067, "target_file": "/src/libavc/decoder/ih264d_parse_slice.c" } ]
Heap-buffer-overflow READ 4
libavc
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3753318552 INFO: Loaded 1 modules (8823 inline 8-bit counters): 8823 [0x8395d90, 0x8398007), INFO: Loaded 1 PC tables (8823 PCs): 8823 [0x8332430,0x83437e8), /out/avc_dec_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==================...
cpp
42f977c44f204fb6f087fac080c4c05621048da3
https://android.googlesource.com/platform/external/libavc/+/cd0385dc074c6ba119dffbcd3df669a9b9ca1790%5E%21/
null
arvo:3852
n132/arvo:3852-vul
/src/pcre2
[ { "end_line": 7384, "function_name": "compile_branch", "start_line": 4812, "target_file": "/src/pcre2/src/pcre2_compile.c" } ]
Heap-buffer-overflow READ 1
pcre2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3558738898 INFO: Loaded 1 modules (8983 inline 8-bit counters): 8983 [0x6eb170, 0x6ed487), INFO: Loaded 1 PC tables (8983 PCs): 8983 [0x67bd20,0x69ee90), /out/pcre2_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ========================...
c
76e1ce08a6f804ededdf4d95121d22a16aa9bd02
https://github.com/PCRE2Project/pcre2/commit/36366914f502a466de2349ce53239e1b20d0e586
null
arvo:38553
n132/arvo:38553-vul
/src/zstd
[ { "end_line": 230, "function_name": "FSE_NCountWriteBound", "start_line": 222, "target_file": "/src/zstd/lib/compress/fse_compress.c" } ]
Heap-buffer-overflow WRITE 1
zstd
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1265215656 INFO: Loaded 1 modules (67234 inline 8-bit counters): 67234 [0xcefde0, 0xd00482), INFO: Loaded 1 PC tables (67234 PCs): 67234 [0xb83f80,0xc8a9a0), /out/simple_compress: Running 1 inputs 1 time(s) each. Running: /tmp/poc =================...
c
1e99d363613e10c6f590bda6f3bb1e0e0fabf680
https://github.com/facebook/zstd/commit/044c8b47224d7cfbbd57317906e91f2db5b30994
null
arvo:38748
n132/arvo:38748-vul
/src/wolfmqtt
[ { "end_line": 2157, "function_name": "MqttClient_WaitMessage", "start_line": 2145, "target_file": "/src/wolfmqtt/src/mqtt_client.c" } ]
Segv on unknown address
wolfmqtt
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/wolfmqtt-fuzzer AddressSanitizer:DEADLYSIGNAL ================================================================= ==18687==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x0000004ee8db bp 0x7fff19a11e90 sp 0x7fff19a11e80 T0) ==18687==Th...
cpp
f7a7290ea145ec42aeca46bd4d7ee059c070605f
https://github.com/wolfSSL/wolfMQTT/commit/00a5a5d881d6dc1e4b4d2032e873b6fc3fc1d7b3
null
arvo:38793
n132/arvo:38793-vul
/src/c-blosc
[ { "end_line": 609, "function_name": "blosclz_compress", "start_line": 422, "target_file": "/src/c-blosc/blosc/blosclz.c" } ]
Use-of-uninitialized-value
c-blosc
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 600434148 INFO: Loaded 1 modules (37244 inline 8-bit counters): 37244 [0xc1587c, 0xc1e9f8), INFO: Loaded 1 PC tables (37244 PCs): 37244 [0xb34c28,0xbc63e8), /out/compress_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==2237==WARNING: M...
c
41f3a2e95301e05579c321dc710a877732792733
https://github.com/Blosc/c-blosc/commit/8f702156e8c9ecc8bbcbabfc0d8ee38bc294dddd
null
arvo:38872
n132/arvo:38872-vul
/src/sleuthkit
[ { "end_line": 703, "function_name": "ext4_load_attrs_inline", "start_line": 600, "target_file": "/src/sleuthkit/tsk/fs/ext2fs.c" } ]
Heap-buffer-overflow READ {*}
sleuthkit
asan
INFO: Seed: 3448738511 INFO: Loaded 1 modules (18904 inline 8-bit counters): 18904 [0xaf0ef8, 0xaf58d0), INFO: Loaded 1 PC tables (18904 PCs): 18904 [0x7e7c08,0x831988), /out/sleuthkit_fls_ext_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================...
cpp
ebdaf6ddd59f4181750596af110bbf97c4665af1
https://github.com/sleuthkit/sleuthkit/commit/675093ee08b1cc970419946760ca6340edfca272
An integer overflow in the function ext4_load_attrs_inline leads to an out-of-bounds read.
arvo:38898
n132/arvo:38898-vul
/src/file
[ { "end_line": 1126, "function_name": "cdf_read_property_info", "start_line": 971, "target_file": "/src/file/src/cdf.c" } ]
Heap-buffer-overflow READ {*}
file
asan
sat_len = 15751 ss = 512 cdf.c,477: cdf_calloc 15751 512 cdf.c,491: cdf_calloc 1 512 Chain: 2 cdf.c,749: cdf_calloc 1 512 Chain: 1 cdf.c,698: cdf_calloc 4 136 cdf.c,702: cdf_malloc 512 Chain: 3 cdf.c,594: cdf_calloc 1 512 Cannot find type 2 `FileHeader' Chain: 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 cdf.c,594: cdf...
cpp
a9c8d2a9493c4e0cd201db57801f3502e65c686c
https://github.com/file/file/commit/46df39b68e51fd803d382348c0059fcb2e40b5ef
null
arvo:38900
n132/arvo:38900-vul
/src/wolfmqtt
[ { "end_line": 1016, "function_name": "MqttClient_WaitType", "start_line": 775, "target_file": "/src/wolfmqtt/src/mqtt_client.c" } ]
UNKNOWN WRITE
wolfmqtt
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3647514630 INFO: Loaded 1 modules (14499 inline 8-bit counters): 14499 [0xa6c550, 0xa6fdf3), INFO: Loaded 1 PC tables (14499 PCs): 14499 [0x7c7050,0x7ffa80), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc MemorySanitizer:D...
cpp
52653a609f99bcd6be7402891b5f5aca288f3e78
https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2
null
arvo:3891
n132/arvo:3891-vul
/src/pcre2
[ { "end_line": 7384, "function_name": "compile_branch", "start_line": 4812, "target_file": "/src/pcre2/src/pcre2_compile.c" } ]
Heap-buffer-overflow READ {*}
pcre2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1179424093 INFO: Loaded 1 modules (8983 inline 8-bit counters): 8983 [0x6eb170, 0x6ed487), INFO: Loaded 1 PC tables (8983 PCs): 8983 [0x67bd20,0x69ee90), /out/pcre2_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ========================...
c
76e1ce08a6f804ededdf4d95121d22a16aa9bd02
https://github.com/PCRE2Project/pcre2/commit/36366914f502a466de2349ce53239e1b20d0e586
null
arvo:38924
n132/arvo:38924-vul
/src/mruby
[ { "end_line": 475, "function_name": "mrb_last_insn", "start_line": 467, "target_file": "/src/mruby/mrbgems/mruby-compiler/core/codegen.c" } ]
Use-of-uninitialized-value
mruby
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 873813513 INFO: Loaded 1 modules (21156 inline 8-bit counters): 21156 [0x939199, 0x93e43d), INFO: Loaded 1 PC tables (21156 PCs): 21156 [0x885dc0,0x8d8800), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==2122==WARNING: Memo...
c
938af8a8ff8f3031f2a6100dcba705ae5d43be0b
https://github.com/mruby/mruby/commit/f85c50543b4ec93f327b9b064ea193493b046766
A vulnerability exists in codegen.c within the mrb_last_insn function, where there is no check for a previous instruction on the top, potentially leading to unsafe behavior.
arvo:38943
n132/arvo:38943-vul
/src/gdbm
[ { "end_line": 39, "function_name": "gdbm_valid_key_p", "start_line": 24, "target_file": "/src/gdbm/src/gdbmseq.c" } ]
Heap-buffer-overflow READ 8
gdbm
asan
Running LLVMFuzzerInitialize ... continue... ================================================================= ==12169==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6120000001b8 at pc 0x0000005a4bfd bp 0x7ffce65f91f0 sp 0x7ffce65f91e8 READ of size 8 at 0x6120000001b8 thread T0 SCARINESS: 23 (8-byte-read-h...
c
8952f7fd7cebffbe4ecf8c232e4435c5de72678a
https://git.gnu.org.ua/gdbm.git/commit/?id=ca7194987388a825f57fdebd73eb9c491a8749b0
A vulnerability exists in sequential access where key verification is not properly performed. In src/gdbmseq.c, the function gdbm_valid_key_p does not use gdbm_dir_entry_valid_p to validate the buffer index, and the order of checks is incorrect. This can lead to improper validation of keys during sequential access.
arvo:38989
n132/arvo:38989-vul
/src/mruby
[ { "end_line": 653, "function_name": "gen_move", "start_line": 576, "target_file": "/src/mruby/mrbgems/mruby-compiler/core/codegen.c" } ]
Heap-buffer-overflow READ 1
mruby
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 948433519 INFO: Loaded 1 modules (15793 inline 8-bit counters): 15793 [0xa8d9b0, 0xa91761), INFO: Loaded 1 PC tables (15793 PCs): 15793 [0x7800f8,0x7bdc08), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =====================...
c
ca7228ad425706b81311e51eb7718f12bf7f4885
https://github.com/mruby/mruby/commit/0455313a9bdbe93556a8fd31b7c011dd004a6f2b
null
arvo:39017
n132/arvo:39017-vul
/src/wolfmqtt
[ { "end_line": 630, "function_name": "MqttDecode_Props", "start_line": 478, "target_file": "/src/wolfmqtt/src/mqtt_packet.c" } ]
Heap-buffer-overflow READ 1
wolfmqtt
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2604705698 INFO: Loaded 1 modules (21493 inline 8-bit counters): 21493 [0x7f1450, 0x7f6845), INFO: Loaded 1 PC tables (21493 PCs): 21493 [0x731da0,0x785cf0), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =================...
cpp
456ac9e24cfc3e1269afe9d7a864eccb39ca11bc
https://github.com/wolfSSL/wolfMQTT/commit/07527e688cfa41fa9406a1271052de3cd677069a
null
arvo:39024
n132/arvo:39024-vul
/src/wolfmqtt
[ { "end_line": 630, "function_name": "MqttDecode_Props", "start_line": 478, "target_file": "/src/wolfmqtt/src/mqtt_packet.c" } ]
UNKNOWN READ
wolfmqtt
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3911541342 INFO: Loaded 1 modules (21359 inline 8-bit counters): 21359 [0x89dd10, 0x8a307f), INFO: Loaded 1 PC tables (21359 PCs): 21359 [0x7e5a30,0x839120), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc MemorySanitizer:D...
cpp
456ac9e24cfc3e1269afe9d7a864eccb39ca11bc
https://github.com/wolfSSL/wolfMQTT/commit/07527e688cfa41fa9406a1271052de3cd677069a
null
arvo:39028
n132/arvo:39028-vul
/src/wolfmqtt
[ { "end_line": 1016, "function_name": "MqttClient_WaitType", "start_line": 775, "target_file": "/src/wolfmqtt/src/mqtt_client.c" } ]
UNKNOWN WRITE
wolfmqtt
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3783349150 INFO: Loaded 1 modules (14499 inline 8-bit counters): 14499 [0xa6c550, 0xa6fdf3), INFO: Loaded 1 PC tables (14499 PCs): 14499 [0x7c7050,0x7ffa80), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc MemorySanitizer:D...
cpp
52653a609f99bcd6be7402891b5f5aca288f3e78
https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2
null
arvo:39036
n132/arvo:39036-vul
/src/wolfmqtt
[ { "end_line": 1016, "function_name": "MqttClient_WaitType", "start_line": 775, "target_file": "/src/wolfmqtt/src/mqtt_client.c" } ]
Segv on unknown address
wolfmqtt
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1311130261 INFO: Loaded 1 modules (14499 inline 8-bit counters): 14499 [0xa6c550, 0xa6fdf3), INFO: Loaded 1 PC tables (14499 PCs): 14499 [0x7c7050,0x7ffa80), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc MemorySanitizer:D...
cpp
52653a609f99bcd6be7402891b5f5aca288f3e78
https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2
null
arvo:39053
n132/arvo:39053-vul
/src/wolfmqtt
[ { "end_line": 1016, "function_name": "MqttClient_WaitType", "start_line": 775, "target_file": "/src/wolfmqtt/src/mqtt_client.c" } ]
Heap-buffer-overflow WRITE 1
wolfmqtt
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/wolfmqtt-fuzzer ================================================================= ==18698==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f1256323ca4 at pc 0x0000004e4017 bp 0x7ffee5534b50 sp 0x7ffee5534b48 WRITE of size 1 at ...
cpp
52653a609f99bcd6be7402891b5f5aca288f3e78
https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2
null
arvo:39056
n132/arvo:39056-vul
/src/wolfmqtt
[ { "end_line": 1016, "function_name": "MqttClient_WaitType", "start_line": 775, "target_file": "/src/wolfmqtt/src/mqtt_client.c" } ]
Heap-buffer-overflow WRITE 1
wolfmqtt
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2636761250 INFO: Loaded 1 modules (14570 inline 8-bit counters): 14570 [0x97ff70, 0x98385a), INFO: Loaded 1 PC tables (14570 PCs): 14570 [0x6d3c10,0x70cab0), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =================...
cpp
52653a609f99bcd6be7402891b5f5aca288f3e78
https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2
null