task_id stringlengths 8 10 | docker_image stringlengths 17 19 | basedir stringclasses 157
values | target_functions listlengths 1 3 | crash_type stringclasses 85
values | project_name stringclasses 157
values | sanitizer stringclasses 3
values | sanitizer_output stringlengths 1.13k 6.5M | language stringclasses 2
values | vuln_commit stringlengths 40 40 | fix stringlengths 69 110 | vulnerability_description stringlengths 38 824 ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
arvo:34069 | n132/arvo:34069-vul | /src/sleuthkit | [
{
"end_line": 1676,
"function_name": "hfs_find_highest_inum_cb",
"start_line": 1660,
"target_file": "/src/sleuthkit/tsk/fs/hfs.c"
}
] | Heap-buffer-overflow READ 1 | sleuthkit | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2506760103
INFO: Loaded 1 modules (18770 inline 8-bit counters): 18770 [0xaf8cb8, 0xafd60a),
INFO: Loaded 1 PC tables (18770 PCs): 18770 [0x7ec7f8,0x835d18),
/out/sleuthkit_fls_hfs_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
========... | cpp | 634c3ceaa9405c434867d9516bb4fc211fb7acdb | https://github.com/sleuthkit/sleuthkit/commit/9cabe33ee9c6f1098e7866c0d05217d948e0b19c | null |
arvo:34116 | n132/arvo:34116-vul | /src/fluent-bit | [
{
"end_line": 232,
"function_name": "flb_parser_json_do",
"start_line": 29,
"target_file": "/src/fluent-bit/src/flb_parser_json.c"
}
] | Heap-double-free | fluent-bit | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/flb-it-fuzz-parser_fuzzer_OSSFUZZ
[2025/04/10 07:44:52] [ info] Configuration:
[2025/04/10 07:44:52] [ info] flush time | 5.000000 seconds
[2025/04/10 07:44:52] [ info] grace | 5 seconds
[2025/04/10 07:44:52] [ info] daemon ... | cpp | 8a3d5029d3e5e9237d39bb17d7acd40c08067862 | https://github.com/fluent/fluent-bit/commit/0111149ce44b28cb6b5af710009bd3a2c14d8eb9 | A double-free vulnerability exists in the JSON parser, which can lead to memory corruption or crashes. |
arvo:34134 | n132/arvo:34134-vul | /src/pcl | [
{
"end_line": 293,
"function_name": "PLYReader::vertexScalarPropertyCallback",
"start_line": 279,
"target_file": "/src/pcl/io/src/ply_io.cpp"
}
] | Heap-buffer-overflow WRITE 4 | pcl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3829060578
INFO: Loaded 1 modules (17059 inline 8-bit counters): 17059 [0xa174f0, 0xa1b793),
INFO: Loaded 1 PC tables (17059 PCs): 17059 [0xa1b798,0xa5e1c8),
/out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===============... | cpp | 09e914b0b3b13c07710e814d71df3ff958945ba3 | https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae | null |
arvo:34298 | n132/arvo:34298-vul | /src/espeak-ng | [
{
"end_line": 544,
"function_name": "LookupLetter",
"start_line": 477,
"target_file": "/src/espeak-ng/src/libespeak-ng/numbers.c"
}
] | Heap-use-after-free READ 4 | espeak-ng | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2741214098
INFO: Loaded 1 modules (10291 inline 8-bit counters): 10291 [0x8bf420, 0x8c1c53),
INFO: Loaded 1 PC tables (10291 PCs): 10291 [0x8c1c58,0x8e9f88),
/out/ssml-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=====================... | c | 1f76c4b8bd320714aa61ad8abb527c5d92cc5164 | https://github.com/espeak-ng/espeak-ng/commit/1da9ad10e80f2e2365c4c00b532fe908b4b8fe19 | null |
arvo:34332 | n132/arvo:34332-vul | /src/espeak-ng | [
{
"end_line": 2702,
"function_name": "TranslateClause",
"start_line": 1940,
"target_file": "/src/espeak-ng/src/libespeak-ng/translate.c"
}
] | Stack-buffer-overflow READ 16 | espeak-ng | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 83496935
INFO: Loaded 1 modules (10263 inline 8-bit counters): 10263 [0x8bf1e0, 0x8c19f7),
INFO: Loaded 1 PC tables (10263 PCs): 10263 [0x8c19f8,0x8e9b68),
/out/ssml-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=======================... | c | 7b9c99cec7b0c517049d39cbbee610c3a8407fa4 | https://github.com/espeak-ng/espeak-ng/commit/26a675543c63832e37ec780a6c30e49707df1db4 | null |
arvo:3438 | n132/arvo:3438-vul | /src/librawspeed | [
{
"end_line": 77,
"function_name": "UncompressedDecompressor::sanityCheck",
"start_line": 68,
"target_file": "/src/librawspeed/src/librawspeed/decompressors/UncompressedDecompressor.cpp"
}
] | Use-of-uninitialized-value | librawspeed | msan | INFO: Seed: 36543392
INFO: Loaded 1 modules (11427 guards): 11427 [0xc70010, 0xc7b29c),
/out/FiffParserFuzzer-GetDecoder-Decode: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside [0x71e000000080, 64)
==3430==WARNING: MemorySanitizer: use-of-u... | cpp | d0b1f77c39ca6c1590512f445725d8c41c233c06 | https://github.com/darktable-org/rawspeed/commit/ea2ce48df48c754e0e1fd459101085b344c70eaf | The vulnerability occurs in UncompressedDecompressor::sanityCheck(), where the function does not always throw an exception if there is not enough data, potentially allowing truncated cases to be mishandled. |
arvo:344 | n132/arvo:344-vul | /src/json | [
{
"end_line": 7120,
"function_name": "from_msgpack_internal",
"start_line": 6896,
"target_file": "/src/json/src/json.hpp"
}
] | Heap-buffer-overflow READ 1 | json | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1416559770
INFO: Loaded 1 modules (921 inline 8-bit counters): 921 [0x6599c8, 0x659d61),
INFO: Loaded 1 PC tables (921 PCs): 921 [0x604ad8,0x608468),
/out/fuzzer-parse_msgpack: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
====================... | cpp | 383a29a924af973e4cf9d5d2054a60f7d718f0d3 | https://github.com/nlohmann/json/commit/f0edab2363ae7dd50ee04bfacdb56f47ed6e7fb7 | null |
arvo:34461 | n132/arvo:34461-vul | /src/libxml2 | [
{
"end_line": 1121,
"function_name": "xmlXIncludeCopyRange",
"start_line": 923,
"target_file": "/src/libxml2/xinclude.c"
}
] | Heap-use-after-free READ 4 | libxml2 | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/xml < INPUT_FILE
or
/out/xml INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/xml [-N]
afl-fuzz will run N iter... | cpp | 53983804ce7f8a9fbe2316286e74bc9f60629694 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/8f5ccada05ddd4a1ff8e399ad39fc7cd4bd33325 | The functions xmlAddChild() and xmlAddNextSibling() may not attach their second argument, leading to potential issues if the return value is not used instead of the second argument directly. |
arvo:3447 | n132/arvo:3447-vul | /src/librawspeed | [
{
"end_line": 143,
"function_name": "FixBadPixelsList",
"start_line": 101,
"target_file": "/src/librawspeed/src/librawspeed/common/DngOpcodes.cpp"
}
] | Heap-buffer-overflow READ 1 | librawspeed | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/TiffDecoderFuzzer-DngDecoder < INPUT_FILE
or
/out/TiffDecoderFuzzer-DngDecoder INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz ... | cpp | 55b420a23ab58bb7dc62fb582f205e65d6445270 | https://github.com/darktable-org/rawspeed/commit/78846115eaaa0ad13bb36ab87b5d6be2ebd2dc02 | The vulnerability exists in DngOpcodes::FixBadPixelsList within the handling of iRectangle2D fullImage, where isPointInside()/isThisInside() considers both points to be valid, potentially resulting in invalid information due to an off-by-one error. |
arvo:34533 | n132/arvo:34533-vul | /src/espeak-ng | [
{
"end_line": 986,
"function_name": "ReadClause",
"start_line": 467,
"target_file": "/src/espeak-ng/src/libespeak-ng/readclause.c"
}
] | Heap-buffer-overflow READ 1 | espeak-ng | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1021579763
INFO: Loaded 1 modules (10287 inline 8-bit counters): 10287 [0x8bf420, 0x8c1c4f),
INFO: Loaded 1 PC tables (10287 PCs): 10287 [0x8c1c50,0x8e9f40),
/out/ssml-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=====================... | c | 9de65fcb96f7150e899a882460ab8caa57c6efac | https://github.com/espeak-ng/espeak-ng/commit/9decedb8c229e1a4219baceaab7a3d656e889e31 | null |
arvo:34582 | n132/arvo:34582-vul | /src/mruby | [
{
"end_line": 2223,
"function_name": "mrb_alias_method",
"start_line": 2197,
"target_file": "/src/mruby/src/class.c"
}
] | Use-of-uninitialized-value | mruby | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 556986905
INFO: Loaded 1 modules (14387 inline 8-bit counters): 14387 [0xa4366d, 0xa46ea0),
INFO: Loaded 1 PC tables (14387 PCs): 14387 [0x7a10e0,0x7d9410),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
#<Module:0x72f0000101... | c | a3f779c5b6db75d479478a1e774c7e696b92f107 | https://github.com/mruby/mruby/commit/e323cd0c6ebdeeb42c267a5fe28cec87ae2f00a0 | null |
arvo:3461 | n132/arvo:3461-vul | /src/librawspeed | [
{
"end_line": 144,
"function_name": "NefDecoder::decodeRawInternal",
"start_line": 65,
"target_file": "/src/librawspeed/src/librawspeed/decoders/NefDecoder.cpp"
},
{
"end_line": 188,
"function_name": "NikonDecompressor::decompress",
"start_line": 114,
"target_file": "/src/libraws... | Use-after-poison WRITE 2 | librawspeed | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/TiffDecoderFuzzer-NefDecoder < INPUT_FILE
or
/out/TiffDecoderFuzzer-NefDecoder INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz ... | cpp | a17791452ef33b56e59ff9f7047775cf523b63f2 | https://github.com/darktable-org/rawspeed/commit/55b420a23ab58bb7dc62fb582f205e65d6445270 | NikonDecompressor does not enforce that width is a multiple of 2. |
arvo:34652 | n132/arvo:34652-vul | /src/mruby | [
{
"end_line": 363,
"function_name": "mrb_format_float",
"start_line": 79,
"target_file": "/src/mruby/src/fmt_fp.c"
}
] | Heap-buffer-overflow WRITE 1 | mruby | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2302434623
INFO: Loaded 1 modules (14379 inline 8-bit counters): 14379 [0xa5daf0, 0xa6131b),
INFO: Loaded 1 PC tables (14379 PCs): 14379 [0x757bd8,0x78fe88),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
====================... | c | afbc199ed3b0820f156681548bf91290a2be48f4 | https://github.com/mruby/mruby/commit/063b49ab8e6a10212c7f88e5b114b90fe59296f7 | A vulnerability in fmt_fp.c allows a buffer overflow due to lack of truncation of precision. |
arvo:34657 | n132/arvo:34657-vul | /src/bitcoin-core | [
{
"end_line": 378,
"function_name": "ArgsManager::ParseParameters",
"start_line": 299,
"target_file": "/src/bitcoin-core/src/util/system.cpp"
}
] | Heap-buffer-overflow READ 4 | bitcoin-core | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 946282615
INFO: Loaded 1 modules (179953 inline 8-bit counters): 179953 [0x564128629288, 0x564128655179),
INFO: Loaded 1 PC tables (179953 PCs): 179953 [0x564128655180,0x564128914090),
/out/system: Running 1 inputs 1 time(s) each.
Running: /tmp/poc... | cpp | 260b1d74fee17b64f7a69eca30e4811b961325b5 | https://github.com/bitcoin/bitcoin/commit/791f985a60726febca3053453c2710407529fd0a | null |
arvo:34691 | n132/arvo:34691-vul | /src/mruby | [
{
"end_line": 621,
"function_name": "mrb_ary_shift_m",
"start_line": 581,
"target_file": "/src/mruby/src/array.c"
}
] | UNKNOWN READ | mruby | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/mruby_fuzzer
line 2:795: warning: ambiguous first argument; put parentheses or even spaces
AddressSanitizer:DEADLYSIGNAL
=================================================================
==2714==ERROR: AddressSanitizer: SEGV on unknown addr... | c | c019d8d34d2db5de218802d923e6d0197a2ffca0 | https://github.com/mruby/mruby/commit/9a72869043e0377ec549a325a074e592f82ef5ed | A vulnerability exists in array.c where negative shift sizes are not checked. |
arvo:34695 | n132/arvo:34695-vul | /src/fribidi | [
{
"end_line": 1432,
"function_name": "fribidi_get_par_embedding_levels_ex",
"start_line": 514,
"target_file": "/src/fribidi/lib/fribidi-bidi.c"
}
] | Segv on unknown address | fribidi | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 916491027
INFO: Loaded 1 modules (955 inline 8-bit counters): 955 [0x7a73d8, 0x7a7793),
INFO: Loaded 1 PC tables (955 PCs): 955 [0x7a7798,0x7ab348),
/out/fribidi-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:DEADLYSIGNA... | c | 3ccfb68d2ce9ace5e83fb96b6da45de637522804 | https://github.com/fribidi/fribidi/commit/441c173cbb3562f4b89745ac2bbaaa632b4fe9f5 | A vulnerability exists where the isolate level can be decreased even if it is already zero. |
arvo:34718 | n132/arvo:34718-vul | /src/espeak-ng | [
{
"end_line": 2702,
"function_name": "TranslateClause",
"start_line": 1940,
"target_file": "/src/espeak-ng/src/libespeak-ng/translate.c"
}
] | Global-buffer-overflow READ 4 | espeak-ng | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3564941029
INFO: Loaded 1 modules (10263 inline 8-bit counters): 10263 [0x8bf1e0, 0x8c19f7),
INFO: Loaded 1 PC tables (10263 PCs): 10263 [0x8c19f8,0x8e9b68),
/out/ssml-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=====================... | c | 7b9c99cec7b0c517049d39cbbee610c3a8407fa4 | https://github.com/espeak-ng/espeak-ng/commit/26a675543c63832e37ec780a6c30e49707df1db4 | null |
arvo:34755 | n132/arvo:34755-vul | /src/libucl | [
{
"end_line": 557,
"function_name": "ucl_expand_variable",
"start_line": 507,
"target_file": "/src/libucl/src/ucl_parser.c"
}
] | Heap-buffer-overflow READ 1 | libucl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1224562556
INFO: Loaded 1 modules (3063 inline 8-bit counters): 3063 [0x807a30, 0x808627),
INFO: Loaded 1 PC tables (3063 PCs): 3063 [0x5b3d18,0x5bfc88),
/out/ucl_add_string_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===============... | c | 852f752708ae0aca40c50976931cbab5277d236c | https://github.com/vstakhov/libucl/commit/f9e544672e24d349f0c69074495f14427b5c8f4e | An out-of-bounds read occurs in ucl_expand_variable when the input ends with a '$', as calling ucl_check_variable in this case results in reading beyond the buffer. |
arvo:34766 | n132/arvo:34766-vul | /src/libredwg | [
{
"end_line": 12096,
"function_name": "dxf_tables_read",
"start_line": 11941,
"target_file": "/src/libredwg/src/in_dxf.c"
}
] | UNKNOWN WRITE | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2589232610
INFO: Loaded 1 modules (471864 inline 8-bit counters): 471864 [0x4355380, 0x43c86b8),
INFO: Loaded 1 PC tables (471864 PCs): 471864 [0x37b3e50,0x3ee71d0),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer... | c | 78ffe2a4064935824b274d38cae3429c940bdc0b | https://github.com/LibreDWG/libredwg/commit/0a390fa7291ee439d2bb2bed998e76302e539b77 | null |
arvo:34814 | n132/arvo:34814-vul | /src/jsoncons | [
{
"end_line": 521,
"function_name": "decimal128_to_chars",
"start_line": 314,
"target_file": "/src/jsoncons/include/jsoncons_ext/bson/bson_decimal128.hpp"
}
] | Index-out-of-bounds | jsoncons | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3505905121
INFO: Loaded 1 modules (3067 inline 8-bit counters): 3067 [0x7ddff8, 0x7debf3),
INFO: Loaded 1 PC tables (3067 PCs): 3067 [0x564298,0x570248),
/out/fuzz_bson_encoder: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
include/jsoncons_ex... | cpp | f60d3f81a327e6f96265794f809cd50e18e9596c | https://github.com/danielaparker/jsoncons/commit/c9c8d81e0e97fff0e4b9a01704ed9cc94fba928c | null |
arvo:34960 | n132/arvo:34960-vul | /src/fluent-bit | [
{
"end_line": 591,
"function_name": "parser_conf_file",
"start_line": 443,
"target_file": "/src/fluent-bit/src/flb_parser.c"
},
{
"end_line": 700,
"function_name": "multiline_parser_conf_file",
"start_line": 594,
"target_file": "/src/fluent-bit/src/flb_parser.c"
}
] | Heap-use-after-free READ 8 | fluent-bit | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/flb-it-fuzz-config_fuzzer_OSSFUZZ
=================================================================
==22193==ERROR: AddressSanitizer: heap-use-after-free on address 0x607000000290 at pc 0x000000515038 bp 0x7fff046f3c00 sp 0x7fff046f3bf8
REA... | c | 03f3339594bdb472315823db78ca209b7ba319fb | https://github.com/fluent/fluent-bit/commit/8f653c34c0dd46c39e2a5ebf9ff3fe9ec932fc4f | null |
arvo:34973 | n132/arvo:34973-vul | /src/serenity | [
{
"end_line": 152,
"function_name": "URLParser::parse_data_url",
"start_line": 120,
"target_file": "/src/serenity/AK/URLParser.cpp"
}
] | Heap-use-after-free READ {*} | serenity | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2258203183
INFO: Loaded 1 modules (6833 inline 8-bit counters): 6833 [0x871028, 0x872ad9),
INFO: Loaded 1 PC tables (6833 PCs): 6833 [0x872ae0,0x88d5f0),
/out/FuzzURL: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Extension byte 0x7d in 1 posi... | cpp | f5c32252866c5d7ccbaec8b860fbe358f86b3b8c | https://github.com/SerenityOS/serenity/commit/4e8e1b7b3a2cd25ab4b69cebea32232496f4a5d3 | The parsing of data URLs in URLParser does not conform to the specification, as it cannot parse the components of the MIME type and instead represents it as a string, while the specification requires parsing as a "MIME type record." |
arvo:3498 | n132/arvo:3498-vul | /src/librawspeed | [
{
"end_line": 322,
"function_name": "SamsungV2Decompressor::decompressRow",
"start_line": 162,
"target_file": "/src/librawspeed/src/librawspeed/decompressors/SamsungV2Decompressor.cpp"
}
] | Use-after-poison READ 2 | librawspeed | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/TiffDecoderFuzzer-SrwDecoder < INPUT_FILE
or
/out/TiffDecoderFuzzer-SrwDecoder INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz ... | cpp | d505b6d818773a70c26ba6d31e6ae88beb0ecb0c | https://github.com/darktable-org/rawspeed/commit/8cfad9ca0d21986594ef2a9c05ff286a3377f001 | In SamsungV2Decompressor::decompressRow(), during the "complex case" for the last 16 pixels of the row, motion (and thus slideOffset) may result in refpixel pointing out of the row bounds. |
arvo:35172 | n132/arvo:35172-vul | /src/libjxl | [
{
"end_line": 1901,
"function_name": "JxlDecoderStatus JxlDecoderImageOutBufferSize",
"start_line": 1885,
"target_file": "/src/libjxl/lib/jxl/decode.cc"
}
] | Heap-buffer-overflow WRITE 4 | libjxl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1676859255
INFO: Loaded 1 modules (31470 inline 8-bit counters): 31470 [0x563a4ae5d068, 0x563a4ae64b56),
INFO: Loaded 1 PC tables (31470 PCs): 31470 [0x563a4ae64b58,0x563a4aedfa38),
/out/djxl_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/p... | cpp | e1a5e2f07efe0c32364ee42bd5aef5b1f58d6a6c | https://github.com/libjxl/libjxl/commit/85aa1491b967709701d2d2293627c5cd1c7cb96d | The vulnerability arises from not properly considering orientation in *OutBufferSize, which can lead to mismatches in computed strides and result in memory corruption and/or out-of-bounds writes. |
arvo:35202 | n132/arvo:35202-vul | /src/fluent-bit | [
{
"end_line": 412,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 320,
"target_file": "/src/fluent-bit/tests/internal/fuzzers/config_fuzzer.c"
}
] | Heap-buffer-overflow READ {*} | fluent-bit | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3140651217
INFO: Loaded 1 modules (62444 inline 8-bit counters): 62444 [0x10cb5b0, 0x10da99c),
INFO: Loaded 1 PC tables (62444 PCs): 62444 [0x10da9a0,0x11ce860),
/out/flb-it-fuzz-config_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each.
Running: /tmp... | c | 10c3cd58658c20b989db859758a249109041070c | https://github.com/fluent/fluent-bit/commit/1c3811ba12bf924a96c916e2409a0d41c336debf | null |
arvo:35209 | n132/arvo:35209-vul | /src/zstd | [
{
"end_line": 3536,
"function_name": "ZSTD_compressSeqStore_singleBlock",
"start_line": 3473,
"target_file": "/src/zstd/lib/compress/zstd_compress.c"
}
] | Heap-buffer-overflow WRITE 1 | zstd | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1039954994
INFO: Loaded 1 modules (30457 inline 8-bit counters): 30457 [0xb1bf80, 0xb23679),
INFO: Loaded 1 PC tables (30457 PCs): 30457 [0x834a20,0x8ab9b0),
/out/simple_compress: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================... | c | 89127e5ee2f3c1e141668fa6d4ee91245f05d132 | https://github.com/facebook/zstd/commit/05b6773fbcce1075edbe498a821f9a41249cf384 | null |
arvo:3522 | n132/arvo:3522-vul | /src/zstd | [
{
"end_line": 676,
"function_name": "ZSTD_adjustCParams_internal",
"start_line": 646,
"target_file": "/src/zstd/lib/compress/zstd_compress.c"
}
] | Heap-buffer-overflow WRITE {*} | zstd | asan | INFO: Seed: 3720302180
INFO: Loaded 1 modules (3932 guards): 3932 [0x911b80, 0x9158f0),
/out/block_round_trip: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==399==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62a000005ae8 at pc 0x00... | cpp | ee1ed78fcb3d53182c944940e16e697c94087a8b | https://github.com/facebook/zstd/commit/c5d6dde502e4e30c7de4476e82b459361fe2f486 | A vulnerability exists in ZSTD_adjustCParams() where performing `size -= 1` can cause the window size to become too small if the source size is 2^n + 1. |
arvo:3530 | n132/arvo:3530-vul | /src/librawspeed | [
{
"end_line": 321,
"function_name": "SamsungV2Decompressor::decompressRow",
"start_line": 162,
"target_file": "/src/librawspeed/src/librawspeed/decompressors/SamsungV2Decompressor.cpp"
}
] | Use-after-poison READ 2 | librawspeed | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/TiffDecoderFuzzer-SrwDecoder < INPUT_FILE
or
/out/TiffDecoderFuzzer-SrwDecoder INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz ... | cpp | ac49fc0c341a3546669c13440a51708bf92fadbe | https://github.com/darktable-org/rawspeed/commit/1771ccd2ae924ad6e2c3ac25f0f599acfcde28d1 | A security vulnerability exists in SamsungV2Decompressor::decompressRow(). |
arvo:3531 | n132/arvo:3531-vul | /src/librawspeed | [
{
"end_line": 85,
"function_name": "CrwDecoder::decodeRawInternal",
"start_line": 55,
"target_file": "/src/librawspeed/src/librawspeed/decoders/CrwDecoder.cpp"
},
{
"end_line": 312,
"function_name": "CrwDecompressor::decompress",
"start_line": 211,
"target_file": "/src/librawspee... | Use-of-uninitialized-value | librawspeed | msan | INFO: Seed: 2567677566
INFO: Loaded 1 modules (11557 guards): 11557 [0xc7a0d0, 0xc85564),
/out/CiffParserFuzzer-GetDecoder-Decode: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialized bytes in __msan_check_mem_is_initialized at offset 128 inside [0x709000000000, 130)
==3429==WARNING: MemorySanitizer: use... | cpp | 1771ccd2ae924ad6e2c3ac25f0f599acfcde28d1 | https://github.com/darktable-org/rawspeed/commit/0292f76f083f38edb113087250b30a238eeadefd | A vulnerability exists in CrwDecompressor::decompress() due to inefficient handling of row and column processing, where the code unnecessarily checks in the innermost loop whether the full row has been processed, despite the width being a multiple of 4. This can lead to potential logic errors or inefficiencies in decom... |
arvo:3560 | n132/arvo:3560-vul | /src/librawspeed | [
{
"end_line": 139,
"function_name": "NefDecoder::decodeRawInternal",
"start_line": 65,
"target_file": "/src/librawspeed/src/librawspeed/decoders/NefDecoder.cpp"
}
] | Use-of-uninitialized-value | librawspeed | msan | INFO: Seed: 898244309
INFO: Loaded 1 modules (11530 guards): 11530 [0xc7a070, 0xc85498),
/out/TiffDecoderFuzzer-NefDecoder: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside [0x7fa19fd24000, 892)
==3429==WARNING: MemorySanitizer: use-of-unini... | cpp | 7a65fbbcc26df616b4d602980990929505a4dd74 | https://github.com/darktable-org/rawspeed/commit/c6faf275397eb448987e635a2162d807b9608d70 | A vulnerability exists in NefDecoder::decodeRawInternal() where IOException is caught, potentially suppressing important error conditions. |
arvo:35640 | n132/arvo:35640-vul | /src/pcl | [
{
"end_line": 293,
"function_name": "PLYReader::vertexScalarPropertyCallback",
"start_line": 279,
"target_file": "/src/pcl/io/src/ply_io.cpp"
}
] | Heap-buffer-overflow WRITE 2 | pcl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2028852973
INFO: Loaded 1 modules (17059 inline 8-bit counters): 17059 [0xa164f0, 0xa1a793),
INFO: Loaded 1 PC tables (17059 PCs): 17059 [0xa1a798,0xa5d1c8),
/out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
[pcl::PLYReader... | cpp | 09e914b0b3b13c07710e814d71df3ff958945ba3 | https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae | null |
arvo:35804 | n132/arvo:35804-vul | /src/assimp | [
{
"end_line": 323,
"function_name": "isNumeric",
"start_line": 320,
"target_file": "/src/assimp/contrib/openddlparser/include/openddlparser/OpenDDLParserUtils.h"
}
] | Index-out-of-bounds | assimp | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1370002737
INFO: Loaded 1 modules (239541 inline 8-bit counters): 239541 [0x2b9f380, 0x2bd9b35),
INFO: Loaded 1 PC tables (239541 PCs): 239541 [0x2bd9b38,0x2f81688),
/out/assimp_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Info, T0: ... | cpp | 107371657b39c8cd4bcc8d8865d9071ff17049d2 | https://github.com/assimp/assimp/commit/6a3ac623b960905b3450b78e7614453dae0540ed | null |
arvo:35876 | n132/arvo:35876-vul | /src/php-src | [
{
"end_line": 1343,
"function_name": "div_function",
"start_line": 1301,
"target_file": "/src/php-src/Zend/zend_operators.c"
}
] | Heap-use-after-free READ 4 | php-src | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3163449219
INFO: Loaded 1 modules (119515 inline 8-bit counters): 119515 [0x196dc20, 0x198aefb),
INFO: Loaded 1 PC tables (119515 PCs): 119515 [0x198af00,0x1b5dcb0),
/out/php-fuzz-execute: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
========... | cpp | 52a00fe776eebd0e5a3370f0e4be45f40ef999a7 | https://github.com/php/php-src/commit/62ecf54f35e227d09d19ec40920f7bb8d29e9356 | A use after free vulnerability exists in compound division by zero, where destroying the result operand early can lead to accessing freed memory if the division fails. The division result is not safely handled, risking use after free when the original value needs to be preserved. |
arvo:35891 | n132/arvo:35891-vul | /src/libjxl | [
{
"end_line": 79,
"function_name": "InvHSqueeze",
"start_line": 17,
"target_file": "/src/libjxl/lib/jxl/modular/transform/squeeze.cc"
}
] | Use-of-uninitialized-value | libjxl | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1527690533
INFO: Loaded 1 modules (31019 inline 8-bit counters): 31019 [0x558b1c182938, 0x558b1c18a263),
INFO: Loaded 1 PC tables (31019 PCs): 31019 [0x558b1c18a268,0x558b1c203518),
/out/djxl_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/p... | cpp | ea7c9f7ff39b1385ee558ca536baac1e41b19861 | https://github.com/libjxl/libjxl/commit/f8dd198a2d8ad4f4fccd591349a384bc0eff5ec9 | null |
arvo:35902 | n132/arvo:35902-vul | /src/h3 | [
{
"end_line": 444,
"function_name": "h3NeighborRotations",
"start_line": 308,
"target_file": "/src/h3/src/h3lib/lib/algos.c"
}
] | Index-out-of-bounds | h3 | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2549629819
INFO: Loaded 1 modules (1750 inline 8-bit counters): 1750 [0x7169c8, 0x71709e),
INFO: Loaded 1 PC tables (1750 PCs): 1750 [0x4dbc08,0x4e2968),
/out/h3_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
/src/h3/src/h3lib/lib/algos... | c | 4ce808fd4c4b2b626da770f074fcf2d916390974 | https://github.com/uber/h3/commit/fda03e297b1abe3ce8277794a7de8970601ed7c9 | A potential security vulnerability exists in the kRing function, where an invalid digit can cause a segmentation fault. |
arvo:36098 | n132/arvo:36098-vul | /src/sleuthkit | [
{
"end_line": 1185,
"function_name": "APFSBtreeNodeIterator<APFSJObjBtreeNode>::init_value<void>",
"start_line": 1156,
"target_file": "/src/sleuthkit/tsk/fs/tsk_apfs.hpp"
}
] | Heap-use-after-free READ 8 | sleuthkit | asan | =================================================================
==20027==ERROR: AddressSanitizer: heap-use-after-free on address 0x6210000030e0 at pc 0x0000008534e8 bp 0x7ffe4924bc30 sp 0x7ffe4924bc28
READ of size 8 at 0x6210000030e0 thread T0
SCARINESS: 51 (8-byte-read-heap-use-after-free)
#0 0x8534e7 in APFSJOb... | cpp | e2c2570a456fb2ca5635e613bfd89d1fac9cb063 | https://github.com/sleuthkit/sleuthkit/commit/4518aa4e2397957959c280e50010f843d6e6107e | null |
arvo:36205 | n132/arvo:36205-vul | /src/php-src | [
{
"end_line": 1048,
"function_name": "zend_std_unset_property",
"start_line": 985,
"target_file": "/src/php-src/Zend/zend_object_handlers.c"
}
] | Heap-use-after-free READ 8 | php-src | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 400022034
INFO: Loaded 1 modules (119522 inline 8-bit counters): 119522 [0x196dce0, 0x198afc2),
INFO: Loaded 1 PC tables (119522 PCs): 119522 [0x198afc8,0x1b5dde8),
/out/php-fuzz-execute: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=========... | cpp | 6fd880890ceb099d8d0b785979764d08b390699f | https://github.com/php/php-src/commit/567e53ea581d783ec69459663c7727cd6449de0a | null |
arvo:3621 | n132/arvo:3621-vul | /src/librawspeed | [
{
"end_line": 107,
"function_name": "OrfDecoder::decodeRawInternal",
"start_line": 64,
"target_file": "/src/librawspeed/src/librawspeed/decoders/OrfDecoder.cpp"
}
] | Use-of-uninitialized-value | librawspeed | msan | INFO: Seed: 3161911407
INFO: Loaded 1 modules (11493 guards): 11493 [0xc78000, 0xc83394),
/out/RawParserFuzzer-GetDecoder-Decode: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialized bytes in __msan_check_mem_is_initialized at offset 308 inside [0x7fb254ae2000, 16448)
==3430==WARNING: MemorySanitizer: us... | cpp | 10b2886f2eef8087df5db76c16d4deb8fe3470d7 | https://github.com/darktable-org/rawspeed/commit/428f6a96d7db330045cfb5e352c6df759fe79bb7 | A vulnerability exists in OrfDecoder::decodeRawInternal() where IOException is caught, potentially suppressing important error handling. |
arvo:36463 | n132/arvo:36463-vul | /src/mupdf | [
{
"end_line": 2055,
"function_name": "fz_draw_clip_image_mask",
"start_line": 1922,
"target_file": "/src/mupdf/source/fitz/draw-device.c"
}
] | Heap-use-after-free READ 1 | mupdf | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3884366304
INFO: Loaded 1 modules (114847 inline 8-bit counters): 114847 [0x3847220, 0x38632bf),
INFO: Loaded 1 PC tables (114847 PCs): 114847 [0x1343600,0x1503ff0),
/out/pdf_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
error: cannot ... | cpp | 67fd576d694d9cc171cd720cd3ea9dac8105ab64 | https://github.com/ArtifexSoftware/mupdf/commit/45003f3921774577968e209a5f6900022a5cc9bf | null |
arvo:36476 | n132/arvo:36476-vul | /src/libtpms | [
{
"end_line": 4288,
"function_name": "INDEX_ORDERLY_RAM_Marshal",
"start_line": 4217,
"target_file": "/src/libtpms/src/tpm2/NVMarshal.c"
},
{
"end_line": 4393,
"function_name": "INDEX_ORDERLY_RAM_Unmarshal",
"start_line": 4290,
"target_file": "/src/libtpms/src/tpm2/NVMarshal.c"
... | Stack-buffer-overflow READ 4 | libtpms | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3559214097
INFO: Loaded 1 modules (21602 inline 8-bit counters): 21602 [0xa8f0d0, 0xa94532),
INFO: Loaded 1 PC tables (21602 PCs): 21602 [0x794f40,0x7e9560),
/out/fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
============================... | cpp | 17255da54cf8354d02369f1323dc50cfb87e2bf4 | https://github.com/stefanberger/libtpms/commit/034a5c02488cf7f0048e130177fc71c9e626e135 | A vulnerability exists in the NVMarshal function in the tpm2 codebase, where the marshalling and unmarshalling of NVRAM entries in the s_indexOrderlyRam array incorrectly assumes the presence of a 0-sized terminating node. The entries may instead fill the 512-byte array completely, leaving no space for an NV_RAM_HEADER... |
arvo:36500 | n132/arvo:36500-vul | /src/mupdf | [
{
"end_line": 2055,
"function_name": "fz_draw_clip_image_mask",
"start_line": 1922,
"target_file": "/src/mupdf/source/fitz/draw-device.c"
}
] | Use-of-uninitialized-value | mupdf | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4122252768
INFO: Loaded 1 modules (114850 inline 8-bit counters): 114850 [0x3def8ed, 0x3e0b98f),
INFO: Loaded 1 PC tables (114850 PCs): 114850 [0x1908d40,0x1ac9760),
/out/pdf_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
error: expecte... | cpp | 67fd576d694d9cc171cd720cd3ea9dac8105ab64 | https://github.com/ArtifexSoftware/mupdf/commit/45003f3921774577968e209a5f6900022a5cc9bf | null |
arvo:36504 | n132/arvo:36504-vul | /src/mupdf | [
{
"end_line": 2055,
"function_name": "fz_draw_clip_image_mask",
"start_line": 1922,
"target_file": "/src/mupdf/source/fitz/draw-device.c"
}
] | Use-of-uninitialized-value | mupdf | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 826540038
INFO: Loaded 1 modules (114850 inline 8-bit counters): 114850 [0x3def8ed, 0x3e0b98f),
INFO: Loaded 1 PC tables (114850 PCs): 114850 [0x1908d40,0x1ac9760),
/out/pdf_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
error: cannot r... | cpp | 67fd576d694d9cc171cd720cd3ea9dac8105ab64 | https://github.com/ArtifexSoftware/mupdf/commit/45003f3921774577968e209a5f6900022a5cc9bf | null |
arvo:36519 | n132/arvo:36519-vul | /src/mupdf | [
{
"end_line": 2055,
"function_name": "fz_draw_clip_image_mask",
"start_line": 1922,
"target_file": "/src/mupdf/source/fitz/draw-device.c"
}
] | Heap-use-after-free READ 8 | mupdf | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1975959930
INFO: Loaded 1 modules (114847 inline 8-bit counters): 114847 [0x3847220, 0x38632bf),
INFO: Loaded 1 PC tables (114847 PCs): 114847 [0x1343600,0x1503ff0),
/out/pdf_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
error: cannot ... | cpp | 67fd576d694d9cc171cd720cd3ea9dac8105ab64 | https://github.com/ArtifexSoftware/mupdf/commit/45003f3921774577968e209a5f6900022a5cc9bf | null |
arvo:3658 | n132/arvo:3658-vul | /src/librawspeed | [
{
"end_line": 221,
"function_name": "ArwDecoder::decodeRawInternal",
"start_line": 108,
"target_file": "/src/librawspeed/src/librawspeed/decoders/ArwDecoder.cpp"
}
] | Use-of-uninitialized-value | librawspeed | msan | INFO: Seed: 3114620701
INFO: Loaded 1 modules (11471 guards): 11471 [0xc77fa0, 0xc832dc),
/out/RawSpeedFuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside [0x7fd2cec1f000, 7762)
==3430==WARNING: MemorySanitizer: use-of-uninitialized-val... | cpp | c3cbb05c8d4f82f6b825b59533bbb91c672118e3 | https://github.com/darktable-org/rawspeed/commit/a9d287fd5a16d593aa742c4f0b2d1782a6fc12d7 | A vulnerability exists in ArwDecoder where IOException's are caught, potentially suppressing important error conditions. |
arvo:36663 | n132/arvo:36663-vul | /src/pcl | [
{
"end_line": 293,
"function_name": "PLYReader::vertexScalarPropertyCallback",
"start_line": 279,
"target_file": "/src/pcl/io/src/ply_io.cpp"
}
] | Heap-buffer-overflow WRITE 4 | pcl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3567351496
INFO: Loaded 1 modules (17059 inline 8-bit counters): 17059 [0xa144f0, 0xa18793),
INFO: Loaded 1 PC tables (17059 PCs): 17059 [0xa18798,0xa5b1c8),
/out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
[pcl::PLYReader... | cpp | 09e914b0b3b13c07710e814d71df3ff958945ba3 | https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae | null |
arvo:367 | n132/arvo:367-vul | /src/json | [
{
"end_line": 7605,
"function_name": "from_cbor_internal",
"start_line": 7136,
"target_file": "/src/json/src/json.hpp"
}
] | Heap-buffer-overflow READ 1 | json | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2941806452
INFO: Loaded 1 modules (1061 inline 8-bit counters): 1061 [0x65ad98, 0x65b1bd),
INFO: Loaded 1 PC tables (1061 PCs): 1061 [0x6053f8,0x609648),
/out/fuzzer-parse_cbor: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===================... | cpp | d7029c37aad0e93033242123e7a7a05a1c76bed4 | https://github.com/nlohmann/json/commit/cf9bf2d9136a9d1c2131f83aa493bb03f36849ab | null |
arvo:36718 | n132/arvo:36718-vul | /src/fluent-bit | [
{
"end_line": 220,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 32,
"target_file": "/src/fluent-bit/tests/internal/fuzzers/utils_fuzzer.c"
}
] | Heap-buffer-overflow READ {*} | fluent-bit | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2996663451
INFO: Loaded 1 modules (2937 inline 8-bit counters): 2937 [0x88a320, 0x88ae99),
INFO: Loaded 1 PC tables (2937 PCs): 2937 [0x88aea0,0x896630),
/out/flb-it-fuzz-utils_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
====... | c | 26c796fc6fb6b65a1a4ec92acf272e763a756c80 | https://github.com/fluent/fluent-bit/commit/05144b2d99a4d88db561d0329e4bd97453d466e1 | null |
arvo:368 | n132/arvo:368-vul | /src/freetype2 | [
{
"end_line": 1377,
"function_name": "cff_blend_doBlend",
"start_line": 1279,
"target_file": "/src/freetype2/src/cff/cffload.c"
}
] | Heap-use-after-free READ 1 | freetype2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3347186936
INFO: Loaded 1 modules (22218 inline 8-bit counters): 22218 [0x8c2d58, 0x8c8422),
INFO: Loaded 1 PC tables (22218 PCs): 22218 [0x7fa330,0x850fd0),
/out/ftfuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
========================... | cpp | 63765a8f2af9d379f5571c359fb7133b35878924 | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=bdec162d921d69f63b992a74b32542b973a6c117 | A vulnerability exists in `src/cff/cffload.c` within the `cff_blend_doBlend` function, where multiple `blend` operators in a row are not handled correctly. The issue arises from not adjusting `parser->stack` pointers into `subFont->blend_stack` after reallocation. |
arvo:3680 | n132/arvo:3680-vul | /src/librawspeed | [
{
"end_line": 686,
"function_name": "NefDecoder::DecodeNikonSNef",
"start_line": 580,
"target_file": "/src/librawspeed/src/librawspeed/decoders/NefDecoder.cpp"
}
] | Use-of-uninitialized-value | librawspeed | msan | INFO: Seed: 2446076068
INFO: Loaded 1 modules (11437 guards): 11437 [0xc75e90, 0xc81144),
/out/TiffDecoderFuzzer-NefDecoder: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside [0x733000000240, 144)
==3430==WARNING: MemorySanitizer: use-of-unin... | cpp | afffdab5c7577af933fe30aafa8357177df08df5 | https://github.com/darktable-org/rawspeed/commit/90d9e92bdbed0af58fdce4eb3b9b3af6698746ab | The NefDecoder::DecodeNikonSNef() function accepts truncated images. |
arvo:36930 | n132/arvo:36930-vul | /src/mruby | [
{
"end_line": 3418,
"function_name": "codegen",
"start_line": 1874,
"target_file": "/src/mruby/mrbgems/mruby-compiler/core/codegen.c"
}
] | UNKNOWN READ | mruby | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4120862395
INFO: Loaded 1 modules (15617 inline 8-bit counters): 15617 [0xa8bf50, 0xa8fc51),
INFO: Loaded 1 PC tables (15617 PCs): 15617 [0x77f138,0x7bc148),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEA... | cpp | cd02cef465c12e111a308f87ee899d91774440db | https://github.com/mruby/mruby/commit/06f49b3f84e799f08a80b16054eda916f2d32819 | A vulnerability exists in codegen.c where the value is not pushed when the loop is eliminated. |
arvo:37041 | n132/arvo:37041-vul | /src/pcl | [
{
"end_line": 324,
"function_name": "PLYReader::vertexListPropertyContentCallback",
"start_line": 310,
"target_file": "/src/pcl/io/src/ply_io.cpp"
}
] | Heap-buffer-overflow WRITE 4 | pcl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2729459170
INFO: Loaded 1 modules (17059 inline 8-bit counters): 17059 [0xa14510, 0xa187b3),
INFO: Loaded 1 PC tables (17059 PCs): 17059 [0xa187b8,0xa5b1e8),
/out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
[pcl::PLYReader... | cpp | 09e914b0b3b13c07710e814d71df3ff958945ba3 | https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae | null |
arvo:37125 | n132/arvo:37125-vul | /src/pcl | [
{
"end_line": 293,
"function_name": "PLYReader::vertexScalarPropertyCallback",
"start_line": 279,
"target_file": "/src/pcl/io/src/ply_io.cpp"
}
] | Heap-buffer-overflow WRITE 2 | pcl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 185717075
INFO: Loaded 1 modules (17059 inline 8-bit counters): 17059 [0xa13510, 0xa177b3),
INFO: Loaded 1 PC tables (17059 PCs): 17059 [0xa177b8,0xa5a1e8),
/out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
[pcl::PLYReader]... | cpp | 09e914b0b3b13c07710e814d71df3ff958945ba3 | https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae | null |
arvo:37158 | n132/arvo:37158-vul | /src/mruby | [
{
"end_line": 1017,
"function_name": "pack_M",
"start_line": 958,
"target_file": "/src/mruby/mrbgems/mruby-pack/src/pack.c"
}
] | Use-of-uninitialized-value | mruby | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3383160667
INFO: Loaded 1 modules (15630 inline 8-bit counters): 15630 [0xa7071d, 0xa7442b),
INFO: Loaded 1 PC tables (15630 PCs): 15630 [0x7c6dc0,0x803ea0),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==2591==WARNING: Mem... | c | ad194bd46bd51aa5bfd5863f3ce18dee8a347c29 | https://github.com/mruby/mruby/commit/8e5e96239c4e4b4725dbff14ce9f1019e3058de8 | null |
arvo:37211 | n132/arvo:37211-vul | /src/libexif | [
{
"end_line": 237,
"function_name": "exif_mnote_data_apple_identify",
"start_line": 231,
"target_file": "/src/libexif/libexif/apple/exif-mnote-data-apple.c"
}
] | Heap-buffer-overflow READ 3 | libexif | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 943780750
INFO: Loaded 1 modules (2615 inline 8-bit counters): 2615 [0x861a90, 0x8624c7),
INFO: Loaded 1 PC tables (2615 PCs): 2615 [0x5f00c8,0x5fa438),
/out/exif_loader_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===================... | cpp | d0ebd6eac1f67c9a7b970179c0a88ea2b229c300 | https://github.com/libexif/libexif/commit/22799320cc1187868d9a572661d12f0c3f9939b5 | A vulnerability exists where the identify function does not check if there is enough data before proceeding, potentially leading to issues when insufficient data is provided. |
arvo:37222 | n132/arvo:37222-vul | /src/libexif | [
{
"end_line": 148,
"function_name": "exif_mnote_data_apple_load",
"start_line": 56,
"target_file": "/src/libexif/libexif/apple/exif-mnote-data-apple.c"
}
] | Heap-buffer-overflow READ {*} | libexif | asan | =================================================================
==30438==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61100000013f at pc 0x0000004969b7 bp 0x7fffb987b8f0 sp 0x7fffb987b0b8
READ of size 256 at 0x61100000013f thread T0
SCARINESS: 26 (multi-byte-read-heap-buffer-overflow)
#0 0x4969b6 in... | cpp | ebb64dad152c48640a3f3ec6b03182c61a3eb5c6 | https://github.com/libexif/libexif/commit/790fb01e1c33c5c83e7f3e051fe6c6d5c3396ade | null |
arvo:37238 | n132/arvo:37238-vul | /src/espeak-ng | [
{
"end_line": 905,
"function_name": "TranslateLetter",
"start_line": 666,
"target_file": "/src/espeak-ng/src/libespeak-ng/numbers.c"
}
] | Heap-use-after-free READ 4 | espeak-ng | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2997909771
INFO: Loaded 1 modules (10291 inline 8-bit counters): 10291 [0x8bf420, 0x8c1c53),
INFO: Loaded 1 PC tables (10291 PCs): 10291 [0x8c1c58,0x8e9f88),
/out/ssml-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=====================... | c | 1f76c4b8bd320714aa61ad8abb527c5d92cc5164 | https://github.com/espeak-ng/espeak-ng/commit/1da9ad10e80f2e2365c4c00b532fe908b4b8fe19 | null |
arvo:37302 | n132/arvo:37302-vul | /src/spice-usbredir | [
{
"end_line": 1879,
"function_name": "usbredirparser_unserialize",
"start_line": 1733,
"target_file": "/src/spice-usbredir/usbredirparser/usbredirparser.c"
}
] | Use-of-uninitialized-value | spice-usbredir | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2977798090
INFO: Loaded 1 modules (996 inline 8-bit counters): 996 [0x82a998, 0x82ad7c),
INFO: Loaded 1 PC tables (996 PCs): 996 [0x82ad80,0x82ebc0),
/out/usbredirparserfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==436==WARNING: Memory... | cpp | f2835023d808c3f73d7f2e495968b9568d5c2bef | https://gitlab.freedesktop.org/spice/usbredir.gite37d86c260d95eae53326b14d496ffa85e9e5934 | null |
arvo:37316 | n132/arvo:37316-vul | /src/spice-usbredir | [
{
"end_line": 1879,
"function_name": "usbredirparser_unserialize",
"start_line": 1733,
"target_file": "/src/spice-usbredir/usbredirparser/usbredirparser.c"
}
] | Use-of-uninitialized-value | spice-usbredir | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1611034802
INFO: Loaded 1 modules (996 inline 8-bit counters): 996 [0x82a998, 0x82ad7c),
INFO: Loaded 1 PC tables (996 PCs): 996 [0x82ad80,0x82ebc0),
/out/usbredirparserfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==436==WARNING: Memory... | cpp | f2835023d808c3f73d7f2e495968b9568d5c2bef | https://gitlab.freedesktop.org/spice/usbredir.gite37d86c260d95eae53326b14d496ffa85e9e5934 | null |
arvo:3732 | n132/arvo:3732-vul | /src/librawspeed | [
{
"end_line": 207,
"function_name": "Cr2Decompressor::decodeN_X_Y",
"start_line": 112,
"target_file": "/src/librawspeed/src/librawspeed/decompressors/Cr2Decompressor.cpp"
}
] | Use-of-uninitialized-value | librawspeed | msan | INFO: Seed: 3102954295
INFO: Loaded 1 modules (11416 guards): 11416 [0xc74e10, 0xc80070),
/out/FiffParserFuzzer-GetDecoder-Decode: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside [0x714000000420, 4)
==3430==WARNING: MemorySanitizer: use-of-... | cpp | 3ac134fff83de379ee69ba564e355462a628910c | https://github.com/darktable-org/rawspeed/commit/46e80e0624acf65043893f9e708fd701bdbba46b | The vulnerability in Cr2Decompressor::decodeN_X_Y() allows slices to not cover the whole image size. |
arvo:37334 | n132/arvo:37334-vul | /src/libexif | [
{
"end_line": 159,
"function_name": "exif_mnote_data_apple_load",
"start_line": 56,
"target_file": "/src/libexif/libexif/apple/exif-mnote-data-apple.c"
}
] | UNKNOWN READ | libexif | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2725011865
INFO: Loaded 1 modules (2624 inline 8-bit counters): 2624 [0x861b10, 0x862550),
INFO: Loaded 1 PC tables (2624 PCs): 2624 [0x5f04c8,0x5fa8c8),
/out/exif_loader_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:D... | cpp | ead49aedb49015b4095c0d43f1f9ce913791eb52 | https://github.com/libexif/libexif/commit/d61e9aaddf4f8af5aecea4935f8feb59f42141c1 | null |
arvo:37387 | n132/arvo:37387-vul | /src/spice-usbredir | [
{
"end_line": 1879,
"function_name": "usbredirparser_unserialize",
"start_line": 1733,
"target_file": "/src/spice-usbredir/usbredirparser/usbredirparser.c"
}
] | Use-of-uninitialized-value | spice-usbredir | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1007802773
INFO: Loaded 1 modules (996 inline 8-bit counters): 996 [0x82a998, 0x82ad7c),
INFO: Loaded 1 PC tables (996 PCs): 996 [0x82ad80,0x82ebc0),
/out/usbredirparserfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialized bytes in... | cpp | f2835023d808c3f73d7f2e495968b9568d5c2bef | https://gitlab.freedesktop.org/spice/usbredir.gite37d86c260d95eae53326b14d496ffa85e9e5934 | null |
arvo:37494 | n132/arvo:37494-vul | /src/assimp | [
{
"end_line": 323,
"function_name": "isNumeric",
"start_line": 320,
"target_file": "/src/assimp/contrib/openddlparser/include/openddlparser/OpenDDLParserUtils.h"
}
] | Index-out-of-bounds | assimp | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4279531540
INFO: Loaded 1 modules (239541 inline 8-bit counters): 239541 [0x2b9f380, 0x2bd9b35),
INFO: Loaded 1 PC tables (239541 PCs): 239541 [0x2bd9b38,0x2f81688),
/out/assimp_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Info, T0: ... | cpp | 107371657b39c8cd4bcc8d8865d9071ff17049d2 | https://github.com/assimp/assimp/commit/6a3ac623b960905b3450b78e7614453dae0540ed | null |
arvo:37575 | n132/arvo:37575-vul | /src/libexif | [
{
"end_line": 164,
"function_name": "exif_mnote_data_apple_load",
"start_line": 56,
"target_file": "/src/libexif/libexif/apple/exif-mnote-data-apple.c"
}
] | UNKNOWN READ | libexif | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1082176627
INFO: Loaded 1 modules (2655 inline 8-bit counters): 2655 [0x862fd0, 0x863a2f),
INFO: Loaded 1 PC tables (2655 PCs): 2655 [0x5f1868,0x5fbe58),
/out/exif_from_data_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitize... | cpp | a4647a5463102c4b0c5a02461edd4cc085dfc1b6 | https://github.com/libexif/libexif/commit/b1e292af7d6ff811755026ec551e37e73ae07469 | A vulnerability exists where the bufsize check occurs after a potential integer overflow, allowing the overflow to happen before validation. |
arvo:37621 | n132/arvo:37621-vul | /src/lua | [
{
"end_line": 554,
"function_name": "luaD_pretailcall",
"start_line": 520,
"target_file": "/src/lua/ldo.c"
}
] | Heap-buffer-overflow READ 8 | lua | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_lua
=================================================================
==212==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000d4f at pc 0x0000004ecefb bp 0x7ffc3ad36a70 sp 0x7ffc3ad36a68
READ of size 16 at 0x60300000... | c | 066e0f93c4901e601d93e31fb700f8f66f95feb8 | https://github.com/lua/lua/commit/cf613cdc6fa367257fc61c256f63d917350858b5 | A vulnerability exists where finalizers can be called with an invalid stack. The call to 'checkstackGC' can trigger finalizers while 'ci' (CallInfo) is only partially updated, leading to inconsistent CallInfo being accessed by the finalizers. |
arvo:37687 | n132/arvo:37687-vul | /src/libgd | [
{
"end_line": 927,
"function_name": "gdImageColorTransparent",
"start_line": 901,
"target_file": "/src/libgd/src/gd.c"
}
] | Index-out-of-bounds | libgd | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3058888415
INFO: Loaded 1 modules (2538 inline 8-bit counters): 2538 [0x7501f0, 0x750bda),
INFO: Loaded 1 PC tables (2538 PCs): 2538 [0x500150,0x509ff0),
/out/gif_target: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
gd.c:922:2: runtime error:... | cpp | dceb29a6f5e8b0fb5e21d14c39013efcbb9203ee | https://github.com/libgd/libgd/commit/ba14dec6efe9d87fe80fa1d7bd3d5b0583e1320e | The vulnerability occurs because gdImageColorTransparent does not correctly handle the case when im->transparent is set to -1, which is the initial value indicating that no transparent color has been set. This results in undefined behavior due to an out-of-bounds write to im->alpha[im->transparent] in gd.c, specificall... |
arvo:37812 | n132/arvo:37812-vul | /src/libvips | [
{
"end_line": 680,
"function_name": "vips_image_guess_interpretation",
"start_line": 571,
"target_file": "/src/libvips/libvips/iofuncs/header.c"
}
] | UNKNOWN READ | libvips | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2474735532
INFO: Loaded 1 modules (238157 inline 8-bit counters): 238157 [0x3f851b0, 0x3fbf3fd),
INFO: Loaded 1 PC tables (238157 PCs): 238157 [0x3fbf400,0x43618d0),
/out/jpegsave_file_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
(pr... | cpp | b9230edcbe8738b5be46137221b4d3b7ac699a55 | https://github.com/libvips/libvips/commit/30897e8e3614ba8a7f2cd1d79a7020ba50a9a463 | null |
arvo:37866 | n132/arvo:37866-vul | /src/wolfmqtt | [
{
"end_line": 1016,
"function_name": "MqttClient_WaitType",
"start_line": 775,
"target_file": "/src/wolfmqtt/src/mqtt_client.c"
}
] | Heap-buffer-overflow WRITE 4 | wolfmqtt | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1173602230
INFO: Loaded 1 modules (14639 inline 8-bit counters): 14639 [0x83cc460, 0x83cfd8f),
INFO: Loaded 1 PC tables (14639 PCs): 14639 [0x834603c,0x83629b4),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=============... | cpp | 52653a609f99bcd6be7402891b5f5aca288f3e78 | https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2 | null |
arvo:37878 | n132/arvo:37878-vul | /src/wolfmqtt | [
{
"end_line": 1016,
"function_name": "MqttClient_WaitType",
"start_line": 775,
"target_file": "/src/wolfmqtt/src/mqtt_client.c"
}
] | UNKNOWN READ | wolfmqtt | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2906671187
INFO: Loaded 1 modules (22540 inline 8-bit counters): 22540 [0x8ce720, 0x8d3f2c),
INFO: Loaded 1 PC tables (22540 PCs): 22540 [0x5c8128,0x6201e8),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehavior... | cpp | 52653a609f99bcd6be7402891b5f5aca288f3e78 | https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2 | null |
arvo:38018 | n132/arvo:38018-vul | /src/wolfmqtt | [
{
"end_line": 1776,
"function_name": "MqttDecode_Auth",
"start_line": 1702,
"target_file": "/src/wolfmqtt/src/mqtt_packet.c"
}
] | Heap-buffer-overflow READ 1 | wolfmqtt | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2837848956
INFO: Loaded 1 modules (15197 inline 8-bit counters): 15197 [0x83d89e0, 0x83dc53d),
INFO: Loaded 1 PC tables (15197 PCs): 15197 [0x835022c,0x836dd14),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=============... | cpp | cce1fdab8ca5e082b09b2ab00fbcf4cf38ef9430 | https://github.com/wolfSSL/wolfMQTT/commit/362b34afc2584237175a2a592b4741df7104faec | null |
arvo:38048 | n132/arvo:38048-vul | /src/kamailio | [
{
"end_line": 175,
"function_name": "skip_name",
"start_line": 125,
"target_file": "/src/kamailio/src/core/parser/contact/contact.c"
}
] | Heap-buffer-overflow READ 1 | kamailio | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 523367874
INFO: Loaded 1 modules (82605 inline 8-bit counters): 82605 [0x13538b0, 0x1367b5d),
INFO: Loaded 1 PC tables (82605 PCs): 82605 [0x10a91f8,0x11ebcc8),
/out/fuzz_parse_msg: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===============... | cpp | 96656e0dfe66aba44ec5fceb27ce5f1e088a78a4 | https://github.com/kamailio/kamailio/commit/20db418f1e35f31d7a90d7cabbd22ae989b7266c | null |
arvo:38052 | n132/arvo:38052-vul | /src/kamailio | [
{
"end_line": 175,
"function_name": "skip_name",
"start_line": 125,
"target_file": "/src/kamailio/src/core/parser/contact/contact.c"
}
] | Heap-buffer-overflow READ 1 | kamailio | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 597689611
INFO: Loaded 1 modules (82605 inline 8-bit counters): 82605 [0x13538b0, 0x1367b5d),
INFO: Loaded 1 PC tables (82605 PCs): 82605 [0x10a91f8,0x11ebcc8),
/out/fuzz_parse_msg: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===============... | c | 96656e0dfe66aba44ec5fceb27ce5f1e088a78a4 | https://github.com/kamailio/kamailio/commit/20db418f1e35f31d7a90d7cabbd22ae989b7266c | null |
arvo:38065 | n132/arvo:38065-vul | /src/kamailio | [
{
"end_line": 175,
"function_name": "skip_name",
"start_line": 125,
"target_file": "/src/kamailio/src/core/parser/contact/contact.c"
}
] | Heap-buffer-overflow READ 1 | kamailio | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4023068244
INFO: Loaded 1 modules (82605 inline 8-bit counters): 82605 [0x13538b0, 0x1367b5d),
INFO: Loaded 1 PC tables (82605 PCs): 82605 [0x10a91f8,0x11ebcc8),
/out/fuzz_parse_msg: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==============... | cpp | 96656e0dfe66aba44ec5fceb27ce5f1e088a78a4 | https://github.com/kamailio/kamailio/commit/20db418f1e35f31d7a90d7cabbd22ae989b7266c | null |
arvo:38146 | n132/arvo:38146-vul | /src/wolfmqtt | [
{
"end_line": 1016,
"function_name": "MqttClient_WaitType",
"start_line": 775,
"target_file": "/src/wolfmqtt/src/mqtt_client.c"
}
] | Heap-buffer-overflow WRITE 1 | wolfmqtt | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3489331849
INFO: Loaded 1 modules (14570 inline 8-bit counters): 14570 [0x97ff70, 0x98385a),
INFO: Loaded 1 PC tables (14570 PCs): 14570 [0x6d3c10,0x70cab0),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================... | cpp | 52653a609f99bcd6be7402891b5f5aca288f3e78 | https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2 | null |
arvo:3818 | n132/arvo:3818-vul | /src/librawspeed | [
{
"end_line": 222,
"function_name": "ArwDecoder::decodeRawInternal",
"start_line": 108,
"target_file": "/src/librawspeed/src/librawspeed/decoders/ArwDecoder.cpp"
}
] | Use-of-uninitialized-value | librawspeed | msan | INFO: Seed: 3583265711
INFO: Loaded 1 modules (11452 guards): 11452 [0xc77d60, 0xc83050),
/out/TiffDecoderFuzzer-ArwDecoder: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside [0x713000000200, 64)
==3430==WARNING: MemorySanitizer: use-of-unini... | cpp | 764515f1aebe7f780d9c4b089773b0715a80ec8e | https://github.com/darktable-org/rawspeed/commit/eca4047c7f90d6893ac190126c426e40458f7bbf | A vulnerability exists in ArwDecoder::decodeRawInternal() where ARWv1 does not enforce the requirement that the image height must be a multiple of two. |
arvo:38232 | n132/arvo:38232-vul | /src/wolfmqtt | [
{
"end_line": 630,
"function_name": "MqttDecode_Props",
"start_line": 478,
"target_file": "/src/wolfmqtt/src/mqtt_packet.c"
}
] | UNKNOWN READ | wolfmqtt | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3048544647
INFO: Loaded 1 modules (15144 inline 8-bit counters): 15144 [0x78b960, 0x78f488),
INFO: Loaded 1 PC tables (15144 PCs): 15144 [0x6deba0,0x719e20),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:... | cpp | 456ac9e24cfc3e1269afe9d7a864eccb39ca11bc | https://github.com/wolfSSL/wolfMQTT/commit/07527e688cfa41fa9406a1271052de3cd677069a | null |
arvo:38237 | n132/arvo:38237-vul | /src/wolfmqtt | [
{
"end_line": 1016,
"function_name": "MqttClient_WaitType",
"start_line": 775,
"target_file": "/src/wolfmqtt/src/mqtt_client.c"
}
] | Heap-buffer-overflow WRITE 8 | wolfmqtt | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 64070061
INFO: Loaded 1 modules (14542 inline 8-bit counters): 14542 [0x97ef70, 0x98283e),
INFO: Loaded 1 PC tables (14542 PCs): 14542 [0x6d3990,0x70c670),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===================... | cpp | 52653a609f99bcd6be7402891b5f5aca288f3e78 | https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2 | null |
arvo:38298 | n132/arvo:38298-vul | /src/mruby | [
{
"end_line": 814,
"function_name": "mrb_ary_splice",
"start_line": 728,
"target_file": "/src/mruby/src/array.c"
}
] | Heap-buffer-overflow READ 8 | mruby | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/mruby_fuzzer
=================================================================
==2140==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62f00000c430 at pc 0x00000050c366 bp 0x7ffdc8064640 sp 0x7ffdc8064638
READ of size 8 at 0x62f0... | cpp | cd0ffd6f1ca413f36b6239de7779ae7778e1a200 | https://github.com/mruby/mruby/commit/da749d870f4a57df7a05ef4a9ae023602d48af86 | A vulnerability exists in `array.c` where the tail position is not adjusted in the `mrb_ary_splice` function. |
arvo:38313 | n132/arvo:38313-vul | /src/c-blosc | [
{
"end_line": 609,
"function_name": "blosclz_compress",
"start_line": 422,
"target_file": "/src/c-blosc/blosc/blosclz.c"
}
] | Heap-buffer-overflow WRITE 1 | c-blosc | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 579938505
INFO: Loaded 1 modules (38734 inline 8-bit counters): 38734 [0xaf66e0, 0xaffe2e),
INFO: Loaded 1 PC tables (38734 PCs): 38734 [0xa10428,0xaa7908),
/out/compress_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==================... | c | 41f3a2e95301e05579c321dc710a877732792733 | https://github.com/Blosc/c-blosc/commit/8f702156e8c9ecc8bbcbabfc0d8ee38bc294dddd | null |
arvo:38359 | n132/arvo:38359-vul | /src/libsrtp | [
{
"end_line": 3301,
"function_name": "srtp_crypto_policy_set_null_cipher_hmac_null",
"start_line": 3288,
"target_file": "/src/libsrtp/srtp/srtp.c"
}
] | Heap-buffer-overflow READ {*} | libsrtp | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/srtp-fuzzer
=================================================================
==2736==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000120 at pc 0x00000049b747 bp 0x7ffe6fb4abd0 sp 0x7ffe6fb4a398
READ of size 30 at 0x6020... | c | 19e6a05567db3b16f98eee5c199dc063ed1f6f37 | https://github.com/cisco/libsrtp/commit/f1d1e57a49dca345e086e01b5fccc44e723221e0 | null |
arvo:38369 | n132/arvo:38369-vul | /src/dav1d | [
{
"end_line": 3301,
"function_name": "dav1d_decode_frame_init",
"start_line": 2910,
"target_file": "/src/dav1d/src/decode.c"
}
] | Heap-buffer-overflow READ {*} | dav1d | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2986933708
INFO: Loaded 1 modules (12244 inline 8-bit counters): 12244 [0x806ac0, 0x809a94),
INFO: Loaded 1 PC tables (12244 PCs): 12244 [0x809a98,0x8397d8),
/out/dav1d_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
====================... | c | 833c818b87464baa547a2fc5a4f10e5dd5b2ea32 | https://code.videolan.org/videolan/dav1d.git69ff474a7f3a7ccc61c5e6881e45e0afe693f352 | null |
arvo:38387 | n132/arvo:38387-vul | /src/libavc | [
{
"end_line": 1936,
"function_name": "ih264d_parse_decode_slice",
"start_line": 1067,
"target_file": "/src/libavc/decoder/ih264d_parse_slice.c"
}
] | Heap-buffer-overflow READ 4 | libavc | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4229541865
INFO: Loaded 1 modules (7960 inline 8-bit counters): 7960 [0x836fdb0, 0x8371cc8),
INFO: Loaded 1 PC tables (7960 PCs): 7960 [0x83134f4,0x8322db4),
/out/avc_dec_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==================... | c | 98f2ad26bfea2ee9ef560a623c0e158d11e55985 | https://android.googlesource.com/platform/external/libavc/+/d69d66fa57a73a2f75b6b19d7acbd7aaf269f87c%5E%21/ | null |
arvo:38439 | n132/arvo:38439-vul | /src/dav1d | [
{
"end_line": 3301,
"function_name": "dav1d_decode_frame_init",
"start_line": 2910,
"target_file": "/src/dav1d/src/decode.c"
}
] | Heap-buffer-overflow READ {*} | dav1d | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 533487598
INFO: Loaded 1 modules (12216 inline 8-bit counters): 12216 [0x841a140, 0x841d0f8),
INFO: Loaded 1 PC tables (12216 PCs): 12216 [0x841d0f8,0x8434eb8),
/out/dav1d_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================... | c | 833c818b87464baa547a2fc5a4f10e5dd5b2ea32 | https://code.videolan.org/videolan/dav1d.git69ff474a7f3a7ccc61c5e6881e45e0afe693f352 | null |
arvo:38482 | n132/arvo:38482-vul | /src/libavc | [
{
"end_line": 1936,
"function_name": "ih264d_parse_decode_slice",
"start_line": 1067,
"target_file": "/src/libavc/decoder/ih264d_parse_slice.c"
}
] | Heap-buffer-overflow READ 4 | libavc | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3753318552
INFO: Loaded 1 modules (8823 inline 8-bit counters): 8823 [0x8395d90, 0x8398007),
INFO: Loaded 1 PC tables (8823 PCs): 8823 [0x8332430,0x83437e8),
/out/avc_dec_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==================... | cpp | 42f977c44f204fb6f087fac080c4c05621048da3 | https://android.googlesource.com/platform/external/libavc/+/cd0385dc074c6ba119dffbcd3df669a9b9ca1790%5E%21/ | null |
arvo:3852 | n132/arvo:3852-vul | /src/pcre2 | [
{
"end_line": 7384,
"function_name": "compile_branch",
"start_line": 4812,
"target_file": "/src/pcre2/src/pcre2_compile.c"
}
] | Heap-buffer-overflow READ 1 | pcre2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3558738898
INFO: Loaded 1 modules (8983 inline 8-bit counters): 8983 [0x6eb170, 0x6ed487),
INFO: Loaded 1 PC tables (8983 PCs): 8983 [0x67bd20,0x69ee90),
/out/pcre2_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
========================... | c | 76e1ce08a6f804ededdf4d95121d22a16aa9bd02 | https://github.com/PCRE2Project/pcre2/commit/36366914f502a466de2349ce53239e1b20d0e586 | null |
arvo:38553 | n132/arvo:38553-vul | /src/zstd | [
{
"end_line": 230,
"function_name": "FSE_NCountWriteBound",
"start_line": 222,
"target_file": "/src/zstd/lib/compress/fse_compress.c"
}
] | Heap-buffer-overflow WRITE 1 | zstd | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1265215656
INFO: Loaded 1 modules (67234 inline 8-bit counters): 67234 [0xcefde0, 0xd00482),
INFO: Loaded 1 PC tables (67234 PCs): 67234 [0xb83f80,0xc8a9a0),
/out/simple_compress: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================... | c | 1e99d363613e10c6f590bda6f3bb1e0e0fabf680 | https://github.com/facebook/zstd/commit/044c8b47224d7cfbbd57317906e91f2db5b30994 | null |
arvo:38748 | n132/arvo:38748-vul | /src/wolfmqtt | [
{
"end_line": 2157,
"function_name": "MqttClient_WaitMessage",
"start_line": 2145,
"target_file": "/src/wolfmqtt/src/mqtt_client.c"
}
] | Segv on unknown address | wolfmqtt | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/wolfmqtt-fuzzer
AddressSanitizer:DEADLYSIGNAL
=================================================================
==18687==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x0000004ee8db bp 0x7fff19a11e90 sp 0x7fff19a11e80 T0)
==18687==Th... | cpp | f7a7290ea145ec42aeca46bd4d7ee059c070605f | https://github.com/wolfSSL/wolfMQTT/commit/00a5a5d881d6dc1e4b4d2032e873b6fc3fc1d7b3 | null |
arvo:38793 | n132/arvo:38793-vul | /src/c-blosc | [
{
"end_line": 609,
"function_name": "blosclz_compress",
"start_line": 422,
"target_file": "/src/c-blosc/blosc/blosclz.c"
}
] | Use-of-uninitialized-value | c-blosc | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 600434148
INFO: Loaded 1 modules (37244 inline 8-bit counters): 37244 [0xc1587c, 0xc1e9f8),
INFO: Loaded 1 PC tables (37244 PCs): 37244 [0xb34c28,0xbc63e8),
/out/compress_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==2237==WARNING: M... | c | 41f3a2e95301e05579c321dc710a877732792733 | https://github.com/Blosc/c-blosc/commit/8f702156e8c9ecc8bbcbabfc0d8ee38bc294dddd | null |
arvo:38872 | n132/arvo:38872-vul | /src/sleuthkit | [
{
"end_line": 703,
"function_name": "ext4_load_attrs_inline",
"start_line": 600,
"target_file": "/src/sleuthkit/tsk/fs/ext2fs.c"
}
] | Heap-buffer-overflow READ {*} | sleuthkit | asan | INFO: Seed: 3448738511
INFO: Loaded 1 modules (18904 inline 8-bit counters): 18904 [0xaf0ef8, 0xaf58d0),
INFO: Loaded 1 PC tables (18904 PCs): 18904 [0x7e7c08,0x831988),
/out/sleuthkit_fls_ext_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================================================================... | cpp | ebdaf6ddd59f4181750596af110bbf97c4665af1 | https://github.com/sleuthkit/sleuthkit/commit/675093ee08b1cc970419946760ca6340edfca272 | An integer overflow in the function ext4_load_attrs_inline leads to an out-of-bounds read. |
arvo:38898 | n132/arvo:38898-vul | /src/file | [
{
"end_line": 1126,
"function_name": "cdf_read_property_info",
"start_line": 971,
"target_file": "/src/file/src/cdf.c"
}
] | Heap-buffer-overflow READ {*} | file | asan | sat_len = 15751 ss = 512
cdf.c,477: cdf_calloc 15751 512
cdf.c,491: cdf_calloc 1 512
Chain: 2
cdf.c,749: cdf_calloc 1 512
Chain: 1
cdf.c,698: cdf_calloc 4 136
cdf.c,702: cdf_malloc 512
Chain: 3
cdf.c,594: cdf_calloc 1 512
Cannot find type 2 `FileHeader'
Chain: 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
cdf.c,594: cdf... | cpp | a9c8d2a9493c4e0cd201db57801f3502e65c686c | https://github.com/file/file/commit/46df39b68e51fd803d382348c0059fcb2e40b5ef | null |
arvo:38900 | n132/arvo:38900-vul | /src/wolfmqtt | [
{
"end_line": 1016,
"function_name": "MqttClient_WaitType",
"start_line": 775,
"target_file": "/src/wolfmqtt/src/mqtt_client.c"
}
] | UNKNOWN WRITE | wolfmqtt | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3647514630
INFO: Loaded 1 modules (14499 inline 8-bit counters): 14499 [0xa6c550, 0xa6fdf3),
INFO: Loaded 1 PC tables (14499 PCs): 14499 [0x7c7050,0x7ffa80),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:D... | cpp | 52653a609f99bcd6be7402891b5f5aca288f3e78 | https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2 | null |
arvo:3891 | n132/arvo:3891-vul | /src/pcre2 | [
{
"end_line": 7384,
"function_name": "compile_branch",
"start_line": 4812,
"target_file": "/src/pcre2/src/pcre2_compile.c"
}
] | Heap-buffer-overflow READ {*} | pcre2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1179424093
INFO: Loaded 1 modules (8983 inline 8-bit counters): 8983 [0x6eb170, 0x6ed487),
INFO: Loaded 1 PC tables (8983 PCs): 8983 [0x67bd20,0x69ee90),
/out/pcre2_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
========================... | c | 76e1ce08a6f804ededdf4d95121d22a16aa9bd02 | https://github.com/PCRE2Project/pcre2/commit/36366914f502a466de2349ce53239e1b20d0e586 | null |
arvo:38924 | n132/arvo:38924-vul | /src/mruby | [
{
"end_line": 475,
"function_name": "mrb_last_insn",
"start_line": 467,
"target_file": "/src/mruby/mrbgems/mruby-compiler/core/codegen.c"
}
] | Use-of-uninitialized-value | mruby | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 873813513
INFO: Loaded 1 modules (21156 inline 8-bit counters): 21156 [0x939199, 0x93e43d),
INFO: Loaded 1 PC tables (21156 PCs): 21156 [0x885dc0,0x8d8800),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==2122==WARNING: Memo... | c | 938af8a8ff8f3031f2a6100dcba705ae5d43be0b | https://github.com/mruby/mruby/commit/f85c50543b4ec93f327b9b064ea193493b046766 | A vulnerability exists in codegen.c within the mrb_last_insn function, where there is no check for a previous instruction on the top, potentially leading to unsafe behavior. |
arvo:38943 | n132/arvo:38943-vul | /src/gdbm | [
{
"end_line": 39,
"function_name": "gdbm_valid_key_p",
"start_line": 24,
"target_file": "/src/gdbm/src/gdbmseq.c"
}
] | Heap-buffer-overflow READ 8 | gdbm | asan | Running LLVMFuzzerInitialize ...
continue...
=================================================================
==12169==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6120000001b8 at pc 0x0000005a4bfd bp 0x7ffce65f91f0 sp 0x7ffce65f91e8
READ of size 8 at 0x6120000001b8 thread T0
SCARINESS: 23 (8-byte-read-h... | c | 8952f7fd7cebffbe4ecf8c232e4435c5de72678a | https://git.gnu.org.ua/gdbm.git/commit/?id=ca7194987388a825f57fdebd73eb9c491a8749b0 | A vulnerability exists in sequential access where key verification is not properly performed. In src/gdbmseq.c, the function gdbm_valid_key_p does not use gdbm_dir_entry_valid_p to validate the buffer index, and the order of checks is incorrect. This can lead to improper validation of keys during sequential access. |
arvo:38989 | n132/arvo:38989-vul | /src/mruby | [
{
"end_line": 653,
"function_name": "gen_move",
"start_line": 576,
"target_file": "/src/mruby/mrbgems/mruby-compiler/core/codegen.c"
}
] | Heap-buffer-overflow READ 1 | mruby | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 948433519
INFO: Loaded 1 modules (15793 inline 8-bit counters): 15793 [0xa8d9b0, 0xa91761),
INFO: Loaded 1 PC tables (15793 PCs): 15793 [0x7800f8,0x7bdc08),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=====================... | c | ca7228ad425706b81311e51eb7718f12bf7f4885 | https://github.com/mruby/mruby/commit/0455313a9bdbe93556a8fd31b7c011dd004a6f2b | null |
arvo:39017 | n132/arvo:39017-vul | /src/wolfmqtt | [
{
"end_line": 630,
"function_name": "MqttDecode_Props",
"start_line": 478,
"target_file": "/src/wolfmqtt/src/mqtt_packet.c"
}
] | Heap-buffer-overflow READ 1 | wolfmqtt | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2604705698
INFO: Loaded 1 modules (21493 inline 8-bit counters): 21493 [0x7f1450, 0x7f6845),
INFO: Loaded 1 PC tables (21493 PCs): 21493 [0x731da0,0x785cf0),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================... | cpp | 456ac9e24cfc3e1269afe9d7a864eccb39ca11bc | https://github.com/wolfSSL/wolfMQTT/commit/07527e688cfa41fa9406a1271052de3cd677069a | null |
arvo:39024 | n132/arvo:39024-vul | /src/wolfmqtt | [
{
"end_line": 630,
"function_name": "MqttDecode_Props",
"start_line": 478,
"target_file": "/src/wolfmqtt/src/mqtt_packet.c"
}
] | UNKNOWN READ | wolfmqtt | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3911541342
INFO: Loaded 1 modules (21359 inline 8-bit counters): 21359 [0x89dd10, 0x8a307f),
INFO: Loaded 1 PC tables (21359 PCs): 21359 [0x7e5a30,0x839120),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:D... | cpp | 456ac9e24cfc3e1269afe9d7a864eccb39ca11bc | https://github.com/wolfSSL/wolfMQTT/commit/07527e688cfa41fa9406a1271052de3cd677069a | null |
arvo:39028 | n132/arvo:39028-vul | /src/wolfmqtt | [
{
"end_line": 1016,
"function_name": "MqttClient_WaitType",
"start_line": 775,
"target_file": "/src/wolfmqtt/src/mqtt_client.c"
}
] | UNKNOWN WRITE | wolfmqtt | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3783349150
INFO: Loaded 1 modules (14499 inline 8-bit counters): 14499 [0xa6c550, 0xa6fdf3),
INFO: Loaded 1 PC tables (14499 PCs): 14499 [0x7c7050,0x7ffa80),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:D... | cpp | 52653a609f99bcd6be7402891b5f5aca288f3e78 | https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2 | null |
arvo:39036 | n132/arvo:39036-vul | /src/wolfmqtt | [
{
"end_line": 1016,
"function_name": "MqttClient_WaitType",
"start_line": 775,
"target_file": "/src/wolfmqtt/src/mqtt_client.c"
}
] | Segv on unknown address | wolfmqtt | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1311130261
INFO: Loaded 1 modules (14499 inline 8-bit counters): 14499 [0xa6c550, 0xa6fdf3),
INFO: Loaded 1 PC tables (14499 PCs): 14499 [0x7c7050,0x7ffa80),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:D... | cpp | 52653a609f99bcd6be7402891b5f5aca288f3e78 | https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2 | null |
arvo:39053 | n132/arvo:39053-vul | /src/wolfmqtt | [
{
"end_line": 1016,
"function_name": "MqttClient_WaitType",
"start_line": 775,
"target_file": "/src/wolfmqtt/src/mqtt_client.c"
}
] | Heap-buffer-overflow WRITE 1 | wolfmqtt | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/wolfmqtt-fuzzer
=================================================================
==18698==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f1256323ca4 at pc 0x0000004e4017 bp 0x7ffee5534b50 sp 0x7ffee5534b48
WRITE of size 1 at ... | cpp | 52653a609f99bcd6be7402891b5f5aca288f3e78 | https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2 | null |
arvo:39056 | n132/arvo:39056-vul | /src/wolfmqtt | [
{
"end_line": 1016,
"function_name": "MqttClient_WaitType",
"start_line": 775,
"target_file": "/src/wolfmqtt/src/mqtt_client.c"
}
] | Heap-buffer-overflow WRITE 1 | wolfmqtt | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2636761250
INFO: Loaded 1 modules (14570 inline 8-bit counters): 14570 [0x97ff70, 0x98385a),
INFO: Loaded 1 PC tables (14570 PCs): 14570 [0x6d3c10,0x70cab0),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================... | cpp | 52653a609f99bcd6be7402891b5f5aca288f3e78 | https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.