task_id stringlengths 8 10 | docker_image stringlengths 17 19 | basedir stringclasses 157
values | target_functions listlengths 1 3 | crash_type stringclasses 85
values | project_name stringclasses 157
values | sanitizer stringclasses 3
values | sanitizer_output stringlengths 1.13k 6.5M | language stringclasses 2
values | vuln_commit stringlengths 40 40 | fix stringlengths 69 110 | vulnerability_description stringlengths 38 824 ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
arvo:39070 | n132/arvo:39070-vul | /src/wolfmqtt | [
{
"end_line": 1016,
"function_name": "MqttClient_WaitType",
"start_line": 775,
"target_file": "/src/wolfmqtt/src/mqtt_client.c"
}
] | UNKNOWN READ | wolfmqtt | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1954108914
INFO: Loaded 1 modules (14542 inline 8-bit counters): 14542 [0x97ef70, 0x98283e),
INFO: Loaded 1 PC tables (14542 PCs): 14542 [0x6d3990,0x70c670),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:... | cpp | 52653a609f99bcd6be7402891b5f5aca288f3e78 | https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2 | null |
arvo:39083 | n132/arvo:39083-vul | /src/wolfmqtt | [
{
"end_line": 1016,
"function_name": "MqttClient_WaitType",
"start_line": 775,
"target_file": "/src/wolfmqtt/src/mqtt_client.c"
}
] | Heap-buffer-overflow WRITE 1 | wolfmqtt | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3296057287
INFO: Loaded 1 modules (14667 inline 8-bit counters): 14667 [0x83cc460, 0x83cfdab),
INFO: Loaded 1 PC tables (14667 PCs): 14667 [0x83465fc,0x8363054),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=============... | cpp | 52653a609f99bcd6be7402891b5f5aca288f3e78 | https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2 | null |
arvo:39094 | n132/arvo:39094-vul | /src/wolfmqtt | [
{
"end_line": 1016,
"function_name": "MqttClient_WaitType",
"start_line": 775,
"target_file": "/src/wolfmqtt/src/mqtt_client.c"
}
] | Heap-buffer-overflow READ 8 | wolfmqtt | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1583603887
INFO: Loaded 1 modules (14542 inline 8-bit counters): 14542 [0x97ef70, 0x98283e),
INFO: Loaded 1 PC tables (14542 PCs): 14542 [0x6d3990,0x70c670),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================... | cpp | 52653a609f99bcd6be7402891b5f5aca288f3e78 | https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2 | null |
arvo:39103 | n132/arvo:39103-vul | /src/wolfmqtt | [
{
"end_line": 1016,
"function_name": "MqttClient_WaitType",
"start_line": 775,
"target_file": "/src/wolfmqtt/src/mqtt_client.c"
}
] | Heap-buffer-overflow WRITE 1 | wolfmqtt | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1861961031
INFO: Loaded 1 modules (14542 inline 8-bit counters): 14542 [0x97ef70, 0x98283e),
INFO: Loaded 1 PC tables (14542 PCs): 14542 [0x6d3990,0x70c670),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================... | cpp | 52653a609f99bcd6be7402891b5f5aca288f3e78 | https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2 | null |
arvo:3936 | n132/arvo:3936-vul | /src/proj.4 | [
{
"end_line": 131,
"function_name": "pj_read_vgrid_value",
"start_line": 36,
"target_file": "/src/proj.4/src/pj_apply_vgridshift.c"
}
] | UNKNOWN READ | proj.4 | asan | INFO: Seed: 2869606350
INFO: Loaded 1 modules (5219 guards): 5219 [0x967400, 0x96c58c),
/out/standard_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEADLYSIGNAL
=================================================================
==31113==ERROR: AddressSanitizer: SEGV on unknown address 0x... | cpp | 0d1eeb16dd0a574d81ba0eaeea430f1be105a038 | https://github.com/OSGeo/proj.4/commit/7503fbe7511cf9b98f9321ef27ee7d2c05401a1e | null |
arvo:39373 | n132/arvo:39373-vul | /src/libheif | [
{
"end_line": 535,
"function_name": "Op_YCbCr_to_RGB<Pixel>::convert_colorspace",
"start_line": 369,
"target_file": "/src/libheif/libheif/heif_colorconversion.cc"
}
] | Heap-buffer-overflow READ {*} | libheif | asan | Reading 6620 bytes from /tmp/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/color-conversion-fuzzer < INPUT_FILE
or
/out/color-conversion-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz ex... | cpp | 23d87adc0d7059b95e54c38786e4a4b5fd99eee3 | https://github.com/strukturag/libheif/commit/11ffeffadd980f9f96019fe180fc1e81827e3790 | null |
arvo:39381 | n132/arvo:39381-vul | /src/wolfmqtt | [
{
"end_line": 1776,
"function_name": "MqttDecode_Auth",
"start_line": 1702,
"target_file": "/src/wolfmqtt/src/mqtt_packet.c"
}
] | Use-of-uninitialized-value | wolfmqtt | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2088459224
INFO: Loaded 1 modules (21387 inline 8-bit counters): 21387 [0x917cf0, 0x91d07b),
INFO: Loaded 1 PC tables (21387 PCs): 21387 [0x85e940,0x8b21f0),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==18862==WARNING:... | cpp | cce1fdab8ca5e082b09b2ab00fbcf4cf38ef9430 | https://github.com/wolfSSL/wolfMQTT/commit/362b34afc2584237175a2a592b4741df7104faec | null |
arvo:3940 | n132/arvo:3940-vul | /src/proj.4 | [
{
"end_line": 298,
"function_name": "proj_hgrid_init",
"start_line": 260,
"target_file": "/src/proj.4/src/pj_apply_gridshift.c"
}
] | Heap-buffer-overflow WRITE 7 | proj.4 | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/standard_fuzzer < INPUT_FILE
or
/out/standard_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/standard_... | cpp | 9222694f522afb0dd96a50a8263dad62efa5d54e | https://github.com/OSGeo/proj.4/commit/0d1eeb16dd0a574d81ba0eaeea430f1be105a038 | A heap-buffer-overflow occurs in the proj_hgrid_init function. |
arvo:3943 | n132/arvo:3943-vul | /src/proj.4 | [
{
"end_line": 131,
"function_name": "pj_read_vgrid_value",
"start_line": 36,
"target_file": "/src/proj.4/src/pj_apply_vgridshift.c"
}
] | UNKNOWN READ | proj.4 | ubsan | INFO: Seed: 2693958736
INFO: Loaded 1 modules (5362 guards): 5362 [0x7906e0, 0x795aa8),
/out/standard_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitizer:DEADLYSIGNAL
==31026==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0xfffffffffff38fc0 (pc 0x0000004656aa bp 0x7ffcf... | cpp | 0d1eeb16dd0a574d81ba0eaeea430f1be105a038 | https://github.com/OSGeo/proj.4/commit/7503fbe7511cf9b98f9321ef27ee7d2c05401a1e | null |
arvo:39438 | n132/arvo:39438-vul | /src/pcl | [
{
"end_line": 293,
"function_name": "PLYReader::vertexScalarPropertyCallback",
"start_line": 279,
"target_file": "/src/pcl/io/src/ply_io.cpp"
}
] | Heap-buffer-overflow WRITE 8 | pcl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4001265038
INFO: Loaded 1 modules (16507 inline 8-bit counters): 16507 [0x80c870, 0x8108eb),
INFO: Loaded 1 PC tables (16507 PCs): 16507 [0x8108f0,0x8510a0),
/out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
[pcl::PLYReader... | cpp | 09e914b0b3b13c07710e814d71df3ff958945ba3 | https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae | null |
arvo:39477 | n132/arvo:39477-vul | /src/wolfmqtt | [
{
"end_line": 630,
"function_name": "MqttDecode_Props",
"start_line": 478,
"target_file": "/src/wolfmqtt/src/mqtt_packet.c"
}
] | Heap-buffer-overflow READ 1 | wolfmqtt | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2152421082
INFO: Loaded 1 modules (21620 inline 8-bit counters): 21620 [0x843e480, 0x84438f4),
INFO: Loaded 1 PC tables (21620 PCs): 21620 [0x83acbf8,0x83d6f98),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=============... | cpp | 456ac9e24cfc3e1269afe9d7a864eccb39ca11bc | https://github.com/wolfSSL/wolfMQTT/commit/35328b955d88c68ee1d2e4408a94834c26efb35c | null |
arvo:39481 | n132/arvo:39481-vul | /src/libvips | [
{
"end_line": 229,
"function_name": "vips_foreign_load_jxl_fill_input",
"start_line": 200,
"target_file": "/src/libvips/libvips/foreign/jxlload.c"
}
] | Memcpy-param-overlap | libvips | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/mosaic_fuzzer
=================================================================
==132330==ERROR: AddressSanitizer: memcpy-param-overlap: memory ranges [0x621000048ab0,0x621000048abd) and [0x621000048abc, 0x621000048ac9) overlap
SCARINESS: 1... | cpp | bd8fad842a1858eefdb61193cc7a19d7e47f9258 | https://github.com/libvips/libvips/commit/b98366fcb1bf24491b0033eb21b3f6f5c33e453f | A security vulnerability exists because the input buffer can overlap, and the use of an unsafe memory copy function instead of memmove in the affected code can lead to undefined behavior or memory corruption. |
arvo:39631 | n132/arvo:39631-vul | /src/wolfmqtt | [
{
"end_line": 1776,
"function_name": "MqttDecode_Auth",
"start_line": 1702,
"target_file": "/src/wolfmqtt/src/mqtt_packet.c"
}
] | UNKNOWN READ | wolfmqtt | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3102371564
INFO: Loaded 1 modules (21541 inline 8-bit counters): 21541 [0x7f13f0, 0x7f6815),
INFO: Loaded 1 PC tables (21541 PCs): 21541 [0x730e58,0x7850a8),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:... | cpp | cce1fdab8ca5e082b09b2ab00fbcf4cf38ef9430 | https://github.com/wolfSSL/wolfMQTT/commit/362b34afc2584237175a2a592b4741df7104faec | null |
arvo:39689 | n132/arvo:39689-vul | /src/freeradius-server | [
{
"end_line": 1318,
"function_name": "fr_dns_label_to_value_box",
"start_line": 1216,
"target_file": "/src/freeradius-server/src/lib/util/dns.c"
}
] | Heap-buffer-overflow READ 1 | freeradius-server | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2646913871
INFO: Loaded 3 modules (17005 inline 8-bit counters): 16321 [0x7f6496353e68, 0x7f6496357e29), 639 [0x7f6495df6940, 0x7f6495df6bbf), 45 [0x5ba610, 0x5ba63d),
INFO: Loaded 3 PC tables (17005 PCs): 16321 [0x7f6496357e30,0x7f6496397a40), 639 ... | c | 90284231653fc167b80572499199632511f2cd7a | https://github.com/FreeRADIUS/freeradius-server/commit/66e59da0336526c1f2d2d49aa12838b26d0e8240 | The vulnerability is that dns_label_decode() lacks sufficient validation. |
arvo:39750 | n132/arvo:39750-vul | /src/wolfmqtt | [
{
"end_line": 1776,
"function_name": "MqttDecode_Auth",
"start_line": 1702,
"target_file": "/src/wolfmqtt/src/mqtt_packet.c"
}
] | Heap-buffer-overflow READ 1 | wolfmqtt | asan | =================================================================
==18925==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x621000003e1c at pc 0x000000512675 bp 0x7ffdc09939b0 sp 0x7ffdc09939a8
READ of size 1 at 0x621000003e1c thread T0
SCARINESS: 22 (1-byte-read-heap-buffer-overflow-far-from-bounds)
#0 0... | cpp | cce1fdab8ca5e082b09b2ab00fbcf4cf38ef9430 | https://github.com/wolfSSL/wolfMQTT/commit/362b34afc2584237175a2a592b4741df7104faec | null |
arvo:39931 | n132/arvo:39931-vul | /src/mruby | [
{
"end_line": 536,
"function_name": "mrb_funcall_with_block",
"start_line": 434,
"target_file": "/src/mruby/src/vm.c"
}
] | Heap-buffer-overflow WRITE 8 | mruby | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/mruby_fuzzer
=================================================================
==2149==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61f000000c80 at pc 0x0000005a9a16 bp 0x7ffc45c72b10 sp 0x7ffc45c72b08
WRITE of size 8 at 0x61f... | c | 6b3b1012ca480f1e930c4ddeeaebed55e5df4144 | https://github.com/mruby/mruby/commit/7010ed0f0a414b1367e4620a504f106759341cc2 | null |
arvo:39937 | n132/arvo:39937-vul | /src/mruby | [
{
"end_line": 536,
"function_name": "mrb_funcall_with_block",
"start_line": 434,
"target_file": "/src/mruby/src/vm.c"
}
] | Heap-buffer-overflow WRITE 8 | mruby | asan | INFO: found LLVMFuzzerCustomMutator (0x5608c0). Disabling -len_control by default.
INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2560247870
INFO: Loaded 1 modules (27098 inline 8-bit counters): 27098 [0xb49818, 0xb501f2),
INFO: Loaded 1 PC tables (27098 PCs): 27098 [0x9bcaa8,0xa26848),
/out/mr... | cpp | 6b3b1012ca480f1e930c4ddeeaebed55e5df4144 | https://github.com/mruby/mruby/commit/7010ed0f0a414b1367e4620a504f106759341cc2 | null |
arvo:39940 | n132/arvo:39940-vul | /src/mruby | [
{
"end_line": 536,
"function_name": "mrb_funcall_with_block",
"start_line": 434,
"target_file": "/src/mruby/src/vm.c"
}
] | Heap-buffer-overflow WRITE 8 | mruby | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2826885667
INFO: Loaded 1 modules (21332 inline 8-bit counters): 21332 [0x8f5130, 0x8fa484),
INFO: Loaded 1 PC tables (21332 PCs): 21332 [0x7dcc18,0x830158),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
====================... | c | 6b3b1012ca480f1e930c4ddeeaebed55e5df4144 | https://github.com/mruby/mruby/commit/7010ed0f0a414b1367e4620a504f106759341cc2 | null |
arvo:40058 | n132/arvo:40058-vul | /src/pcl | [
{
"end_line": 293,
"function_name": "PLYReader::vertexScalarPropertyCallback",
"start_line": 279,
"target_file": "/src/pcl/io/src/ply_io.cpp"
}
] | Heap-buffer-overflow WRITE 1 | pcl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 851485913
INFO: Loaded 1 modules (16482 inline 8-bit counters): 16482 [0x80a870, 0x80e8d2),
INFO: Loaded 1 PC tables (16482 PCs): 16482 [0x80e8d8,0x84eef8),
/out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | cpp | 09e914b0b3b13c07710e814d71df3ff958945ba3 | https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae | null |
arvo:40069 | n132/arvo:40069-vul | /src/wolfmqtt | [
{
"end_line": 642,
"function_name": "MqttDecode_Props",
"start_line": 479,
"target_file": "/src/wolfmqtt/src/mqtt_packet.c"
}
] | Heap-buffer-overflow READ 1 | wolfmqtt | asan | =================================================================
==18817==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62100000430a at pc 0x000000514cbc bp 0x7ffe6f9bf3f0 sp 0x7ffe6f9bf3e8
READ of size 1 at 0x62100000430a thread T0
SCARINESS: 22 (1-byte-read-heap-buffer-overflow-far-from-bounds)
#0 0... | cpp | cce1fdab8ca5e082b09b2ab00fbcf4cf38ef9430 | https://github.com/wolfSSL/wolfMQTT/commit/27f9fdb1052b3cac5f0f577a2543fe5a71b39592 | null |
arvo:40120 | n132/arvo:40120-vul | /src/pcl | [
{
"end_line": 293,
"function_name": "PLYReader::vertexScalarPropertyCallback",
"start_line": 279,
"target_file": "/src/pcl/io/src/ply_io.cpp"
}
] | Container-overflow WRITE 4 | pcl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2194710548
INFO: Loaded 1 modules (16482 inline 8-bit counters): 16482 [0x80a870, 0x80e8d2),
INFO: Loaded 1 PC tables (16482 PCs): 16482 [0x80e8d8,0x84eef8),
/out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
[pcl::PLYReader... | cpp | 09e914b0b3b13c07710e814d71df3ff958945ba3 | https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae | null |
arvo:40317 | n132/arvo:40317-vul | /src/libbpf | [
{
"end_line": 4124,
"function_name": "bpf_object__collect_prog_relos",
"start_line": 4028,
"target_file": "/src/libbpf/src/libbpf.c"
}
] | UNKNOWN READ | libbpf | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4163357425
INFO: Loaded 1 modules (9368 inline 8-bit counters): 9368 [0x6ef570, 0x6f1a08),
INFO: Loaded 1 PC tables (9368 PCs): 9368 [0x670590,0x694f10),
/out/bpf-object-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DE... | c | 3acf7c289abf636bc74e078002c843b110cb69f5 | https://github.com/libbpf/libbpf/commit/36cc591ac8a7b390249c4f3afcef21b8c9c6c76f | libbpf lacks sufficient sanity checks for ELF relocations, which allows division by zero and out-of-bounds array accesses. |
arvo:40363 | n132/arvo:40363-vul | /src/libbpf | [
{
"end_line": 3342,
"function_name": "bpf_object__elf_collect",
"start_line": 3181,
"target_file": "/src/libbpf/src/libbpf.c"
}
] | Global-buffer-overflow READ {*} | libbpf | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3043424184
INFO: Loaded 1 modules (9366 inline 8-bit counters): 9366 [0x6ef570, 0x6f1a06),
INFO: Loaded 1 PC tables (9366 PCs): 9366 [0x670590,0x694ef0),
/out/bpf-object-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===================... | c | 2f52e2afc068b801880021334a41f16a18fa4bc2 | https://github.com/libbpf/libbpf/commit/a383b3e200c72fd5fdc8b8539fb409942357fc5b | The .BTF and .BTF.ext ELF sections may not have the SHT_PROGBITS type or may not contain data, making the ELF file invalid or corrupted. This can result in data->d_buf being NULL and cause a SIGSEGV later on. |
arvo:40396 | n132/arvo:40396-vul | /src/libjxl | [
{
"end_line": 1960,
"function_name": "JxlDecoderProcessInput",
"start_line": 1589,
"target_file": "/src/libjxl/lib/jxl/decode.cc"
}
] | Heap-buffer-overflow WRITE 1 | libjxl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1460874682
INFO: Loaded 1 modules (31942 inline 8-bit counters): 31942 [0x5630acaf52a8, 0x5630acafcf6e),
INFO: Loaded 1 PC tables (31942 PCs): 31942 [0x5630acafcf70,0x5630acb79bd0),
/out/djxl_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/p... | cpp | 35ad5de736b3f1ea9784113e2e30ea424c251616 | https://github.com/libjxl/libjxl/commit/839ef3e392240fc3994b8b73e5164ac5cad4d30a | null |
arvo:40617 | n132/arvo:40617-vul | /src/libexif | [
{
"end_line": 1027,
"function_name": "exif_data_load_data",
"start_line": 843,
"target_file": "/src/libexif/libexif/exif-data.c"
}
] | Heap-buffer-overflow READ 4 | libexif | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1072766538
INFO: Loaded 1 modules (2884 inline 8-bit counters): 2884 [0x6727c0, 0x673304),
INFO: Loaded 1 PC tables (2884 PCs): 2884 [0x5fd490,0x6088d0),
/out/exif_loader_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==================... | cpp | 54461dde98692a0741fbbe2e0c6c2533ae9594e1 | https://github.com/libexif/libexif/commit/4bd5cd63390731a1473205f9346cd4fcc1b0f668 | The vulnerability occurs because the function does not check the length read from the data against the data size passed into it, potentially allowing out-of-bounds reads. |
arvo:40623 | n132/arvo:40623-vul | /src/libexif | [
{
"end_line": 1022,
"function_name": "exif_data_load_data",
"start_line": 843,
"target_file": "/src/libexif/libexif/exif-data.c"
}
] | UNKNOWN READ | libexif | asan | =================================================================
==27940==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f28825f7800 at pc 0x00000049cfd7 bp 0x7ffe42a0bbd0 sp 0x7ffe42a0b398
READ of size 2097320 at 0x7f28825f7800 thread T0
SCARINESS: 26 (multi-byte-read-heap-buffer-overflow)
#0 0x49cfd... | cpp | a918830b8830e1e3657b4f36f48571a8d95a4ec8 | https://github.com/libexif/libexif/commit/54461dde98692a0741fbbe2e0c6c2533ae9594e1 | A vulnerability exists where the code does not check if len is less than 2, which can result in len becoming negative. |
arvo:40674 | n132/arvo:40674-vul | /src/libdwarf | [
{
"end_line": 1814,
"function_name": "read_gs_section_group",
"start_line": 1692,
"target_file": "/src/libdwarf/src/lib/libdwarf/dwarf_elf_load_headers.c"
}
] | Heap-buffer-overflow READ 8 | libdwarf | asan | =================================================================
==1528==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x616000000380 at pc 0x00000079ebbd bp 0x7ffe817f75d0 sp 0x7ffe817f75c8
READ of size 8 at 0x616000000380 thread T0
SCARINESS: 33 (8-byte-read-heap-buffer-overflow-far-from-bounds)
#0 0x... | c | 732c3509ffaa4b1aa70458c2ad568f55c6ae8e32 | https://github.com/davea42/libdwarf-code/commit/cd021a1311572d4f9bb37b0b808685a5ed84bcc3 | A test for a section group section-reference in src/lib/libdwarf/dwarf_elf_load_headers.c fails to catch a section number that is just one too big, potentially allowing out-of-bounds section references. |
arvo:40683 | n132/arvo:40683-vul | /src/binutils-gdb | [
{
"end_line": 7201,
"function_name": "evax_bfd_print_valspec",
"start_line": 7134,
"target_file": "/src/binutils-gdb/bfd/vms-alpha.c"
}
] | Heap-buffer-overflow READ 1 | binutils-gdb | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_objdump_safe
/tmp/libfuzzer.65034: file format vms-alpha
/tmp/libfuzzer.65034
EIHD: (size: 0, nbr blocks: 0)
majorid: 3, minorid: 0
image type: 0 (unknown), subtype: 0 (native)
offsets: isd: 0, activ: 0, symdbg: 256, imgid: 0, ... | cpp | 831105b6d96ae7ab9b485fb868f86e23d34ab36f | https://github.com/bminor/binutils-gdb/commit/a3c0896d80d21545bd8036deb5e1ad4027db5677 | The functions evax_bfd_print_desc, evax_bfd_print_valspec, evax_bfd_print_typspec, and evax_bfd_print_dst in vms-alpha.c lack proper sanity checks for buffer access, which leads to potential buffer overflows. |
arvo:40902 | n132/arvo:40902-vul | /src/arrow | [
{
"end_line": 2446,
"function_name": "GetInternal",
"start_line": 2405,
"target_file": "/src/arrow/cpp/src/parquet/encoding.cc"
}
] | Memcpy-param-overlap | arrow | asan | Warning: AFL++ tools might need to set AFL_MAP_SIZE to 236924 to be able to run this instrumented program if this crashes!
=================================================================
==804==ERROR: AddressSanitizer: memcpy-param-overlap: memory ranges [0x62400001b576,0x62410001b575) and [0x624000019524, 0x62410001... | cpp | 6b0248d5b5502a1cf76d5853d15be9844b84522c | https://github.com/apache/arrow/commit/35cc9d1409ed4bab07a40af704a13a6b2011f691 | null |
arvo:4097 | n132/arvo:4097-vul | /src/open62541 | [
{
"end_line": 521,
"function_name": "Service_DeleteSubscriptions",
"start_line": 502,
"target_file": "/src/open62541/src/server/ua_services_subscription.c"
}
] | Heap-use-after-free READ 8 | open62541 | asan | INFO: Seed: 3386537673
INFO: Loaded 1 modules (4763 guards): 4763 [0xa091c8, 0xa0dc34),
/out/fuzz_binary_message: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==1052==ERROR: AddressSanitizer: heap-use-after-free on address 0x6120000017e0 at pc 0... | cpp | 51427e75416cb8c72d220fe92a28b9ba25b9482d | https://github.com/open62541/open62541/commit/d9208207e458a973e481ded5f7c2cf765dd7ea4c | A heap use after free vulnerability exists where UA_Subscription_answerPublishRequestsNoSubscription is not immediately sent before the session is deleted. |
arvo:41143 | n132/arvo:41143-vul | /src/arrow | [
{
"end_line": 591,
"function_name": "ValidateOffsets",
"start_line": 545,
"target_file": "/src/arrow/cpp/src/arrow/array/validate.cc"
}
] | Heap-buffer-overflow READ 4 | arrow | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3336700390
INFO: Loaded 1 modules (203738 inline 8-bit counters): 203738 [0x14a6470, 0x14d804a),
INFO: Loaded 1 PC tables (203738 PCs): 203738 [0x14d8050,0x17f3df0),
/out/arrow-ipc-stream-fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===... | cpp | 50990ad5e9df494bf6dd108eeac1c8a64c550b52 | https://github.com/apache/arrow/commit/a36dd8cd208582316322b0dd6e7569785c8f2780 | A crash occurs when validating a corrupt list array in the C++ implementation, leading to a security vulnerability. |
arvo:41152 | n132/arvo:41152-vul | /src/pcl | [
{
"end_line": 293,
"function_name": "PLYReader::vertexScalarPropertyCallback",
"start_line": 279,
"target_file": "/src/pcl/io/src/ply_io.cpp"
}
] | Heap-buffer-overflow WRITE 4 | pcl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1675021370
INFO: Loaded 1 modules (16478 inline 8-bit counters): 16478 [0x80c7f0, 0x81084e),
INFO: Loaded 1 PC tables (16478 PCs): 16478 [0x810850,0x850e30),
/out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
[pcl::PLYReader... | cpp | 09e914b0b3b13c07710e814d71df3ff958945ba3 | https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae | null |
arvo:41221 | n132/arvo:41221-vul | /src/arrow | [
{
"end_line": 2460,
"function_name": "GetInternal",
"start_line": 2412,
"target_file": "/src/arrow/cpp/src/parquet/encoding.cc"
}
] | Heap-buffer-overflow WRITE 1 | arrow | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1640916606
INFO: Loaded 1 modules (1235618 inline 8-bit counters): 1235618 [0x55d8940, 0x57063e2),
INFO: Loaded 1 PC tables (1235618 PCs): 1235618 [0x57063e8,0x69e0e08),
/out/parquet-arrow-fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==... | cpp | eb2fa2df6dedf2743047df9dd19d7ed4f4482c22 | https://github.com/apache/arrow/commit/587ce1dc5fcf4172591bdfdcb8882d47507d7daa | A crash occurs when reading DELTA_BYTE_ARRAY Parquet files in the C++ implementation. |
arvo:41504 | n132/arvo:41504-vul | /src/espeak-ng | [
{
"end_line": 737,
"function_name": "IsLetterGroup",
"start_line": 672,
"target_file": "/src/espeak-ng/src/libespeak-ng/dictionary.c"
}
] | Stack-buffer-overflow READ 1 | espeak-ng | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2801437977
INFO: Loaded 1 modules (10266 inline 8-bit counters): 10266 [0x8be220, 0x8c0a3a),
INFO: Loaded 1 PC tables (10266 PCs): 10266 [0x8c0a40,0x8e8be0),
/out/ssml-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=====================... | c | 45eb1aa3afb9525de95feae0ca0312ddc235df19 | https://github.com/espeak-ng/espeak-ng/commit/d0bbf97edb4c3e2374ead19a0ecd9143983f2ddf | null |
arvo:41608 | n132/arvo:41608-vul | /src/libjxl | [
{
"end_line": 338,
"function_name": "ModularFrameDecoder::DecodeGroup",
"start_line": 264,
"target_file": "/src/libjxl/lib/jxl/dec_modular.cc"
}
] | Container-overflow READ 4 | libjxl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1780060375
INFO: Loaded 1 modules (32206 inline 8-bit counters): 32206 [0x5585735312f8, 0x5585735390c6),
INFO: Loaded 1 PC tables (32206 PCs): 32206 [0x5585735390c8,0x5585735b6da8),
/out/djxl_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/p... | cpp | d79b7191f1f1852e6e430c92c2ef58476ddf79b9 | https://github.com/libjxl/libjxl/commit/a915cd9ed0fd803449307aa37ba3c5364398bcc6 | null |
arvo:42108 | n132/arvo:42108-vul | /src/libraw | [
{
"end_line": 1183,
"function_name": "LibRaw::identify",
"start_line": 181,
"target_file": "/src/libraw/src/metadata/identify.cpp"
}
] | Stack-buffer-overflow WRITE 1 | libraw | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3282905641
INFO: Loaded 1 modules (21160 inline 8-bit counters): 21160 [0x90e810, 0x913ab8),
INFO: Loaded 1 PC tables (21160 PCs): 21160 [0x7f2048,0x844ac8),
/out/libraw_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===================... | cpp | 53c83c16e6adac220715d3f2bdd1b6e8b8bc90cf | https://github.com/libraw/libraw/commit/20d0f3fd2f690d7d97068c412f5d97cf494aa74d | A stack buffer overflow occurs in LibRaw::parseCR3 due to an off-by-one error in the line `AtomNameStack[(nesting + 1) * 4] = '\0';` when `nesting` is `31`, causing a write to `AtomNameStack[128]` while the buffer size is only 128. The function already checks for `nesting > 31` and returns an error for too deep nesting... |
arvo:42111 | n132/arvo:42111-vul | /src/pcl | [
{
"end_line": 134,
"function_name": "pcl::PLYReader::amendProperty",
"start_line": 117,
"target_file": "/src/pcl/io/src/ply_io.cpp"
}
] | UNKNOWN READ | pcl | asan | AddressSanitizer:DEADLYSIGNAL
=================================================================
==912==ERROR: AddressSanitizer: SEGV on unknown address 0xffffffffffffffd8 (pc 0x00000079bc3e bp 0x7fff165ec390 sp 0x7fff165ec280 T0)
==912==The signal is caused by a READ memory access.
SCARINESS: 20 (wild-addr-read)
#0... | cpp | 4fe0737e913421c21744213cd22f165184bfb608 | https://github.com/PointCloudLibrary/pcl/commit/7d52b107223ef8adec990608e8685392b48d79c6 | null |
arvo:42262 | n132/arvo:42262-vul | /src/c-blosc2 | [
{
"end_line": 578,
"function_name": "ndlz8_decompress",
"start_line": 429,
"target_file": "/src/c-blosc2/plugins/codecs/ndlz/ndlz8x8.c"
}
] | UNKNOWN READ | c-blosc2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1759081895
INFO: Loaded 1 modules (48559 inline 8-bit counters): 48559 [0xf2e680, 0xf3a42f),
INFO: Loaded 1 PC tables (48559 PCs): 48559 [0xc10210,0xccdd00),
/out/decompress_chunk_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=========... | c | 4460dfe69d7a947c5278a756113005cdf9c1fef9 | https://github.com/Blosc/c-blosc2/commit/d77d3ebe14d6fb7085fde26c30678a82f6fe562c | null |
arvo:42264 | n132/arvo:42264-vul | /src/elfutils | [
{
"end_line": 1017,
"function_name": "dwfl_segment_report_module",
"start_line": 291,
"target_file": "/src/elfutils/libdwfl/dwfl_segment_report_module.c"
}
] | Stack-use-after-return READ 4 | elfutils | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1314200351
INFO: Loaded 1 modules (15284 inline 8-bit counters): 15284 [0x840e8e0, 0x8412494),
INFO: Loaded 1 PC tables (15284 PCs): 15284 [0x836739c,0x838513c),
/out/fuzz-dwfl-core: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==============... | c | bc14c148a6ad9b84bda428bd3bc75028515f0151 | https://sourceware.org/git/?p=elfutils.git;a=commitdiff;h=d844d1575522b5ad9ada0aa3c26105230a1c1884 | A vulnerability exists in dwfl_segment_report_module in libdwfl where the notes filesz is not properly checked for excessive size. The reading of GElf_Nhdr does not verify for overflow at every step, and the size of the buildid bytes is not limited, potentially allowing for overflows and excessive memory usage. |
arvo:42266 | n132/arvo:42266-vul | /src/ghostpdl | [
{
"end_line": 1202,
"function_name": "search_table_1",
"start_line": 1186,
"target_file": "/src/ghostpdl/pdf/pdf_int.c"
}
] | Global-buffer-overflow READ 1 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4088426227
INFO: Loaded 3 modules (182532 inline 8-bit counters): 13708 [0x7fb9844d89e0, 0x7fb9844dbf6c), 959 [0x7fb984539a40, 0x7fb984539dff), 167865 [0x2d97d50, 0x2dc0d09),
INFO: Loaded 3 PC tables (182532 PCs): 13708 [0x7fb9844dbf70,0x7fb98451183... | cpp | 991a95ff4c4ffd6114f0ae5b9ecb7887ba775d50 | https://github.com/ArtifexSoftware/ghostpdl/commit/82b097fe8e76ea92f69ef483f45c0cf491a98d43 | null |
arvo:42285 | n132/arvo:42285-vul | /src/ghostpdl | [
{
"end_line": 1334,
"function_name": "pdfi_open_memory_stream_from_filtered_stream",
"start_line": 1237,
"target_file": "/src/ghostpdl/pdf/pdf_file.c"
}
] | UNKNOWN READ | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1960175684
INFO: Loaded 3 modules (182550 inline 8-bit counters): 13708 [0x7fb6b79a19e0, 0x7fb6b79a4f6c), 959 [0x7fb6b7a02a40, 0x7fb6b7a02dff), 167883 [0x2d98d50, 0x2dc1d1b),
INFO: Loaded 3 PC tables (182550 PCs): 13708 [0x7fb6b79a4f70,0x7fb6b79da83... | cpp | 632230836e6a5aa347c037a66f478d752b62242a | https://github.com/ArtifexSoftware/ghostpdl/commit/7fe54b1dbf221864b25ff55eccf1d624c07bb21d | null |
arvo:42298 | n132/arvo:42298-vul | /src/ghostpdl | [
{
"end_line": 1068,
"function_name": "pdfi_read_cff_dict",
"start_line": 791,
"target_file": "/src/ghostpdl/pdf/pdf_font1C.c"
}
] | Stack-buffer-overflow WRITE 4 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2725116319
INFO: Loaded 3 modules (182553 inline 8-bit counters): 13708 [0x7fe076ef29e0, 0x7fe076ef5f6c), 959 [0x7fe076f53a40, 0x7fe076f53dff), 167886 [0x2d98d50, 0x2dc1d1e),
INFO: Loaded 3 PC tables (182553 PCs): 13708 [0x7fe076ef5f70,0x7fe076f2b83... | cpp | 0d934dd30662efe03e63b5d9e9a98bb8a1834bca | https://github.com/ArtifexSoftware/ghostpdl/commit/0c4e9f7312637d512fec2b806570bfbea9da1aff | A vulnerability exists due to missing bounds checking on the CFF stack. |
arvo:42322 | n132/arvo:42322-vul | /src/ghostpdl | [
{
"end_line": 1079,
"function_name": "pdfi_read_cff_dict",
"start_line": 791,
"target_file": "/src/ghostpdl/pdf/pdf_font1C.c"
}
] | Heap-buffer-overflow READ 4 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 164407278
INFO: Loaded 3 modules (182556 inline 8-bit counters): 13708 [0x7fb6d6d3a9e0, 0x7fb6d6d3df6c), 959 [0x7fb6d6d9ba40, 0x7fb6d6d9bdff), 167889 [0x2d98d50, 0x2dc1d21),
INFO: Loaded 3 PC tables (182556 PCs): 13708 [0x7fb6d6d3df70,0x7fb6d6d73830... | cpp | 1ae55674f6d68eb6215d7d0f82610f636d81ad3d | https://github.com/ArtifexSoftware/ghostpdl/commit/436cb8a1958642e7bc0d3ca4c44288674dcd590c | A vulnerability exists in the CFF code where the number of various blue values is not validated before writing to fixed size arrays in the relevant functions and files. This can lead to potential buffer overflows. |
arvo:42324 | n132/arvo:42324-vul | /src/ghostpdl | [
{
"end_line": 1334,
"function_name": "pdfi_open_memory_stream_from_filtered_stream",
"start_line": 1237,
"target_file": "/src/ghostpdl/pdf/pdf_file.c"
}
] | Heap-use-after-free READ 8 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2201694768
INFO: Loaded 3 modules (182550 inline 8-bit counters): 13708 [0x7f7ccbd2b9e0, 0x7f7ccbd2ef6c), 959 [0x7f7ccbd8ca40, 0x7f7ccbd8cdff), 167883 [0x2d98d50, 0x2dc1d1b),
INFO: Loaded 3 PC tables (182550 PCs): 13708 [0x7f7ccbd2ef70,0x7f7ccbd6483... | cpp | 632230836e6a5aa347c037a66f478d752b62242a | https://github.com/ArtifexSoftware/ghostpdl/commit/7fe54b1dbf221864b25ff55eccf1d624c07bb21d | null |
arvo:42325 | n132/arvo:42325-vul | /src/ghostpdl | [
{
"end_line": 478,
"function_name": "pdfi_repair_file",
"start_line": 84,
"target_file": "/src/ghostpdl/pdf/pdf_repair.c"
}
] | Heap-buffer-overflow WRITE 4 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2242695114
INFO: Loaded 3 modules (182553 inline 8-bit counters): 13708 [0x7fdb359149e0, 0x7fdb35917f6c), 959 [0x7fdb35975a40, 0x7fdb35975dff), 167886 [0x2d98d50, 0x2dc1d1e),
INFO: Loaded 3 PC tables (182553 PCs): 13708 [0x7fdb35917f70,0x7fdb3594d83... | cpp | 3aaacd96f4d80213f6c1f99263c17b0f5cfe987f | https://github.com/ArtifexSoftware/ghostpdl/commit/1ae55674f6d68eb6215d7d0f82610f636d81ad3d | A broken Object stream can be 'repaired' in a way that uses object numbers outside the current size of the xref table in pdfi_repair_add_object(). This allows writing directly to the table using an out-of-bounds index, leading to memory corruption and potentially causing a segmentation fault during repair. |
arvo:42327 | n132/arvo:42327-vul | /src/ghostpdl | [
{
"end_line": 745,
"function_name": "pdfi_deref_compressed",
"start_line": 537,
"target_file": "/src/ghostpdl/pdf/pdf_deref.c"
}
] | Heap-buffer-overflow READ 8 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3312654345
INFO: Loaded 3 modules (182549 inline 8-bit counters): 13708 [0x7facb31219e0, 0x7facb3124f6c), 959 [0x7facb3182a40, 0x7facb3182dff), 167882 [0x2d98d50, 0x2dc1d1a),
INFO: Loaded 3 PC tables (182549 PCs): 13708 [0x7facb3124f70,0x7facb315a83... | cpp | 624ef6ae4bb802dff156681a1616c6a65fca39c1 | https://github.com/ArtifexSoftware/ghostpdl/commit/632230836e6a5aa347c037a66f478d752b62242a | A vulnerability exists where the xref index is not bounds-checked before being used to dereference a compressed object stream, potentially leading to out-of-bounds access. |
arvo:42329 | n132/arvo:42329-vul | /src/ghostpdl | [
{
"end_line": 3898,
"function_name": "pdfi_annot_draw",
"start_line": 3848,
"target_file": "/src/ghostpdl/pdf/pdf_annot.c"
}
] | Stack-buffer-overflow WRITE {*} | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 316755535
INFO: Loaded 3 modules (182564 inline 8-bit counters): 13708 [0x7f91a6ebd9e0, 0x7f91a6ec0f6c), 959 [0x7f91a6f1ea40, 0x7f91a6f1edff), 167897 [0x2d98d50, 0x2dc1d29),
INFO: Loaded 3 PC tables (182564 PCs): 13708 [0x7f91a6ec0f70,0x7f91a6ef6830... | cpp | 436cb8a1958642e7bc0d3ca4c44288674dcd590c | https://github.com/ArtifexSoftware/ghostpdl/commit/a7f2474c5aaac7a75a4119478c77d2cafcf45b85 | A buffer in the code for a debug message lacks bounds checking before data is copied into it, which can lead to a security vulnerability. |
arvo:42356 | n132/arvo:42356-vul | /src/ghostpdl | [
{
"end_line": 478,
"function_name": "pdfi_repair_file",
"start_line": 84,
"target_file": "/src/ghostpdl/pdf/pdf_repair.c"
}
] | Heap-buffer-overflow READ 8 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4066270495
INFO: Loaded 3 modules (182570 inline 8-bit counters): 13708 [0x7fab2b45f9e0, 0x7fab2b462f6c), 959 [0x7fab2b4c0a40, 0x7fab2b4c0dff), 167903 [0x2d98d50, 0x2dc1d2f),
INFO: Loaded 3 PC tables (182570 PCs): 13708 [0x7fab2b462f70,0x7fab2b49883... | cpp | 115663a52dcaef53c91547907f45cc4ffa385537 | https://github.com/ArtifexSoftware/ghostpdl/commit/afdf3d0446743ac64fdc438874385c01a00cae7c | null |
arvo:42479 | n132/arvo:42479-vul | /src/ghostpdl | [
{
"end_line": 228,
"function_name": "general_endcidrange_func",
"start_line": 142,
"target_file": "/src/ghostpdl/pdf/pdf_cmap.c"
}
] | Negative-size-param | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 763379186
INFO: Loaded 3 modules (182651 inline 8-bit counters): 13708 [0x7f4ebd8b99e0, 0x7f4ebd8bcf6c), 959 [0x7f4ebd91aa40, 0x7f4ebd91adff), 167984 [0x2d9ae10, 0x2dc3e40),
INFO: Loaded 3 PC tables (182651 PCs): 13708 [0x7f4ebd8bcf70,0x7f4ebd8f2830... | cpp | 82d534f8f69fd4939faf4b7f20df5cc2462973d8 | https://github.com/ArtifexSoftware/ghostpdl/commit/cb2b78cddfc67fee13b4bec3f16747f2ec611793 | A vulnerability exists in handling badly broken ToUnicode CMaps, where the code attempts to continue processing despite malformed input, resulting in negative array indices in the affected file. |
arvo:42485 | n132/arvo:42485-vul | /src/ghostpdl | [
{
"end_line": 717,
"function_name": "pdfi_fapi_get_gsubr",
"start_line": 679,
"target_file": "/src/ghostpdl/pdf/pdf_fapi.c"
}
] | UNKNOWN | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 964085270
INFO: Loaded 3 modules (182649 inline 8-bit counters): 13708 [0x7fbf7d8149e0, 0x7fbf7d817f6c), 959 [0x7fbf7d875a40, 0x7fbf7d875dff), 167982 [0x2d9ae10, 0x2dc3e3e),
INFO: Loaded 3 PC tables (182649 PCs): 13708 [0x7fbf7d817f70,0x7fbf7d84d830... | cpp | 8f86c5f3d7a46206d8eb9501912d212e594d2e0f | https://github.com/ArtifexSoftware/ghostpdl/commit/82d534f8f69fd4939faf4b7f20df5cc2462973d8 | null |
arvo:42537 | n132/arvo:42537-vul | /src/c-blosc2 | [
{
"end_line": 578,
"function_name": "ndlz8_decompress",
"start_line": 429,
"target_file": "/src/c-blosc2/plugins/codecs/ndlz/ndlz8x8.c"
}
] | Heap-buffer-overflow WRITE {*} | c-blosc2 | asan | =================================================================
==7157==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x617000000300 at pc 0x0000004984dc bp 0x7ffdbcb53cd0 sp 0x7ffdbcb53498
WRITE of size 67108864 at 0x617000000300 thread T0
SCARINESS: 45 (multi-byte-write-heap-buffer-overflow)
#0 0x498... | c | 4460dfe69d7a947c5278a756113005cdf9c1fef9 | https://github.com/Blosc/c-blosc2/commit/d77d3ebe14d6fb7085fde26c30678a82f6fe562c | null |
arvo:42562 | n132/arvo:42562-vul | /src/c-blosc2 | [
{
"end_line": 701,
"function_name": "ndlz4_decompress",
"start_line": 512,
"target_file": "/src/c-blosc2/plugins/codecs/ndlz/ndlz4x4.c"
}
] | Heap-buffer-overflow READ 1 | c-blosc2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3866793744
INFO: Loaded 1 modules (48555 inline 8-bit counters): 48555 [0xf2e680, 0xf3a42b),
INFO: Loaded 1 PC tables (48555 PCs): 48555 [0xc10110,0xccdbc0),
/out/decompress_chunk_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=========... | c | 79b6995ab82e09ccd1bd50f50e6af1ef40280c4c | https://github.com/Blosc/c-blosc2/commit/ce2e8fe5f2fdb3779505935f05f93481d4905e62 | null |
arvo:42613 | n132/arvo:42613-vul | /src/ghostpdl | [
{
"end_line": 879,
"function_name": "ps_font_def_func",
"start_line": 402,
"target_file": "/src/ghostpdl/pdf/pdf_fontps.c"
}
] | Global-buffer-overflow READ {*} | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2107759574
INFO: Loaded 3 modules (182770 inline 8-bit counters): 13708 [0x7fed5ec4d9e0, 0x7fed5ec50f6c), 959 [0x7fed5ecaea40, 0x7fed5ecaedff), 168103 [0x2d9ce30, 0x2dc5ed7),
INFO: Loaded 3 PC tables (182770 PCs): 13708 [0x7fed5ec50f70,0x7fed5ec8683... | cpp | 3f5a2b75b2914b41ee600ab6226f1b4061bf267e | https://github.com/ArtifexSoftware/ghostpdl/commit/74da5c5f368ea314867b26abfe96b31e6d8e4e8f | A vulnerability exists where buffer overruns can occur when checking Type 1 font keys. |
arvo:42616 | n132/arvo:42616-vul | /src/ghostpdl | [
{
"end_line": 773,
"function_name": "pdfi_deref_compressed",
"start_line": 548,
"target_file": "/src/ghostpdl/pdf/pdf_deref.c"
}
] | UNKNOWN READ | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1225916752
INFO: Loaded 3 modules (182702 inline 8-bit counters): 13708 [0x7f4cf6a479e0, 0x7f4cf6a4af6c), 959 [0x7f4cf6aa8a40, 0x7f4cf6aa8dff), 168035 [0x2d9be30, 0x2dc4e93),
INFO: Loaded 3 PC tables (182702 PCs): 13708 [0x7f4cf6a4af70,0x7f4cf6a8083... | cpp | f63c8d854ea500a26c2514ee1f10a472a6459802 | https://github.com/ArtifexSoftware/ghostpdl/commit/f6506e9d48c7abf82f711df87383af90b9797969 | An off-by-one error exists in the check on the xref limit, as the size of the xref includes object 0. The stream object number is not properly checked against the size of the xref minus 1. |
arvo:42633 | n132/arvo:42633-vul | /src/ghostpdl | [
{
"end_line": 131,
"function_name": "cmap_endcodespacerange_func",
"start_line": 95,
"target_file": "/src/ghostpdl/pdf/pdf_cmap.c"
}
] | Segv on unknown address | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1184979583
INFO: Loaded 3 modules (182798 inline 8-bit counters): 13708 [0x7fb4522a39e0, 0x7fb4522a6f6c), 959 [0x7fb452304a40, 0x7fb452304dff), 168131 [0x2d9ce30, 0x2dc5ef3),
INFO: Loaded 3 PC tables (182798 PCs): 13708 [0x7fb4522a6f70,0x7fb4522dc83... | cpp | 74da5c5f368ea314867b26abfe96b31e6d8e4e8f | https://github.com/ArtifexSoftware/ghostpdl/commit/47e220942dfc68de777b91db1c2b3e81d0275e1b | A vulnerability exists due to a missing bounds check against a hardcoded CMap value size, which can lead to out-of-bounds access. |
arvo:42656 | n132/arvo:42656-vul | /src/ghostpdl | [
{
"end_line": 1081,
"function_name": "pdfi_read_cff_dict",
"start_line": 791,
"target_file": "/src/ghostpdl/pdf/pdf_font1C.c"
}
] | Memcpy-param-overlap | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3212098265
INFO: Loaded 3 modules (182802 inline 8-bit counters): 13708 [0x7f08f44e89e0, 0x7f08f44ebf6c), 959 [0x7f08f4549a40, 0x7f08f4549dff), 168135 [0x2d9ce30, 0x2dc5ef7),
INFO: Loaded 3 PC tables (182802 PCs): 13708 [0x7f08f44ebf70,0x7f08f452183... | cpp | 47e220942dfc68de777b91db1c2b3e81d0275e1b | https://github.com/ArtifexSoftware/ghostpdl/commit/0f8c0b5742577e31e419e84fbf0bcd42db0c5f41 | null |
arvo:42687 | n132/arvo:42687-vul | /src/ghostpdl | [
{
"end_line": 1139,
"function_name": "pdfi_read_token",
"start_line": 1000,
"target_file": "/src/ghostpdl/pdf/pdf_int.c"
}
] | UNKNOWN READ | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4018172000
INFO: Loaded 3 modules (182702 inline 8-bit counters): 13708 [0x7f94407679e0, 0x7f944076af6c), 959 [0x7f94407c8a40, 0x7f94407c8dff), 168035 [0x2d9be30, 0x2dc4e93),
INFO: Loaded 3 PC tables (182702 PCs): 13708 [0x7f944076af70,0x7f94407a083... | cpp | f6506e9d48c7abf82f711df87383af90b9797969 | https://github.com/ArtifexSoftware/ghostpdl/commit/3ce8214d8fc77be42eb6ad618c972113d4cb0d24 | A vulnerability exists in the array read logic where, upon encountering a ']' without a corresponding initial mark ('['), the code attempts to construct an array from objects on the stack. If this fails, the stack is cleared and recovery is attempted, which discards objects expected by higher level code. This can lead ... |
arvo:42729 | n132/arvo:42729-vul | /src/selinux | [
{
"end_line": 968,
"function_name": "mls_semantic_level_expand",
"start_line": 916,
"target_file": "/src/selinux/libsepol/src/expand.c"
}
] | UNKNOWN READ | selinux | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 550700852
INFO: Loaded 1 modules (10453 inline 8-bit counters): 10453 [0x6b94a0, 0x6bbd75),
INFO: Loaded 1 PC tables (10453 PCs): 10453 [0x6bbd78,0x6e4ac8),
/out/binpolicy-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:... | c | b2ba721ebba087123f5a527361e9796b6880ab85 | https://github.com/SELinuxProject/selinux/commit/b78560fd372e01c11ca4f183f929d99b1f89f314 | null |
arvo:42736 | n132/arvo:42736-vul | /src/ghostpdl | [
{
"end_line": 668,
"function_name": "pdf_cmap_open_file",
"start_line": 639,
"target_file": "/src/ghostpdl/pdf/pdf_cmap.c"
}
] | Stack-buffer-overflow WRITE {*} | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3385388961
INFO: Loaded 3 modules (182726 inline 8-bit counters): 13708 [0x7f8f8dbf49e0, 0x7f8f8dbf7f6c), 959 [0x7f8f8dc55a40, 0x7f8f8dc55dff), 168059 [0x2d9be70, 0x2dc4eeb),
INFO: Loaded 3 PC tables (182726 PCs): 13708 [0x7f8f8dbf7f70,0x7f8f8dc2d83... | cpp | 2b8c6f669e9525fdc25aadffefdc5f8b978fb0e0 | https://github.com/ArtifexSoftware/ghostpdl/commit/7f5d467726db47da4102a6d6f1d49e63d3c0b77f | A vulnerability exists where the code does not error if a CMap name exceeds the maximum file name length in the relevant file. |
arvo:42741 | n132/arvo:42741-vul | /src/selinux | [
{
"end_line": 968,
"function_name": "mls_semantic_level_expand",
"start_line": 916,
"target_file": "/src/selinux/libsepol/src/expand.c"
}
] | Segv on unknown address | selinux | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1576441869
INFO: Loaded 1 modules (10453 inline 8-bit counters): 10453 [0x6b94a0, 0x6bbd75),
INFO: Loaded 1 PC tables (10453 PCs): 10453 [0x6bbd78,0x6e4ac8),
/out/binpolicy-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer... | c | b2ba721ebba087123f5a527361e9796b6880ab85 | https://github.com/SELinuxProject/selinux/commit/b78560fd372e01c11ca4f183f929d99b1f89f314 | null |
arvo:42783 | n132/arvo:42783-vul | /src/ghostpdl | [
{
"end_line": 1459,
"function_name": "pdfi_annot_draw_LE_one",
"start_line": 1426,
"target_file": "/src/ghostpdl/pdf/pdf_annot.c"
}
] | Stack-buffer-overflow WRITE {*} | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1545580027
INFO: Loaded 3 modules (182709 inline 8-bit counters): 13708 [0x7f053a4189e0, 0x7f053a41bf6c), 959 [0x7f053a479a40, 0x7f053a479dff), 168042 [0x2d9be70, 0x2dc4eda),
INFO: Loaded 3 PC tables (182709 PCs): 13708 [0x7f053a41bf70,0x7f053a45183... | cpp | 66d5a16fb83bbddf63b11124b7c8e75946b8d84c | https://github.com/ArtifexSoftware/ghostpdl/commit/efd5f9a71af7bd5ab3816ba49edc8c3f7c370bae | null |
arvo:42894 | n132/arvo:42894-vul | /src/php-src | [
{
"end_line": 1439,
"function_name": "_zend_hash_del_el",
"start_line": 1417,
"target_file": "/src/php-src/Zend/zend_hash.c"
}
] | Heap-use-after-free READ 4 | php-src | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3506202830
INFO: Loaded 2 modules (171598 inline 8-bit counters): 142702 [0x98bd2a0, 0x98e000e), 28896 [0xf47b4200, 0xf47bb2e0),
INFO: Loaded 2 PC tables (171598 PCs): 142702 [0x98e0010,0x99f6b80), 28896 [0xf47bb2e0,0xf47f39e0),
/out/php-fuzz-traci... | c | 8b235380347d6dbdfeabf96bbb5f05f446cd5954 | https://github.com/php/php-src/commit/eee3b1d917591e5106aef9fd4fe93393e95fc13d | A vulnerability exists where Bucket->key is not removed before the destructor call, which may result in the destructor updating the same HashTable. |
arvo:42908 | n132/arvo:42908-vul | /src/ghostpdl | [
{
"end_line": 318,
"function_name": "pdfi_oc_is_ocg_visible",
"start_line": 284,
"target_file": "/src/ghostpdl/pdf/pdf_optcontent.c"
}
] | Stack-buffer-overflow WRITE {*} | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2794310407
INFO: Loaded 3 modules (182720 inline 8-bit counters): 13708 [0x7ff662cf49e0, 0x7ff662cf7f6c), 959 [0x7ff662d55a40, 0x7ff662d55dff), 168053 [0x2d9be50, 0x2dc4ec5),
INFO: Loaded 3 PC tables (182720 PCs): 13708 [0x7ff662cf7f70,0x7ff662d2d83... | cpp | 4685df2e428b3a13273fb37b4e71a9177bc5a827 | https://github.com/ArtifexSoftware/ghostpdl/commit/fabad29820734af831cf4f2ae6c4beb4179d4733 | null |
arvo:42917 | n132/arvo:42917-vul | /src/ghostpdl | [
{
"end_line": 233,
"function_name": "general_endcidrange_func",
"start_line": 146,
"target_file": "/src/ghostpdl/pdf/pdf_cmap.c"
}
] | UNKNOWN READ | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2212546870
INFO: Loaded 3 modules (182806 inline 8-bit counters): 13708 [0x7f2e42bc99e0, 0x7f2e42bccf6c), 959 [0x7f2e42c2aa40, 0x7f2e42c2adff), 168139 [0x2d9ce30, 0x2dc5efb),
INFO: Loaded 3 PC tables (182806 PCs): 13708 [0x7f2e42bccf70,0x7f2e42c0283... | cpp | 0f8c0b5742577e31e419e84fbf0bcd42db0c5f41 | https://github.com/ArtifexSoftware/ghostpdl/commit/2c954310adc5753565a30dfe1b080f6a97ed4b4c | A missing bounds check against the hard coded size limit on CMap value sizes in the code allows for potential out-of-bounds access. One size limit is already checked, but the other is not, leading to a security vulnerability. |
arvo:4296 | n132/arvo:4296-vul | /src/open62541 | [
{
"end_line": 963,
"function_name": "ExtensionObject_decodeBinaryContent",
"start_line": 938,
"target_file": "/src/open62541/src/ua_types_encoding_binary.c"
}
] | Heap-double-free | open62541 | asan | INFO: Seed: 525853605
INFO: Loaded 1 modules (4798 inline 8-bit counters): 4798 [0xa08668, 0xa09926),
INFO: Loaded 1 PC tables (4798 PCs): 4798 [0xa09928,0xa1c508),
/out/fuzz_binary_decode: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==1023==E... | cpp | 23131fe8aec1143aceb587386f8d01b656d2a905 | https://github.com/open62541/open62541/commit/9165b056a95f3ff5db23dbf9628acb1efee6f86b | null |
arvo:42980 | n132/arvo:42980-vul | /src/ghostpdl | [
{
"end_line": 807,
"function_name": "read_xref_section",
"start_line": 660,
"target_file": "/src/ghostpdl/pdf/pdf_xref.c"
}
] | UNKNOWN READ | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3706346238
INFO: Loaded 3 modules (182723 inline 8-bit counters): 13708 [0x7fa861cbd9e0, 0x7fa861cc0f6c), 959 [0x7fa861d1ea40, 0x7fa861d1edff), 168056 [0x2d9be50, 0x2dc4ec8),
INFO: Loaded 3 PC tables (182723 PCs): 13708 [0x7fa861cc0f70,0x7fa861cf683... | cpp | fabad29820734af831cf4f2ae6c4beb4179d4733 | https://github.com/ArtifexSoftware/ghostpdl/commit/b0855fa22cd6ba447482ee2ae1c5e091428c4bc0 | null |
arvo:42998 | n132/arvo:42998-vul | /src/ghostpdl | [
{
"end_line": 1167,
"function_name": "pdfi_Tj",
"start_line": 1066,
"target_file": "/src/ghostpdl/pdf/pdf_text.c"
}
] | UNKNOWN READ | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3065195221
INFO: Loaded 3 modules (182862 inline 8-bit counters): 13708 [0x7ff44994e9e0, 0x7ff449951f6c), 959 [0x7ff4499afa40, 0x7ff4499afdff), 168195 [0x2d9ee30, 0x2dc7f33),
INFO: Loaded 3 PC tables (182862 PCs): 13708 [0x7ff449951f70,0x7ff44998783... | cpp | b98c81c443fc9ea7c6351eff306da74765d2581e | https://github.com/ArtifexSoftware/ghostpdl/commit/4affbf8fe0e5982058c498a33689cc5182eab0ed | The vulnerability occurs in the text drawing operation, where the code relies on the operand stack reference for the string operand to remain valid throughout the operation. If a pdfi error occurs during text drawing, it can cause the entire stack to be cleared, resulting in the string object becoming invalid while sti... |
arvo:4300 | n132/arvo:4300-vul | /src/open62541 | [
{
"end_line": 963,
"function_name": "ExtensionObject_decodeBinaryContent",
"start_line": 938,
"target_file": "/src/open62541/src/ua_types_encoding_binary.c"
}
] | Heap-use-after-free READ {*} | open62541 | asan | INFO: Seed: 1839632438
INFO: Loaded 1 modules (4798 inline 8-bit counters): 4798 [0xa08668, 0xa09926),
INFO: Loaded 1 PC tables (4798 PCs): 4798 [0xa09928,0xa1c508),
/out/fuzz_binary_decode: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==1024==... | cpp | 23131fe8aec1143aceb587386f8d01b656d2a905 | https://github.com/open62541/open62541/commit/9165b056a95f3ff5db23dbf9628acb1efee6f86b | null |
arvo:43004 | n132/arvo:43004-vul | /src/ghostpdl | [
{
"end_line": 2040,
"function_name": "pdfi_create_DeviceN",
"start_line": 1680,
"target_file": "/src/ghostpdl/pdf/pdf_colour.c"
}
] | UNKNOWN READ | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3760540884
INFO: Loaded 3 modules (182787 inline 8-bit counters): 13708 [0x7f59570d19e0, 0x7f59570d4f6c), 959 [0x7f5957132a40, 0x7f5957132dff), 168120 [0x2d9ce50, 0x2dc5f08),
INFO: Loaded 3 PC tables (182787 PCs): 13708 [0x7f59570d4f70,0x7f595710a83... | cpp | f046d29e51de5b185d054e3c88b5fa337a0e6ea2 | https://github.com/ArtifexSoftware/ghostpdl/commit/20face1eeb418935307731d4e2e4bada028c7ba7 | A countdown error occurs where, on error, an object is counted down, and later counted down again, eventually leading to an attempt to use a stale cache entry and causing a segmentation fault. |
arvo:43012 | n132/arvo:43012-vul | /src/ghostpdl | [
{
"end_line": 338,
"function_name": "pdfi_trans_set_mask",
"start_line": 82,
"target_file": "/src/ghostpdl/pdf/pdf_trans.c"
}
] | Stack-buffer-overflow WRITE 4 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3694844542
INFO: Loaded 3 modules (182736 inline 8-bit counters): 13708 [0x7f91a0cf69e0, 0x7f91a0cf9f6c), 959 [0x7f91a0d57a40, 0x7f91a0d57dff), 168069 [0x2d9be50, 0x2dc4ed5),
INFO: Loaded 3 PC tables (182736 PCs): 13708 [0x7f91a0cf9f70,0x7f91a0d2f83... | cpp | d066f5000d9a959708838c0ee471ffeb84d00bfc | https://github.com/ArtifexSoftware/ghostpdl/commit/321a00bd85a497c0b2424b906eb9e9d309e31321 | A vulnerability exists in gs_begin_transparency_mask() where any supplied transfer function is used without validating that it is a 1-in, 1-out function. The code assumes a single output and only supplies a single float for the output value, but does not check if the transfer function actually has a single output befor... |
arvo:43045 | n132/arvo:43045-vul | /src/ghostpdl | [
{
"end_line": 807,
"function_name": "read_xref_section",
"start_line": 660,
"target_file": "/src/ghostpdl/pdf/pdf_xref.c"
}
] | Heap-buffer-overflow READ 8 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 737349824
INFO: Loaded 3 modules (182723 inline 8-bit counters): 13708 [0x7f4288a059e0, 0x7f4288a08f6c), 959 [0x7f4288a66a40, 0x7f4288a66dff), 168056 [0x2d9be50, 0x2dc4ec8),
INFO: Loaded 3 PC tables (182723 PCs): 13708 [0x7f4288a08f70,0x7f4288a3e830... | cpp | fabad29820734af831cf4f2ae6c4beb4179d4733 | https://github.com/ArtifexSoftware/ghostpdl/commit/b0855fa22cd6ba447482ee2ae1c5e091428c4bc0 | null |
arvo:43156 | n132/arvo:43156-vul | /src/ghostpdl | [
{
"end_line": 230,
"function_name": "general_endcidrange_func",
"start_line": 143,
"target_file": "/src/ghostpdl/pdf/pdf_cmap.c"
}
] | Negative-size-param | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2488905627
INFO: Loaded 3 modules (182793 inline 8-bit counters): 13708 [0x7f853c0169e0, 0x7f853c019f6c), 959 [0x7f853c077a40, 0x7f853c077dff), 168126 [0x2d9cf10, 0x2dc5fce),
INFO: Loaded 3 PC tables (182793 PCs): 13708 [0x7f853c019f70,0x7f853c04f83... | cpp | 8bd3f7dba33341b622b60e13446a9cc101447e76 | https://github.com/ArtifexSoftware/ghostpdl/commit/f7dc952613f4e614fae5fe859a5b6a90e3e17bf7 | The graphics library uses a hard coded limit for the size of the prefix and key values in CMap. There is a vulnerability where prefix and key values are not checked to ensure they fit within these limits before writing, which can lead to buffer overflows. |
arvo:43209 | n132/arvo:43209-vul | /src/selinux | [
{
"end_line": 792,
"function_name": "cil_resolve_classcommon",
"start_line": 745,
"target_file": "/src/selinux/libsepol/cil/src/cil_resolve_ast.c"
}
] | Heap-use-after-free READ 8 | selinux | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/secilc-fuzzer
=================================================================
==557==ERROR: AddressSanitizer: heap-use-after-free on address 0x6070000000b0 at pc 0x0000005b5d4e bp 0x7ffcbdb6a840 sp 0x7ffcbdb6a838
READ of size 8 at 0x60700... | c | f0823bbbb58c5d5cd82a05b3c76106762a518bfa | https://github.com/SELinuxProject/selinux/commit/86cdb9f11915187cedee327cb833421374e500d1 | A vulnerability exists in libsepol/cil where the class in a classcommon is not properly ensured to be a kernel class. Map classes use the same struct as kernel classes, but only kernel classes use the pointer to a common class. When resolving a classcommon, the code does not verify that the found class is a kernel clas... |
arvo:4322 | n132/arvo:4322-vul | /src/librawspeed | [
{
"end_line": 49,
"function_name": "SonyArw2Decompressor::SonyArw2Decompressor",
"start_line": 34,
"target_file": "/src/librawspeed/src/librawspeed/decompressors/SonyArw2Decompressor.cpp"
}
] | Use-of-uninitialized-value | librawspeed | msan | INFO: Seed: 246111057
INFO: Loaded 1 modules (1042 inline 8-bit counters): 1042 [0x9eeae0, 0x9eeef2),
INFO: Loaded 1 PC tables (1042 PCs): 1042 [0x9eeef8,0x9f3018),
/out/SonyArw2DecompressorFuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 ... | cpp | 06e81c409f091e17e290635fe41c909952f798bc | https://github.com/darktable-org/rawspeed/commit/e1b849034261580c2e4e8598408fc6fba8eec91f | The SonyArw2Decompressor does not ensure that the width is a multiple of 32. |
arvo:43255 | n132/arvo:43255-vul | /src/ghostpdl | [
{
"end_line": 1187,
"function_name": "pdf_ps_put_oper_func",
"start_line": 1166,
"target_file": "/src/ghostpdl/pdf/pdf_fontps.c"
}
] | UNKNOWN READ | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3489962186
INFO: Loaded 3 modules (182792 inline 8-bit counters): 13708 [0x7f2ab8e4e9e0, 0x7f2ab8e51f6c), 959 [0x7f2ab8eafa40, 0x7f2ab8eafdff), 168125 [0x2d9cf10, 0x2dc5fcd),
INFO: Loaded 3 PC tables (182792 PCs): 13708 [0x7f2ab8e51f70,0x7f2ab8e8783... | cpp | 3d7bcf6084105e5f577a760bc84675cc62617eb5 | https://github.com/ArtifexSoftware/ghostpdl/commit/8bd3f7dba33341b622b60e13446a9cc101447e76 | A vulnerability exists in Type 1 font handling where the code does not ensure that the index is greater than or equal to 0 before writing to the Encoding array, potentially leading to out-of-bounds writes. |
arvo:43268 | n132/arvo:43268-vul | /src/ghostpdl | [
{
"end_line": 964,
"function_name": "pdfi_dereference",
"start_line": 801,
"target_file": "/src/ghostpdl/pdf/pdf_deref.c"
}
] | Heap-use-after-free READ 4 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3684875037
INFO: Loaded 3 modules (182770 inline 8-bit counters): 13708 [0x7f9404e4e9e0, 0x7f9404e51f6c), 959 [0x7f9404eafa40, 0x7f9404eafdff), 168103 [0x2d9de30, 0x2dc6ed7),
INFO: Loaded 3 PC tables (182770 PCs): 13708 [0x7f9404e51f70,0x7f9404e8783... | cpp | 53a5c7795c5d4b641dd8412d0087a8c4442498ab | https://github.com/ArtifexSoftware/ghostpdl/commit/3f5a2b75b2914b41ee600ab6226f1b4061bf267e | A broken PDF file causes a repair to occur while reading an object and dereferencing an indirect reference. The repair process discards and rebuilds the xref table, which invalidates the reference to the xref entry. This results in the reference becoming outdated after reading an object. |
arvo:43365 | n132/arvo:43365-vul | /src/zstd | [
{
"end_line": 289,
"function_name": "ZSTD_litLengthPrice",
"start_line": 270,
"target_file": "/src/zstd/lib/compress/zstd_opt.c"
}
] | Global-buffer-overflow READ 1 | zstd | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/simple_compress
=================================================================
==755==ERROR: AddressSanitizer: global-buffer-overflow on address 0x0000008f5224 at pc 0x000000704439 bp 0x7ffcc8320510 sp 0x7ffcc8320508
READ of size 1 at 0x... | c | 844c53ed75e199b969633dacb4ef455dedf6eaef | https://github.com/facebook/zstd/commit/0677b26b6d15f35f027eaabf11cfaa0af541f8c8 | A security vulnerability exists in the optimal parser in the opt module, where improper handling of input can lead to unexpected behavior. |
arvo:43370 | n132/arvo:43370-vul | /src/wolfmqtt | [
{
"end_line": 1175,
"function_name": "MqttClient_WaitType",
"start_line": 796,
"target_file": "/src/wolfmqtt/src/mqtt_client.c"
}
] | UNKNOWN READ | wolfmqtt | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3542111150
INFO: Loaded 1 modules (21655 inline 8-bit counters): 21655 [0x7f2830, 0x7f7cc7),
INFO: Loaded 1 PC tables (21655 PCs): 21655 [0x731508,0x785e78),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:... | cpp | d937a81af6f94e8a0918222b267b462eed218a9a | https://github.com/wolfSSL/wolfMQTT/commit/17eb652346678bd189742d7e45c946cae649d859 | null |
arvo:43372 | n132/arvo:43372-vul | /src/binutils-gdb | [
{
"end_line": 13295,
"function_name": "OP_VEX",
"start_line": 13147,
"target_file": "/src/binutils-gdb/opcodes/i386-dis.c"
}
] | Use-of-uninitialized-value | binutils-gdb | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1819473320
INFO: Loaded 1 modules (223481 inline 8-bit counters): 223481 [0x35083b8, 0x353ecb1),
INFO: Loaded 1 PC tables (223481 PCs): 223481 [0x2eb8788,0x3221718),
/out/fuzz_disas_ext-bfd_arch_i386: Running 1 inputs 1 time(s) each.
Running: /tmp/... | c | 0b35f123c200522998a81335dc218551ca7b3d92 | https://github.com/bminor/binutils-gdb/commit/ce20459e162175710d8ef56118fc34edabfdce5e | A vulnerability exists in i386-dis.c where SIB (Scale-Index-Base) information is used without verifying its presence. The struct instr_info lacks a has_sib field, leading to potential misuse of SIB data. Functions such as get_sib, OP_E_memory, and OP_VEX access or rely on SIB information without checking if it is valid... |
arvo:43414 | n132/arvo:43414-vul | /src/assimp | [
{
"end_line": 142,
"function_name": "IOSystem2Unzip::opendisk",
"start_line": 122,
"target_file": "/src/assimp/code/Common/ZipArchiveIOSystem.cpp"
}
] | Heap-buffer-overflow READ 1 | assimp | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 364236641
INFO: Loaded 1 modules (209214 inline 8-bit counters): 209214 [0x1cdc590, 0x1d0f6ce),
INFO: Loaded 1 PC tables (209214 PCs): 209214 [0x1d0f6d0,0x2040ab0),
/out/assimp_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Info, T0: L... | cpp | 1bf5dd2731718e7243c42e6c0dfb175c3f1d0e57 | https://github.com/assimp/assimp/commit/c14eccefaf0ba0286d2e9f3ae7b8dd1f3e055a27 | A bug exists where the condition 'i >= 0' is always true if 'disk_filename' does not contain a dot (.), causing 'i' to overflow. This affects the for loop's intended operation. |
arvo:4345 | n132/arvo:4345-vul | /src/open62541 | [
{
"end_line": 963,
"function_name": "ExtensionObject_decodeBinaryContent",
"start_line": 938,
"target_file": "/src/open62541/src/ua_types_encoding_binary.c"
}
] | Heap-double-free | open62541 | asan | INFO: Seed: 678907315
INFO: Loaded 1 modules (4791 inline 8-bit counters): 4791 [0xa07668, 0xa0891f),
INFO: Loaded 1 PC tables (4791 PCs): 4791 [0xa08920,0xa1b490),
/out/fuzz_binary_message: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==1024==... | cpp | 23131fe8aec1143aceb587386f8d01b656d2a905 | https://github.com/open62541/open62541/commit/9165b056a95f3ff5db23dbf9628acb1efee6f86b | null |
arvo:4346 | n132/arvo:4346-vul | /src/open62541 | [
{
"end_line": 963,
"function_name": "ExtensionObject_decodeBinaryContent",
"start_line": 938,
"target_file": "/src/open62541/src/ua_types_encoding_binary.c"
}
] | Heap-use-after-free READ 2 | open62541 | asan | INFO: Seed: 436245016
INFO: Loaded 1 modules (4798 inline 8-bit counters): 4798 [0xa08668, 0xa09926),
INFO: Loaded 1 PC tables (4798 PCs): 4798 [0xa09928,0xa1c508),
/out/fuzz_binary_decode: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==1024==E... | cpp | 23131fe8aec1143aceb587386f8d01b656d2a905 | https://github.com/open62541/open62541/commit/9165b056a95f3ff5db23dbf9628acb1efee6f86b | null |
arvo:43461 | n132/arvo:43461-vul | /src/c-blosc2 | [
{
"end_line": 701,
"function_name": "ndlz4_decompress",
"start_line": 512,
"target_file": "/src/c-blosc2/plugins/codecs/ndlz/ndlz4x4.c"
}
] | UNKNOWN WRITE | c-blosc2 | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1445881294
INFO: Loaded 1 modules (47541 inline 8-bit counters): 47541 [0x11d893c, 0x11e42f1),
INFO: Loaded 1 PC tables (47541 PCs): 47541 [0xebd6d8,0xf77228),
/out/decompress_chunk_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemoryS... | c | 4460dfe69d7a947c5278a756113005cdf9c1fef9 | https://github.com/Blosc/c-blosc2/commit/d77d3ebe14d6fb7085fde26c30678a82f6fe562c | null |
arvo:43519 | n132/arvo:43519-vul | /src/c-blosc2 | [
{
"end_line": 578,
"function_name": "ndlz8_decompress",
"start_line": 429,
"target_file": "/src/c-blosc2/plugins/codecs/ndlz/ndlz8x8.c"
}
] | Heap-buffer-overflow READ 8 | c-blosc2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 842235564
INFO: Loaded 1 modules (48555 inline 8-bit counters): 48555 [0xf2e680, 0xf3a42b),
INFO: Loaded 1 PC tables (48555 PCs): 48555 [0xc10110,0xccdbc0),
/out/decompress_chunk_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==========... | c | 79b6995ab82e09ccd1bd50f50e6af1ef40280c4c | https://github.com/Blosc/c-blosc2/commit/ce2e8fe5f2fdb3779505935f05f93481d4905e62 | null |
arvo:43599 | n132/arvo:43599-vul | /src/ghostpdl | [
{
"end_line": 1100,
"function_name": "pdfi_read_cff_dict",
"start_line": 791,
"target_file": "/src/ghostpdl/pdf/pdf_font1C.c"
}
] | UNKNOWN READ | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 826942434
INFO: Loaded 3 modules (182934 inline 8-bit counters): 13708 [0x7f45eb2a69e0, 0x7f45eb2a9f6c), 959 [0x7f45eb307a40, 0x7f45eb307dff), 168267 [0x2da2170, 0x2dcb2bb),
INFO: Loaded 3 PC tables (182934 PCs): 13708 [0x7f45eb2a9f70,0x7f45eb2df830... | cpp | 7a92e712874a44fe77bfe220ea695391661a4988 | https://github.com/ArtifexSoftware/ghostpdl/commit/3536cb075b8d7a3cd2bbe62e8ef879f56be60700 | A vulnerability exists in the CFF dictionary code where file offsets are not validated for negative values. The code checks for values that are too large but fails to check for negative offset values. |
arvo:43680 | n132/arvo:43680-vul | /src/ghostpdl | [
{
"end_line": 215,
"function_name": "pdf_ps_stack_push",
"start_line": 176,
"target_file": "/src/ghostpdl/pdf/pdf_fontps.h"
}
] | UNKNOWN READ | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3620528580
INFO: Loaded 3 modules (182961 inline 8-bit counters): 13708 [0x7f5127ea69e0, 0x7f5127ea9f6c), 959 [0x7f5127f07a40, 0x7f5127f07dff), 168294 [0x2da2170, 0x2dcb2d6),
INFO: Loaded 3 PC tables (182961 PCs): 13708 [0x7f5127ea9f70,0x7f5127edf83... | cpp | dc6a54dd6a94ce208cda076fab3fd99c898bbe3a | https://github.com/ArtifexSoftware/ghostpdl/commit/e5187d467a4560cbd0b74a682fc3e71cb64edcc0 | The minimal PS-like interpreter in pdfi allows the operand stack to be extended, but the code misses handling of memory allocation failure for the extended stack, leading to a potential vulnerability when an out-of-memory error occurs during stack extension. |
arvo:43722 | n132/arvo:43722-vul | /src/imagemagick | [
{
"end_line": 1596,
"function_name": "GetConstantColour",
"start_line": 1520,
"target_file": "/src/imagemagick/MagickCore/fx.c"
}
] | Heap-buffer-overflow READ 1 | imagemagick | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2948215354
INFO: Loaded 1 modules (227920 inline 8-bit counters): 227920 [0x1f4dd90, 0x1f857e0),
INFO: Loaded 1 PC tables (227920 PCs): 227920 [0x1f857e0,0x22ffce0),
/out/encoder_label_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
====... | cpp | 0a0e0e44bd7e43c767ef594b9059a8c09c8a4943 | https://github.com/imagemagick/imagemagick/commit/def69fd7bee47398269378be88d16e8be4328c7a | null |
arvo:43841 | n132/arvo:43841-vul | /src/leptonica | [
{
"end_line": 137,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 3,
"target_file": "/src/leptonica/prog/fuzzing/pix3_fuzzer.cc"
}
] | Stack-buffer-overflow READ 4 | leptonica | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1248412791
INFO: Loaded 1 modules (116784 inline 8-bit counters): 116784 [0x16365b0, 0x1652de0),
INFO: Loaded 1 PC tables (116784 PCs): 116784 [0x1652de0,0x181b0e0),
/out/pix3_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=============... | cpp | a8f9da31004d98e1267860edfda1cb8c9f8b29e9 | https://github.com/DanBloomberg/leptonica/commit/748723a795e48ce0ec0ce2fa78082ef0c62aac9c | null |
arvo:43847 | n132/arvo:43847-vul | /src/PcapPlusPlus | [
{
"end_line": 149,
"function_name": "IDnsResource::decodeName",
"start_line": 34,
"target_file": "/src/PcapPlusPlus/Packet++/src/DnsResource.cpp"
}
] | Stack-buffer-overflow WRITE 1 | PcapPlusPlus | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2572195643
INFO: Loaded 1 modules (33189 inline 8-bit counters): 33189 [0x9b3c38, 0x9bbddd),
INFO: Loaded 1 PC tables (33189 PCs): 33189 [0x9bbde0,0xa3d830),
/out/FuzzTarget: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
======================... | cpp | 847ba68f02c2c5e7af43f39c1b5b81fa7e0c0374 | https://github.com/seladb/PcapPlusPlus/commit/2295654a792beed3d2b2e81d346271089fa1cd02 | A stack-buffer-overflow WRITE vulnerability exists in pcpp::IDnsResource::decodeName, where if the decoded name exactly fits the 256 character buffer and the last character ([255]) is '.', the resultPtr points just past the buffer, causing resultPtr[0] = 0; to perform an off-by-one write beyond the buffer boundary. |
arvo:43895 | n132/arvo:43895-vul | /src/imagemagick | [
{
"end_line": 2277,
"function_name": "GetOperand",
"start_line": 1984,
"target_file": "/src/imagemagick/MagickCore/fx.c"
}
] | Heap-buffer-overflow READ 1 | imagemagick | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/encoder_label_fuzzer
=================================================================
==313283==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000019f8 at pc 0x0000009bd415 bp 0x7fff7a518e50 sp 0x7fff7a518e48
READ of size 1... | cpp | 4a0226a0b05795da1b9f018d4322c7aaf314e41b | https://github.com/imagemagick/imagemagick/commit/d6b1d74cbd6967e070ee5a614cc0b37dbfb4a662 | null |
arvo:44008 | n132/arvo:44008-vul | /src/leptonica | [
{
"end_line": 3407,
"function_name": "pixCountArbInRect",
"start_line": 3341,
"target_file": "/src/leptonica/src/pix3.c"
}
] | Heap-buffer-overflow READ 1 | leptonica | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4134099905
INFO: Loaded 1 modules (116786 inline 8-bit counters): 116786 [0x16365f0, 0x1652e22),
INFO: Loaded 1 PC tables (116786 PCs): 116786 [0x1652e28,0x181b148),
/out/pix3_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=============... | cpp | 748723a795e48ce0ec0ce2fa78082ef0c62aac9c | https://github.com/DanBloomberg/leptonica/commit/f694a026b400a5f501f055e536eff2bfaa3c1bc1 | An overflow occurs in the function pixCountArbInRect() in pix3_fuzzer.cc due to a bug in pixel access, where the wrong depth is used. The function is intended for use on all pix with depth less than or equal to 8. |
arvo:44034 | n132/arvo:44034-vul | /src/ghostpdl | [
{
"end_line": 364,
"function_name": "pdfi_open_CIDFont_substitute_file",
"start_line": 171,
"target_file": "/src/ghostpdl/pdf/pdf_font.c"
}
] | Stack-buffer-overflow WRITE {*} | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 817253842
INFO: Loaded 3 modules (183029 inline 8-bit counters): 13708 [0x7fb6bdb2f9e0, 0x7fb6bdb32f6c), 959 [0x7fb6bdb90a40, 0x7fb6bdb90dff), 168362 [0x2da40b0, 0x2dcd25a),
INFO: Loaded 3 PC tables (183029 PCs): 13708 [0x7fb6bdb32f70,0x7fb6bdb68830... | cpp | c2e848fe05d9ffa99f61285bb1f33f717844abcb | https://github.com/ArtifexSoftware/ghostpdl/commit/bd747c5c2d320cd80ce08f16627c70a77ff67978 | A vulnerability exists in the CIDFont fallback mechanism where the buffer may not be large enough when attempting to use the fallback name of <Registry>-<Ordering> from the CIDSystemInfo dictionary. |
arvo:44151 | n132/arvo:44151-vul | /src/ghostpdl | [
{
"end_line": 1315,
"function_name": "pdfi_TJ",
"start_line": 1169,
"target_file": "/src/ghostpdl/pdf/pdf_text.c"
}
] | Segv on unknown address | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3441442508
INFO: Loaded 3 modules (183058 inline 8-bit counters): 13708 [0x7fdc9a3479e0, 0x7fdc9a34af6c), 959 [0x7fdc9a3a8a40, 0x7fdc9a3a8dff), 168391 [0x2da50f0, 0x2dce2b7),
INFO: Loaded 3 PC tables (183058 PCs): 13708 [0x7fdc9a34af70,0x7fdc9a38083... | cpp | cd92dea2720e365892000bd6f0c826ffaa871a84 | https://github.com/ArtifexSoftware/ghostpdl/commit/85fa6e1874189a349e9842fbf1ed90e2fd474588 | The function pdfi_TJ() holds a local, reference-counted reference to the operand array. If an error occurs, the operand stack reference to the array can disappear, causing the object to be freed while it is still in use. |
arvo:44199 | n132/arvo:44199-vul | /src/libplist | [
{
"end_line": 745,
"function_name": "plist_from_json",
"start_line": 674,
"target_file": "/src/libplist/src/jplist.c"
}
] | Heap-buffer-overflow READ 4 | libplist | asan | =================================================================
==9661==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x621000002500 at pc 0x0000004dbdf9 bp 0x7ffcabd749b0 sp 0x7ffcabd749a8
READ of size 4 at 0x621000002500 thread T0
SCARINESS: 17 (4-byte-read-heap-buffer-overflow)
#0 0x4dbdf8 in parse_... | cpp | 25f2f01c2693da8cc651d80debda9ad61fa17743 | https://github.com/libimobiledevice/libplist/commit/924ba961d68f6833f617fd3ad03c40f63f287142 | An out-of-bounds read occurs in jplist when the JSMN token index is not properly validated to ensure it is within the valid range. |
arvo:44221 | n132/arvo:44221-vul | /src/gpac | [
{
"end_line": 1138,
"function_name": "diST_box_read",
"start_line": 1129,
"target_file": "/src/gpac/src/isomedia/box_code_3gpp.c"
}
] | Stack-buffer-overflow WRITE 1 | gpac | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1160697464
INFO: Loaded 1 modules (201858 inline 8-bit counters): 201858 [0x1e77208, 0x1ea868a),
INFO: Loaded 1 PC tables (201858 PCs): 201858 [0x1ea8690,0x21bceb0),
/out/fuzz_parse: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
[31m[BS] Atte... | c | 1773b7a34bc08734aee7d3f5dfe65d06389fe15a | https://github.com/gpac/gpac/commit/3dbe11b37d65c8472faf0654410068e5500b3adb | null |
arvo:44264 | n132/arvo:44264-vul | /src/ghostpdl | [
{
"end_line": 377,
"function_name": "pdfi_pscript_interpret",
"start_line": 165,
"target_file": "/src/ghostpdl/pdf/pdf_fontps.c"
}
] | Heap-buffer-overflow READ 1 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 485676650
INFO: Loaded 3 modules (183065 inline 8-bit counters): 13708 [0x7f5c34ae89e0, 0x7f5c34aebf6c), 959 [0x7f5c34b49a40, 0x7f5c34b49dff), 168398 [0x2da50f0, 0x2dce2be),
INFO: Loaded 3 PC tables (183065 PCs): 13708 [0x7f5c34aebf70,0x7f5c34b21830... | cpp | 5db3e3fa6a3671fc95ebcf40b245a2f213cd9d6f | https://github.com/ArtifexSoftware/ghostpdl/commit/3c75a977879b066c20f6c9587481ac93e476630b | null |
arvo:44406 | n132/arvo:44406-vul | /src/ghostpdl | [
{
"end_line": 997,
"function_name": "ps_font_eexec_func",
"start_line": 976,
"target_file": "/src/ghostpdl/pdf/pdf_fontps.c"
}
] | Heap-buffer-overflow READ 1 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4212362696
INFO: Loaded 3 modules (183094 inline 8-bit counters): 13708 [0x7f795446c9e0, 0x7f795446ff6c), 959 [0x7f79544cda40, 0x7f79544cddff), 168427 [0x2da7050, 0x2dd023b),
INFO: Loaded 3 PC tables (183094 PCs): 13708 [0x7f795446ff70,0x7f79544a583... | cpp | a16d4303a172eb1f4f0e6c0133a728fe5f78c07e | https://github.com/ArtifexSoftware/ghostpdl/commit/a07b2982ac60f0e563e6a282bf2f8fdc81ae3c1c | A vulnerability exists in the eexec decoding process due to insufficient buffer bounds checking in the relevant code. The function fails to properly check for a zero length buffer in addition to a negative buffer size, which can lead to security issues. |
arvo:44432 | n132/arvo:44432-vul | /src/libredwg | [
{
"end_line": 1289,
"function_name": "read_file_header",
"start_line": 1211,
"target_file": "/src/libredwg/src/decode_r2007.c"
}
] | Stack-buffer-overflow WRITE 1 | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3452877367
INFO: Loaded 1 modules (555191 inline 8-bit counters): 555191 [0x4942aa0, 0x49ca357),
INFO: Loaded 1 PC tables (555191 PCs): 555191 [0x3e3f4c8,0x46b8038),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | c | 259072193fa0562587b3d971adb949aea3887091 | https://github.com/LibreDWG/libredwg/commit/fe03c5a89cbd441b6840335bd484cf08bc65c7c4 | A stack-buffer-overflow exists in decompress_rNUMBER due to passing `sizeof (r2007_file_header) + 1` in `read_file_header`, which leads to an off-by-one write buffer overflow. |
arvo:44439 | n132/arvo:44439-vul | /src/libredwg | [
{
"end_line": 12096,
"function_name": "dxf_tables_read",
"start_line": 11941,
"target_file": "/src/libredwg/src/in_dxf.c"
}
] | Heap-buffer-overflow READ 8 | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 377082652
INFO: Loaded 1 modules (471864 inline 8-bit counters): 471864 [0x4354380, 0x43c76b8),
INFO: Loaded 1 PC tables (471864 PCs): 471864 [0x37b3930,0x3ee6cb0),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================... | c | 78ffe2a4064935824b274d38cae3429c940bdc0b | https://github.com/LibreDWG/libredwg/commit/0a390fa7291ee439d2bb2bed998e76302e539b77 | null |
arvo:44457 | n132/arvo:44457-vul | /src/imagemagick | [
{
"end_line": 2358,
"function_name": "ProcessTernaryOpr",
"start_line": 2309,
"target_file": "/src/imagemagick/MagickCore/fx.c"
}
] | Heap-buffer-overflow READ 4 | imagemagick | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 78070340
INFO: Loaded 1 modules (228358 inline 8-bit counters): 228358 [0x1f55490, 0x1f8d096),
INFO: Loaded 1 PC tables (228358 PCs): 228358 [0x1f8d098,0x23090f8),
/out/encoder_label_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
======... | cpp | f578dad6151beb51747e7928770975ccddf064b6 | https://github.com/imagemagick/imagemagick/commit/a9bd4c0e16d034f733c93d5d1b022f9e5f78e70e | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.