task_id
stringlengths
8
10
docker_image
stringlengths
17
19
basedir
stringclasses
157 values
target_functions
listlengths
1
3
crash_type
stringclasses
85 values
project_name
stringclasses
157 values
sanitizer
stringclasses
3 values
sanitizer_output
stringlengths
1.13k
6.5M
language
stringclasses
2 values
vuln_commit
stringlengths
40
40
fix
stringlengths
69
110
vulnerability_description
stringlengths
38
824
arvo:39070
n132/arvo:39070-vul
/src/wolfmqtt
[ { "end_line": 1016, "function_name": "MqttClient_WaitType", "start_line": 775, "target_file": "/src/wolfmqtt/src/mqtt_client.c" } ]
UNKNOWN READ
wolfmqtt
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1954108914 INFO: Loaded 1 modules (14542 inline 8-bit counters): 14542 [0x97ef70, 0x98283e), INFO: Loaded 1 PC tables (14542 PCs): 14542 [0x6d3990,0x70c670), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:...
cpp
52653a609f99bcd6be7402891b5f5aca288f3e78
https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2
null
arvo:39083
n132/arvo:39083-vul
/src/wolfmqtt
[ { "end_line": 1016, "function_name": "MqttClient_WaitType", "start_line": 775, "target_file": "/src/wolfmqtt/src/mqtt_client.c" } ]
Heap-buffer-overflow WRITE 1
wolfmqtt
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3296057287 INFO: Loaded 1 modules (14667 inline 8-bit counters): 14667 [0x83cc460, 0x83cfdab), INFO: Loaded 1 PC tables (14667 PCs): 14667 [0x83465fc,0x8363054), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =============...
cpp
52653a609f99bcd6be7402891b5f5aca288f3e78
https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2
null
arvo:39094
n132/arvo:39094-vul
/src/wolfmqtt
[ { "end_line": 1016, "function_name": "MqttClient_WaitType", "start_line": 775, "target_file": "/src/wolfmqtt/src/mqtt_client.c" } ]
Heap-buffer-overflow READ 8
wolfmqtt
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1583603887 INFO: Loaded 1 modules (14542 inline 8-bit counters): 14542 [0x97ef70, 0x98283e), INFO: Loaded 1 PC tables (14542 PCs): 14542 [0x6d3990,0x70c670), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =================...
cpp
52653a609f99bcd6be7402891b5f5aca288f3e78
https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2
null
arvo:39103
n132/arvo:39103-vul
/src/wolfmqtt
[ { "end_line": 1016, "function_name": "MqttClient_WaitType", "start_line": 775, "target_file": "/src/wolfmqtt/src/mqtt_client.c" } ]
Heap-buffer-overflow WRITE 1
wolfmqtt
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1861961031 INFO: Loaded 1 modules (14542 inline 8-bit counters): 14542 [0x97ef70, 0x98283e), INFO: Loaded 1 PC tables (14542 PCs): 14542 [0x6d3990,0x70c670), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =================...
cpp
52653a609f99bcd6be7402891b5f5aca288f3e78
https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2
null
arvo:3936
n132/arvo:3936-vul
/src/proj.4
[ { "end_line": 131, "function_name": "pj_read_vgrid_value", "start_line": 36, "target_file": "/src/proj.4/src/pj_apply_vgridshift.c" } ]
UNKNOWN READ
proj.4
asan
INFO: Seed: 2869606350 INFO: Loaded 1 modules (5219 guards): 5219 [0x967400, 0x96c58c), /out/standard_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:DEADLYSIGNAL ================================================================= ==31113==ERROR: AddressSanitizer: SEGV on unknown address 0x...
cpp
0d1eeb16dd0a574d81ba0eaeea430f1be105a038
https://github.com/OSGeo/proj.4/commit/7503fbe7511cf9b98f9321ef27ee7d2c05401a1e
null
arvo:39373
n132/arvo:39373-vul
/src/libheif
[ { "end_line": 535, "function_name": "Op_YCbCr_to_RGB<Pixel>::convert_colorspace", "start_line": 369, "target_file": "/src/libheif/libheif/heif_colorconversion.cc" } ]
Heap-buffer-overflow READ {*}
libheif
asan
Reading 6620 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/color-conversion-fuzzer < INPUT_FILE or /out/color-conversion-fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz ex...
cpp
23d87adc0d7059b95e54c38786e4a4b5fd99eee3
https://github.com/strukturag/libheif/commit/11ffeffadd980f9f96019fe180fc1e81827e3790
null
arvo:39381
n132/arvo:39381-vul
/src/wolfmqtt
[ { "end_line": 1776, "function_name": "MqttDecode_Auth", "start_line": 1702, "target_file": "/src/wolfmqtt/src/mqtt_packet.c" } ]
Use-of-uninitialized-value
wolfmqtt
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2088459224 INFO: Loaded 1 modules (21387 inline 8-bit counters): 21387 [0x917cf0, 0x91d07b), INFO: Loaded 1 PC tables (21387 PCs): 21387 [0x85e940,0x8b21f0), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==18862==WARNING:...
cpp
cce1fdab8ca5e082b09b2ab00fbcf4cf38ef9430
https://github.com/wolfSSL/wolfMQTT/commit/362b34afc2584237175a2a592b4741df7104faec
null
arvo:3940
n132/arvo:3940-vul
/src/proj.4
[ { "end_line": 298, "function_name": "proj_hgrid_init", "start_line": 260, "target_file": "/src/proj.4/src/pj_apply_gridshift.c" } ]
Heap-buffer-overflow WRITE 7
proj.4
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/standard_fuzzer < INPUT_FILE or /out/standard_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/standard_...
cpp
9222694f522afb0dd96a50a8263dad62efa5d54e
https://github.com/OSGeo/proj.4/commit/0d1eeb16dd0a574d81ba0eaeea430f1be105a038
A heap-buffer-overflow occurs in the proj_hgrid_init function.
arvo:3943
n132/arvo:3943-vul
/src/proj.4
[ { "end_line": 131, "function_name": "pj_read_vgrid_value", "start_line": 36, "target_file": "/src/proj.4/src/pj_apply_vgridshift.c" } ]
UNKNOWN READ
proj.4
ubsan
INFO: Seed: 2693958736 INFO: Loaded 1 modules (5362 guards): 5362 [0x7906e0, 0x795aa8), /out/standard_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSanitizer:DEADLYSIGNAL ==31026==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0xfffffffffff38fc0 (pc 0x0000004656aa bp 0x7ffcf...
cpp
0d1eeb16dd0a574d81ba0eaeea430f1be105a038
https://github.com/OSGeo/proj.4/commit/7503fbe7511cf9b98f9321ef27ee7d2c05401a1e
null
arvo:39438
n132/arvo:39438-vul
/src/pcl
[ { "end_line": 293, "function_name": "PLYReader::vertexScalarPropertyCallback", "start_line": 279, "target_file": "/src/pcl/io/src/ply_io.cpp" } ]
Heap-buffer-overflow WRITE 8
pcl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4001265038 INFO: Loaded 1 modules (16507 inline 8-bit counters): 16507 [0x80c870, 0x8108eb), INFO: Loaded 1 PC tables (16507 PCs): 16507 [0x8108f0,0x8510a0), /out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc [pcl::PLYReader...
cpp
09e914b0b3b13c07710e814d71df3ff958945ba3
https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae
null
arvo:39477
n132/arvo:39477-vul
/src/wolfmqtt
[ { "end_line": 630, "function_name": "MqttDecode_Props", "start_line": 478, "target_file": "/src/wolfmqtt/src/mqtt_packet.c" } ]
Heap-buffer-overflow READ 1
wolfmqtt
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2152421082 INFO: Loaded 1 modules (21620 inline 8-bit counters): 21620 [0x843e480, 0x84438f4), INFO: Loaded 1 PC tables (21620 PCs): 21620 [0x83acbf8,0x83d6f98), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =============...
cpp
456ac9e24cfc3e1269afe9d7a864eccb39ca11bc
https://github.com/wolfSSL/wolfMQTT/commit/35328b955d88c68ee1d2e4408a94834c26efb35c
null
arvo:39481
n132/arvo:39481-vul
/src/libvips
[ { "end_line": 229, "function_name": "vips_foreign_load_jxl_fill_input", "start_line": 200, "target_file": "/src/libvips/libvips/foreign/jxlload.c" } ]
Memcpy-param-overlap
libvips
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/mosaic_fuzzer ================================================================= ==132330==ERROR: AddressSanitizer: memcpy-param-overlap: memory ranges [0x621000048ab0,0x621000048abd) and [0x621000048abc, 0x621000048ac9) overlap SCARINESS: 1...
cpp
bd8fad842a1858eefdb61193cc7a19d7e47f9258
https://github.com/libvips/libvips/commit/b98366fcb1bf24491b0033eb21b3f6f5c33e453f
A security vulnerability exists because the input buffer can overlap, and the use of an unsafe memory copy function instead of memmove in the affected code can lead to undefined behavior or memory corruption.
arvo:39631
n132/arvo:39631-vul
/src/wolfmqtt
[ { "end_line": 1776, "function_name": "MqttDecode_Auth", "start_line": 1702, "target_file": "/src/wolfmqtt/src/mqtt_packet.c" } ]
UNKNOWN READ
wolfmqtt
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3102371564 INFO: Loaded 1 modules (21541 inline 8-bit counters): 21541 [0x7f13f0, 0x7f6815), INFO: Loaded 1 PC tables (21541 PCs): 21541 [0x730e58,0x7850a8), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:...
cpp
cce1fdab8ca5e082b09b2ab00fbcf4cf38ef9430
https://github.com/wolfSSL/wolfMQTT/commit/362b34afc2584237175a2a592b4741df7104faec
null
arvo:39689
n132/arvo:39689-vul
/src/freeradius-server
[ { "end_line": 1318, "function_name": "fr_dns_label_to_value_box", "start_line": 1216, "target_file": "/src/freeradius-server/src/lib/util/dns.c" } ]
Heap-buffer-overflow READ 1
freeradius-server
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2646913871 INFO: Loaded 3 modules (17005 inline 8-bit counters): 16321 [0x7f6496353e68, 0x7f6496357e29), 639 [0x7f6495df6940, 0x7f6495df6bbf), 45 [0x5ba610, 0x5ba63d), INFO: Loaded 3 PC tables (17005 PCs): 16321 [0x7f6496357e30,0x7f6496397a40), 639 ...
c
90284231653fc167b80572499199632511f2cd7a
https://github.com/FreeRADIUS/freeradius-server/commit/66e59da0336526c1f2d2d49aa12838b26d0e8240
The vulnerability is that dns_label_decode() lacks sufficient validation.
arvo:39750
n132/arvo:39750-vul
/src/wolfmqtt
[ { "end_line": 1776, "function_name": "MqttDecode_Auth", "start_line": 1702, "target_file": "/src/wolfmqtt/src/mqtt_packet.c" } ]
Heap-buffer-overflow READ 1
wolfmqtt
asan
================================================================= ==18925==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x621000003e1c at pc 0x000000512675 bp 0x7ffdc09939b0 sp 0x7ffdc09939a8 READ of size 1 at 0x621000003e1c thread T0 SCARINESS: 22 (1-byte-read-heap-buffer-overflow-far-from-bounds) #0 0...
cpp
cce1fdab8ca5e082b09b2ab00fbcf4cf38ef9430
https://github.com/wolfSSL/wolfMQTT/commit/362b34afc2584237175a2a592b4741df7104faec
null
arvo:39931
n132/arvo:39931-vul
/src/mruby
[ { "end_line": 536, "function_name": "mrb_funcall_with_block", "start_line": 434, "target_file": "/src/mruby/src/vm.c" } ]
Heap-buffer-overflow WRITE 8
mruby
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/mruby_fuzzer ================================================================= ==2149==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61f000000c80 at pc 0x0000005a9a16 bp 0x7ffc45c72b10 sp 0x7ffc45c72b08 WRITE of size 8 at 0x61f...
c
6b3b1012ca480f1e930c4ddeeaebed55e5df4144
https://github.com/mruby/mruby/commit/7010ed0f0a414b1367e4620a504f106759341cc2
null
arvo:39937
n132/arvo:39937-vul
/src/mruby
[ { "end_line": 536, "function_name": "mrb_funcall_with_block", "start_line": 434, "target_file": "/src/mruby/src/vm.c" } ]
Heap-buffer-overflow WRITE 8
mruby
asan
INFO: found LLVMFuzzerCustomMutator (0x5608c0). Disabling -len_control by default. INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2560247870 INFO: Loaded 1 modules (27098 inline 8-bit counters): 27098 [0xb49818, 0xb501f2), INFO: Loaded 1 PC tables (27098 PCs): 27098 [0x9bcaa8,0xa26848), /out/mr...
cpp
6b3b1012ca480f1e930c4ddeeaebed55e5df4144
https://github.com/mruby/mruby/commit/7010ed0f0a414b1367e4620a504f106759341cc2
null
arvo:39940
n132/arvo:39940-vul
/src/mruby
[ { "end_line": 536, "function_name": "mrb_funcall_with_block", "start_line": 434, "target_file": "/src/mruby/src/vm.c" } ]
Heap-buffer-overflow WRITE 8
mruby
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2826885667 INFO: Loaded 1 modules (21332 inline 8-bit counters): 21332 [0x8f5130, 0x8fa484), INFO: Loaded 1 PC tables (21332 PCs): 21332 [0x7dcc18,0x830158), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ====================...
c
6b3b1012ca480f1e930c4ddeeaebed55e5df4144
https://github.com/mruby/mruby/commit/7010ed0f0a414b1367e4620a504f106759341cc2
null
arvo:40058
n132/arvo:40058-vul
/src/pcl
[ { "end_line": 293, "function_name": "PLYReader::vertexScalarPropertyCallback", "start_line": 279, "target_file": "/src/pcl/io/src/ply_io.cpp" } ]
Heap-buffer-overflow WRITE 1
pcl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 851485913 INFO: Loaded 1 modules (16482 inline 8-bit counters): 16482 [0x80a870, 0x80e8d2), INFO: Loaded 1 PC tables (16482 PCs): 16482 [0x80e8d8,0x84eef8), /out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
cpp
09e914b0b3b13c07710e814d71df3ff958945ba3
https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae
null
arvo:40069
n132/arvo:40069-vul
/src/wolfmqtt
[ { "end_line": 642, "function_name": "MqttDecode_Props", "start_line": 479, "target_file": "/src/wolfmqtt/src/mqtt_packet.c" } ]
Heap-buffer-overflow READ 1
wolfmqtt
asan
================================================================= ==18817==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62100000430a at pc 0x000000514cbc bp 0x7ffe6f9bf3f0 sp 0x7ffe6f9bf3e8 READ of size 1 at 0x62100000430a thread T0 SCARINESS: 22 (1-byte-read-heap-buffer-overflow-far-from-bounds) #0 0...
cpp
cce1fdab8ca5e082b09b2ab00fbcf4cf38ef9430
https://github.com/wolfSSL/wolfMQTT/commit/27f9fdb1052b3cac5f0f577a2543fe5a71b39592
null
arvo:40120
n132/arvo:40120-vul
/src/pcl
[ { "end_line": 293, "function_name": "PLYReader::vertexScalarPropertyCallback", "start_line": 279, "target_file": "/src/pcl/io/src/ply_io.cpp" } ]
Container-overflow WRITE 4
pcl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2194710548 INFO: Loaded 1 modules (16482 inline 8-bit counters): 16482 [0x80a870, 0x80e8d2), INFO: Loaded 1 PC tables (16482 PCs): 16482 [0x80e8d8,0x84eef8), /out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc [pcl::PLYReader...
cpp
09e914b0b3b13c07710e814d71df3ff958945ba3
https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae
null
arvo:40317
n132/arvo:40317-vul
/src/libbpf
[ { "end_line": 4124, "function_name": "bpf_object__collect_prog_relos", "start_line": 4028, "target_file": "/src/libbpf/src/libbpf.c" } ]
UNKNOWN READ
libbpf
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4163357425 INFO: Loaded 1 modules (9368 inline 8-bit counters): 9368 [0x6ef570, 0x6f1a08), INFO: Loaded 1 PC tables (9368 PCs): 9368 [0x670590,0x694f10), /out/bpf-object-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:DE...
c
3acf7c289abf636bc74e078002c843b110cb69f5
https://github.com/libbpf/libbpf/commit/36cc591ac8a7b390249c4f3afcef21b8c9c6c76f
libbpf lacks sufficient sanity checks for ELF relocations, which allows division by zero and out-of-bounds array accesses.
arvo:40363
n132/arvo:40363-vul
/src/libbpf
[ { "end_line": 3342, "function_name": "bpf_object__elf_collect", "start_line": 3181, "target_file": "/src/libbpf/src/libbpf.c" } ]
Global-buffer-overflow READ {*}
libbpf
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3043424184 INFO: Loaded 1 modules (9366 inline 8-bit counters): 9366 [0x6ef570, 0x6f1a06), INFO: Loaded 1 PC tables (9366 PCs): 9366 [0x670590,0x694ef0), /out/bpf-object-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===================...
c
2f52e2afc068b801880021334a41f16a18fa4bc2
https://github.com/libbpf/libbpf/commit/a383b3e200c72fd5fdc8b8539fb409942357fc5b
The .BTF and .BTF.ext ELF sections may not have the SHT_PROGBITS type or may not contain data, making the ELF file invalid or corrupted. This can result in data->d_buf being NULL and cause a SIGSEGV later on.
arvo:40396
n132/arvo:40396-vul
/src/libjxl
[ { "end_line": 1960, "function_name": "JxlDecoderProcessInput", "start_line": 1589, "target_file": "/src/libjxl/lib/jxl/decode.cc" } ]
Heap-buffer-overflow WRITE 1
libjxl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1460874682 INFO: Loaded 1 modules (31942 inline 8-bit counters): 31942 [0x5630acaf52a8, 0x5630acafcf6e), INFO: Loaded 1 PC tables (31942 PCs): 31942 [0x5630acafcf70,0x5630acb79bd0), /out/djxl_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/p...
cpp
35ad5de736b3f1ea9784113e2e30ea424c251616
https://github.com/libjxl/libjxl/commit/839ef3e392240fc3994b8b73e5164ac5cad4d30a
null
arvo:40617
n132/arvo:40617-vul
/src/libexif
[ { "end_line": 1027, "function_name": "exif_data_load_data", "start_line": 843, "target_file": "/src/libexif/libexif/exif-data.c" } ]
Heap-buffer-overflow READ 4
libexif
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1072766538 INFO: Loaded 1 modules (2884 inline 8-bit counters): 2884 [0x6727c0, 0x673304), INFO: Loaded 1 PC tables (2884 PCs): 2884 [0x5fd490,0x6088d0), /out/exif_loader_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==================...
cpp
54461dde98692a0741fbbe2e0c6c2533ae9594e1
https://github.com/libexif/libexif/commit/4bd5cd63390731a1473205f9346cd4fcc1b0f668
The vulnerability occurs because the function does not check the length read from the data against the data size passed into it, potentially allowing out-of-bounds reads.
arvo:40623
n132/arvo:40623-vul
/src/libexif
[ { "end_line": 1022, "function_name": "exif_data_load_data", "start_line": 843, "target_file": "/src/libexif/libexif/exif-data.c" } ]
UNKNOWN READ
libexif
asan
================================================================= ==27940==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f28825f7800 at pc 0x00000049cfd7 bp 0x7ffe42a0bbd0 sp 0x7ffe42a0b398 READ of size 2097320 at 0x7f28825f7800 thread T0 SCARINESS: 26 (multi-byte-read-heap-buffer-overflow) #0 0x49cfd...
cpp
a918830b8830e1e3657b4f36f48571a8d95a4ec8
https://github.com/libexif/libexif/commit/54461dde98692a0741fbbe2e0c6c2533ae9594e1
A vulnerability exists where the code does not check if len is less than 2, which can result in len becoming negative.
arvo:40674
n132/arvo:40674-vul
/src/libdwarf
[ { "end_line": 1814, "function_name": "read_gs_section_group", "start_line": 1692, "target_file": "/src/libdwarf/src/lib/libdwarf/dwarf_elf_load_headers.c" } ]
Heap-buffer-overflow READ 8
libdwarf
asan
================================================================= ==1528==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x616000000380 at pc 0x00000079ebbd bp 0x7ffe817f75d0 sp 0x7ffe817f75c8 READ of size 8 at 0x616000000380 thread T0 SCARINESS: 33 (8-byte-read-heap-buffer-overflow-far-from-bounds) #0 0x...
c
732c3509ffaa4b1aa70458c2ad568f55c6ae8e32
https://github.com/davea42/libdwarf-code/commit/cd021a1311572d4f9bb37b0b808685a5ed84bcc3
A test for a section group section-reference in src/lib/libdwarf/dwarf_elf_load_headers.c fails to catch a section number that is just one too big, potentially allowing out-of-bounds section references.
arvo:40683
n132/arvo:40683-vul
/src/binutils-gdb
[ { "end_line": 7201, "function_name": "evax_bfd_print_valspec", "start_line": 7134, "target_file": "/src/binutils-gdb/bfd/vms-alpha.c" } ]
Heap-buffer-overflow READ 1
binutils-gdb
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_objdump_safe /tmp/libfuzzer.65034: file format vms-alpha /tmp/libfuzzer.65034 EIHD: (size: 0, nbr blocks: 0) majorid: 3, minorid: 0 image type: 0 (unknown), subtype: 0 (native) offsets: isd: 0, activ: 0, symdbg: 256, imgid: 0, ...
cpp
831105b6d96ae7ab9b485fb868f86e23d34ab36f
https://github.com/bminor/binutils-gdb/commit/a3c0896d80d21545bd8036deb5e1ad4027db5677
The functions evax_bfd_print_desc, evax_bfd_print_valspec, evax_bfd_print_typspec, and evax_bfd_print_dst in vms-alpha.c lack proper sanity checks for buffer access, which leads to potential buffer overflows.
arvo:40902
n132/arvo:40902-vul
/src/arrow
[ { "end_line": 2446, "function_name": "GetInternal", "start_line": 2405, "target_file": "/src/arrow/cpp/src/parquet/encoding.cc" } ]
Memcpy-param-overlap
arrow
asan
Warning: AFL++ tools might need to set AFL_MAP_SIZE to 236924 to be able to run this instrumented program if this crashes! ================================================================= ==804==ERROR: AddressSanitizer: memcpy-param-overlap: memory ranges [0x62400001b576,0x62410001b575) and [0x624000019524, 0x62410001...
cpp
6b0248d5b5502a1cf76d5853d15be9844b84522c
https://github.com/apache/arrow/commit/35cc9d1409ed4bab07a40af704a13a6b2011f691
null
arvo:4097
n132/arvo:4097-vul
/src/open62541
[ { "end_line": 521, "function_name": "Service_DeleteSubscriptions", "start_line": 502, "target_file": "/src/open62541/src/server/ua_services_subscription.c" } ]
Heap-use-after-free READ 8
open62541
asan
INFO: Seed: 3386537673 INFO: Loaded 1 modules (4763 guards): 4763 [0xa091c8, 0xa0dc34), /out/fuzz_binary_message: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==1052==ERROR: AddressSanitizer: heap-use-after-free on address 0x6120000017e0 at pc 0...
cpp
51427e75416cb8c72d220fe92a28b9ba25b9482d
https://github.com/open62541/open62541/commit/d9208207e458a973e481ded5f7c2cf765dd7ea4c
A heap use after free vulnerability exists where UA_Subscription_answerPublishRequestsNoSubscription is not immediately sent before the session is deleted.
arvo:41143
n132/arvo:41143-vul
/src/arrow
[ { "end_line": 591, "function_name": "ValidateOffsets", "start_line": 545, "target_file": "/src/arrow/cpp/src/arrow/array/validate.cc" } ]
Heap-buffer-overflow READ 4
arrow
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3336700390 INFO: Loaded 1 modules (203738 inline 8-bit counters): 203738 [0x14a6470, 0x14d804a), INFO: Loaded 1 PC tables (203738 PCs): 203738 [0x14d8050,0x17f3df0), /out/arrow-ipc-stream-fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===...
cpp
50990ad5e9df494bf6dd108eeac1c8a64c550b52
https://github.com/apache/arrow/commit/a36dd8cd208582316322b0dd6e7569785c8f2780
A crash occurs when validating a corrupt list array in the C++ implementation, leading to a security vulnerability.
arvo:41152
n132/arvo:41152-vul
/src/pcl
[ { "end_line": 293, "function_name": "PLYReader::vertexScalarPropertyCallback", "start_line": 279, "target_file": "/src/pcl/io/src/ply_io.cpp" } ]
Heap-buffer-overflow WRITE 4
pcl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1675021370 INFO: Loaded 1 modules (16478 inline 8-bit counters): 16478 [0x80c7f0, 0x81084e), INFO: Loaded 1 PC tables (16478 PCs): 16478 [0x810850,0x850e30), /out/ply_reader_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc [pcl::PLYReader...
cpp
09e914b0b3b13c07710e814d71df3ff958945ba3
https://github.com/PointCloudLibrary/pcl/commit/3f897554837966b71aa3bfd72dd7ce482e5e55ae
null
arvo:41221
n132/arvo:41221-vul
/src/arrow
[ { "end_line": 2460, "function_name": "GetInternal", "start_line": 2412, "target_file": "/src/arrow/cpp/src/parquet/encoding.cc" } ]
Heap-buffer-overflow WRITE 1
arrow
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1640916606 INFO: Loaded 1 modules (1235618 inline 8-bit counters): 1235618 [0x55d8940, 0x57063e2), INFO: Loaded 1 PC tables (1235618 PCs): 1235618 [0x57063e8,0x69e0e08), /out/parquet-arrow-fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==...
cpp
eb2fa2df6dedf2743047df9dd19d7ed4f4482c22
https://github.com/apache/arrow/commit/587ce1dc5fcf4172591bdfdcb8882d47507d7daa
A crash occurs when reading DELTA_BYTE_ARRAY Parquet files in the C++ implementation.
arvo:41504
n132/arvo:41504-vul
/src/espeak-ng
[ { "end_line": 737, "function_name": "IsLetterGroup", "start_line": 672, "target_file": "/src/espeak-ng/src/libespeak-ng/dictionary.c" } ]
Stack-buffer-overflow READ 1
espeak-ng
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2801437977 INFO: Loaded 1 modules (10266 inline 8-bit counters): 10266 [0x8be220, 0x8c0a3a), INFO: Loaded 1 PC tables (10266 PCs): 10266 [0x8c0a40,0x8e8be0), /out/ssml-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =====================...
c
45eb1aa3afb9525de95feae0ca0312ddc235df19
https://github.com/espeak-ng/espeak-ng/commit/d0bbf97edb4c3e2374ead19a0ecd9143983f2ddf
null
arvo:41608
n132/arvo:41608-vul
/src/libjxl
[ { "end_line": 338, "function_name": "ModularFrameDecoder::DecodeGroup", "start_line": 264, "target_file": "/src/libjxl/lib/jxl/dec_modular.cc" } ]
Container-overflow READ 4
libjxl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1780060375 INFO: Loaded 1 modules (32206 inline 8-bit counters): 32206 [0x5585735312f8, 0x5585735390c6), INFO: Loaded 1 PC tables (32206 PCs): 32206 [0x5585735390c8,0x5585735b6da8), /out/djxl_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/p...
cpp
d79b7191f1f1852e6e430c92c2ef58476ddf79b9
https://github.com/libjxl/libjxl/commit/a915cd9ed0fd803449307aa37ba3c5364398bcc6
null
arvo:42108
n132/arvo:42108-vul
/src/libraw
[ { "end_line": 1183, "function_name": "LibRaw::identify", "start_line": 181, "target_file": "/src/libraw/src/metadata/identify.cpp" } ]
Stack-buffer-overflow WRITE 1
libraw
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3282905641 INFO: Loaded 1 modules (21160 inline 8-bit counters): 21160 [0x90e810, 0x913ab8), INFO: Loaded 1 PC tables (21160 PCs): 21160 [0x7f2048,0x844ac8), /out/libraw_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===================...
cpp
53c83c16e6adac220715d3f2bdd1b6e8b8bc90cf
https://github.com/libraw/libraw/commit/20d0f3fd2f690d7d97068c412f5d97cf494aa74d
A stack buffer overflow occurs in LibRaw::parseCR3 due to an off-by-one error in the line `AtomNameStack[(nesting + 1) * 4] = '\0';` when `nesting` is `31`, causing a write to `AtomNameStack[128]` while the buffer size is only 128. The function already checks for `nesting > 31` and returns an error for too deep nesting...
arvo:42111
n132/arvo:42111-vul
/src/pcl
[ { "end_line": 134, "function_name": "pcl::PLYReader::amendProperty", "start_line": 117, "target_file": "/src/pcl/io/src/ply_io.cpp" } ]
UNKNOWN READ
pcl
asan
AddressSanitizer:DEADLYSIGNAL ================================================================= ==912==ERROR: AddressSanitizer: SEGV on unknown address 0xffffffffffffffd8 (pc 0x00000079bc3e bp 0x7fff165ec390 sp 0x7fff165ec280 T0) ==912==The signal is caused by a READ memory access. SCARINESS: 20 (wild-addr-read) #0...
cpp
4fe0737e913421c21744213cd22f165184bfb608
https://github.com/PointCloudLibrary/pcl/commit/7d52b107223ef8adec990608e8685392b48d79c6
null
arvo:42262
n132/arvo:42262-vul
/src/c-blosc2
[ { "end_line": 578, "function_name": "ndlz8_decompress", "start_line": 429, "target_file": "/src/c-blosc2/plugins/codecs/ndlz/ndlz8x8.c" } ]
UNKNOWN READ
c-blosc2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1759081895 INFO: Loaded 1 modules (48559 inline 8-bit counters): 48559 [0xf2e680, 0xf3a42f), INFO: Loaded 1 PC tables (48559 PCs): 48559 [0xc10210,0xccdd00), /out/decompress_chunk_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =========...
c
4460dfe69d7a947c5278a756113005cdf9c1fef9
https://github.com/Blosc/c-blosc2/commit/d77d3ebe14d6fb7085fde26c30678a82f6fe562c
null
arvo:42264
n132/arvo:42264-vul
/src/elfutils
[ { "end_line": 1017, "function_name": "dwfl_segment_report_module", "start_line": 291, "target_file": "/src/elfutils/libdwfl/dwfl_segment_report_module.c" } ]
Stack-use-after-return READ 4
elfutils
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1314200351 INFO: Loaded 1 modules (15284 inline 8-bit counters): 15284 [0x840e8e0, 0x8412494), INFO: Loaded 1 PC tables (15284 PCs): 15284 [0x836739c,0x838513c), /out/fuzz-dwfl-core: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==============...
c
bc14c148a6ad9b84bda428bd3bc75028515f0151
https://sourceware.org/git/?p=elfutils.git;a=commitdiff;h=d844d1575522b5ad9ada0aa3c26105230a1c1884
A vulnerability exists in dwfl_segment_report_module in libdwfl where the notes filesz is not properly checked for excessive size. The reading of GElf_Nhdr does not verify for overflow at every step, and the size of the buildid bytes is not limited, potentially allowing for overflows and excessive memory usage.
arvo:42266
n132/arvo:42266-vul
/src/ghostpdl
[ { "end_line": 1202, "function_name": "search_table_1", "start_line": 1186, "target_file": "/src/ghostpdl/pdf/pdf_int.c" } ]
Global-buffer-overflow READ 1
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4088426227 INFO: Loaded 3 modules (182532 inline 8-bit counters): 13708 [0x7fb9844d89e0, 0x7fb9844dbf6c), 959 [0x7fb984539a40, 0x7fb984539dff), 167865 [0x2d97d50, 0x2dc0d09), INFO: Loaded 3 PC tables (182532 PCs): 13708 [0x7fb9844dbf70,0x7fb98451183...
cpp
991a95ff4c4ffd6114f0ae5b9ecb7887ba775d50
https://github.com/ArtifexSoftware/ghostpdl/commit/82b097fe8e76ea92f69ef483f45c0cf491a98d43
null
arvo:42285
n132/arvo:42285-vul
/src/ghostpdl
[ { "end_line": 1334, "function_name": "pdfi_open_memory_stream_from_filtered_stream", "start_line": 1237, "target_file": "/src/ghostpdl/pdf/pdf_file.c" } ]
UNKNOWN READ
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1960175684 INFO: Loaded 3 modules (182550 inline 8-bit counters): 13708 [0x7fb6b79a19e0, 0x7fb6b79a4f6c), 959 [0x7fb6b7a02a40, 0x7fb6b7a02dff), 167883 [0x2d98d50, 0x2dc1d1b), INFO: Loaded 3 PC tables (182550 PCs): 13708 [0x7fb6b79a4f70,0x7fb6b79da83...
cpp
632230836e6a5aa347c037a66f478d752b62242a
https://github.com/ArtifexSoftware/ghostpdl/commit/7fe54b1dbf221864b25ff55eccf1d624c07bb21d
null
arvo:42298
n132/arvo:42298-vul
/src/ghostpdl
[ { "end_line": 1068, "function_name": "pdfi_read_cff_dict", "start_line": 791, "target_file": "/src/ghostpdl/pdf/pdf_font1C.c" } ]
Stack-buffer-overflow WRITE 4
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2725116319 INFO: Loaded 3 modules (182553 inline 8-bit counters): 13708 [0x7fe076ef29e0, 0x7fe076ef5f6c), 959 [0x7fe076f53a40, 0x7fe076f53dff), 167886 [0x2d98d50, 0x2dc1d1e), INFO: Loaded 3 PC tables (182553 PCs): 13708 [0x7fe076ef5f70,0x7fe076f2b83...
cpp
0d934dd30662efe03e63b5d9e9a98bb8a1834bca
https://github.com/ArtifexSoftware/ghostpdl/commit/0c4e9f7312637d512fec2b806570bfbea9da1aff
A vulnerability exists due to missing bounds checking on the CFF stack.
arvo:42322
n132/arvo:42322-vul
/src/ghostpdl
[ { "end_line": 1079, "function_name": "pdfi_read_cff_dict", "start_line": 791, "target_file": "/src/ghostpdl/pdf/pdf_font1C.c" } ]
Heap-buffer-overflow READ 4
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 164407278 INFO: Loaded 3 modules (182556 inline 8-bit counters): 13708 [0x7fb6d6d3a9e0, 0x7fb6d6d3df6c), 959 [0x7fb6d6d9ba40, 0x7fb6d6d9bdff), 167889 [0x2d98d50, 0x2dc1d21), INFO: Loaded 3 PC tables (182556 PCs): 13708 [0x7fb6d6d3df70,0x7fb6d6d73830...
cpp
1ae55674f6d68eb6215d7d0f82610f636d81ad3d
https://github.com/ArtifexSoftware/ghostpdl/commit/436cb8a1958642e7bc0d3ca4c44288674dcd590c
A vulnerability exists in the CFF code where the number of various blue values is not validated before writing to fixed size arrays in the relevant functions and files. This can lead to potential buffer overflows.
arvo:42324
n132/arvo:42324-vul
/src/ghostpdl
[ { "end_line": 1334, "function_name": "pdfi_open_memory_stream_from_filtered_stream", "start_line": 1237, "target_file": "/src/ghostpdl/pdf/pdf_file.c" } ]
Heap-use-after-free READ 8
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2201694768 INFO: Loaded 3 modules (182550 inline 8-bit counters): 13708 [0x7f7ccbd2b9e0, 0x7f7ccbd2ef6c), 959 [0x7f7ccbd8ca40, 0x7f7ccbd8cdff), 167883 [0x2d98d50, 0x2dc1d1b), INFO: Loaded 3 PC tables (182550 PCs): 13708 [0x7f7ccbd2ef70,0x7f7ccbd6483...
cpp
632230836e6a5aa347c037a66f478d752b62242a
https://github.com/ArtifexSoftware/ghostpdl/commit/7fe54b1dbf221864b25ff55eccf1d624c07bb21d
null
arvo:42325
n132/arvo:42325-vul
/src/ghostpdl
[ { "end_line": 478, "function_name": "pdfi_repair_file", "start_line": 84, "target_file": "/src/ghostpdl/pdf/pdf_repair.c" } ]
Heap-buffer-overflow WRITE 4
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2242695114 INFO: Loaded 3 modules (182553 inline 8-bit counters): 13708 [0x7fdb359149e0, 0x7fdb35917f6c), 959 [0x7fdb35975a40, 0x7fdb35975dff), 167886 [0x2d98d50, 0x2dc1d1e), INFO: Loaded 3 PC tables (182553 PCs): 13708 [0x7fdb35917f70,0x7fdb3594d83...
cpp
3aaacd96f4d80213f6c1f99263c17b0f5cfe987f
https://github.com/ArtifexSoftware/ghostpdl/commit/1ae55674f6d68eb6215d7d0f82610f636d81ad3d
A broken Object stream can be 'repaired' in a way that uses object numbers outside the current size of the xref table in pdfi_repair_add_object(). This allows writing directly to the table using an out-of-bounds index, leading to memory corruption and potentially causing a segmentation fault during repair.
arvo:42327
n132/arvo:42327-vul
/src/ghostpdl
[ { "end_line": 745, "function_name": "pdfi_deref_compressed", "start_line": 537, "target_file": "/src/ghostpdl/pdf/pdf_deref.c" } ]
Heap-buffer-overflow READ 8
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3312654345 INFO: Loaded 3 modules (182549 inline 8-bit counters): 13708 [0x7facb31219e0, 0x7facb3124f6c), 959 [0x7facb3182a40, 0x7facb3182dff), 167882 [0x2d98d50, 0x2dc1d1a), INFO: Loaded 3 PC tables (182549 PCs): 13708 [0x7facb3124f70,0x7facb315a83...
cpp
624ef6ae4bb802dff156681a1616c6a65fca39c1
https://github.com/ArtifexSoftware/ghostpdl/commit/632230836e6a5aa347c037a66f478d752b62242a
A vulnerability exists where the xref index is not bounds-checked before being used to dereference a compressed object stream, potentially leading to out-of-bounds access.
arvo:42329
n132/arvo:42329-vul
/src/ghostpdl
[ { "end_line": 3898, "function_name": "pdfi_annot_draw", "start_line": 3848, "target_file": "/src/ghostpdl/pdf/pdf_annot.c" } ]
Stack-buffer-overflow WRITE {*}
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 316755535 INFO: Loaded 3 modules (182564 inline 8-bit counters): 13708 [0x7f91a6ebd9e0, 0x7f91a6ec0f6c), 959 [0x7f91a6f1ea40, 0x7f91a6f1edff), 167897 [0x2d98d50, 0x2dc1d29), INFO: Loaded 3 PC tables (182564 PCs): 13708 [0x7f91a6ec0f70,0x7f91a6ef6830...
cpp
436cb8a1958642e7bc0d3ca4c44288674dcd590c
https://github.com/ArtifexSoftware/ghostpdl/commit/a7f2474c5aaac7a75a4119478c77d2cafcf45b85
A buffer in the code for a debug message lacks bounds checking before data is copied into it, which can lead to a security vulnerability.
arvo:42356
n132/arvo:42356-vul
/src/ghostpdl
[ { "end_line": 478, "function_name": "pdfi_repair_file", "start_line": 84, "target_file": "/src/ghostpdl/pdf/pdf_repair.c" } ]
Heap-buffer-overflow READ 8
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4066270495 INFO: Loaded 3 modules (182570 inline 8-bit counters): 13708 [0x7fab2b45f9e0, 0x7fab2b462f6c), 959 [0x7fab2b4c0a40, 0x7fab2b4c0dff), 167903 [0x2d98d50, 0x2dc1d2f), INFO: Loaded 3 PC tables (182570 PCs): 13708 [0x7fab2b462f70,0x7fab2b49883...
cpp
115663a52dcaef53c91547907f45cc4ffa385537
https://github.com/ArtifexSoftware/ghostpdl/commit/afdf3d0446743ac64fdc438874385c01a00cae7c
null
arvo:42479
n132/arvo:42479-vul
/src/ghostpdl
[ { "end_line": 228, "function_name": "general_endcidrange_func", "start_line": 142, "target_file": "/src/ghostpdl/pdf/pdf_cmap.c" } ]
Negative-size-param
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 763379186 INFO: Loaded 3 modules (182651 inline 8-bit counters): 13708 [0x7f4ebd8b99e0, 0x7f4ebd8bcf6c), 959 [0x7f4ebd91aa40, 0x7f4ebd91adff), 167984 [0x2d9ae10, 0x2dc3e40), INFO: Loaded 3 PC tables (182651 PCs): 13708 [0x7f4ebd8bcf70,0x7f4ebd8f2830...
cpp
82d534f8f69fd4939faf4b7f20df5cc2462973d8
https://github.com/ArtifexSoftware/ghostpdl/commit/cb2b78cddfc67fee13b4bec3f16747f2ec611793
A vulnerability exists in handling badly broken ToUnicode CMaps, where the code attempts to continue processing despite malformed input, resulting in negative array indices in the affected file.
arvo:42485
n132/arvo:42485-vul
/src/ghostpdl
[ { "end_line": 717, "function_name": "pdfi_fapi_get_gsubr", "start_line": 679, "target_file": "/src/ghostpdl/pdf/pdf_fapi.c" } ]
UNKNOWN
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 964085270 INFO: Loaded 3 modules (182649 inline 8-bit counters): 13708 [0x7fbf7d8149e0, 0x7fbf7d817f6c), 959 [0x7fbf7d875a40, 0x7fbf7d875dff), 167982 [0x2d9ae10, 0x2dc3e3e), INFO: Loaded 3 PC tables (182649 PCs): 13708 [0x7fbf7d817f70,0x7fbf7d84d830...
cpp
8f86c5f3d7a46206d8eb9501912d212e594d2e0f
https://github.com/ArtifexSoftware/ghostpdl/commit/82d534f8f69fd4939faf4b7f20df5cc2462973d8
null
arvo:42537
n132/arvo:42537-vul
/src/c-blosc2
[ { "end_line": 578, "function_name": "ndlz8_decompress", "start_line": 429, "target_file": "/src/c-blosc2/plugins/codecs/ndlz/ndlz8x8.c" } ]
Heap-buffer-overflow WRITE {*}
c-blosc2
asan
================================================================= ==7157==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x617000000300 at pc 0x0000004984dc bp 0x7ffdbcb53cd0 sp 0x7ffdbcb53498 WRITE of size 67108864 at 0x617000000300 thread T0 SCARINESS: 45 (multi-byte-write-heap-buffer-overflow) #0 0x498...
c
4460dfe69d7a947c5278a756113005cdf9c1fef9
https://github.com/Blosc/c-blosc2/commit/d77d3ebe14d6fb7085fde26c30678a82f6fe562c
null
arvo:42562
n132/arvo:42562-vul
/src/c-blosc2
[ { "end_line": 701, "function_name": "ndlz4_decompress", "start_line": 512, "target_file": "/src/c-blosc2/plugins/codecs/ndlz/ndlz4x4.c" } ]
Heap-buffer-overflow READ 1
c-blosc2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3866793744 INFO: Loaded 1 modules (48555 inline 8-bit counters): 48555 [0xf2e680, 0xf3a42b), INFO: Loaded 1 PC tables (48555 PCs): 48555 [0xc10110,0xccdbc0), /out/decompress_chunk_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =========...
c
79b6995ab82e09ccd1bd50f50e6af1ef40280c4c
https://github.com/Blosc/c-blosc2/commit/ce2e8fe5f2fdb3779505935f05f93481d4905e62
null
arvo:42613
n132/arvo:42613-vul
/src/ghostpdl
[ { "end_line": 879, "function_name": "ps_font_def_func", "start_line": 402, "target_file": "/src/ghostpdl/pdf/pdf_fontps.c" } ]
Global-buffer-overflow READ {*}
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2107759574 INFO: Loaded 3 modules (182770 inline 8-bit counters): 13708 [0x7fed5ec4d9e0, 0x7fed5ec50f6c), 959 [0x7fed5ecaea40, 0x7fed5ecaedff), 168103 [0x2d9ce30, 0x2dc5ed7), INFO: Loaded 3 PC tables (182770 PCs): 13708 [0x7fed5ec50f70,0x7fed5ec8683...
cpp
3f5a2b75b2914b41ee600ab6226f1b4061bf267e
https://github.com/ArtifexSoftware/ghostpdl/commit/74da5c5f368ea314867b26abfe96b31e6d8e4e8f
A vulnerability exists where buffer overruns can occur when checking Type 1 font keys.
arvo:42616
n132/arvo:42616-vul
/src/ghostpdl
[ { "end_line": 773, "function_name": "pdfi_deref_compressed", "start_line": 548, "target_file": "/src/ghostpdl/pdf/pdf_deref.c" } ]
UNKNOWN READ
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1225916752 INFO: Loaded 3 modules (182702 inline 8-bit counters): 13708 [0x7f4cf6a479e0, 0x7f4cf6a4af6c), 959 [0x7f4cf6aa8a40, 0x7f4cf6aa8dff), 168035 [0x2d9be30, 0x2dc4e93), INFO: Loaded 3 PC tables (182702 PCs): 13708 [0x7f4cf6a4af70,0x7f4cf6a8083...
cpp
f63c8d854ea500a26c2514ee1f10a472a6459802
https://github.com/ArtifexSoftware/ghostpdl/commit/f6506e9d48c7abf82f711df87383af90b9797969
An off-by-one error exists in the check on the xref limit, as the size of the xref includes object 0. The stream object number is not properly checked against the size of the xref minus 1.
arvo:42633
n132/arvo:42633-vul
/src/ghostpdl
[ { "end_line": 131, "function_name": "cmap_endcodespacerange_func", "start_line": 95, "target_file": "/src/ghostpdl/pdf/pdf_cmap.c" } ]
Segv on unknown address
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1184979583 INFO: Loaded 3 modules (182798 inline 8-bit counters): 13708 [0x7fb4522a39e0, 0x7fb4522a6f6c), 959 [0x7fb452304a40, 0x7fb452304dff), 168131 [0x2d9ce30, 0x2dc5ef3), INFO: Loaded 3 PC tables (182798 PCs): 13708 [0x7fb4522a6f70,0x7fb4522dc83...
cpp
74da5c5f368ea314867b26abfe96b31e6d8e4e8f
https://github.com/ArtifexSoftware/ghostpdl/commit/47e220942dfc68de777b91db1c2b3e81d0275e1b
A vulnerability exists due to a missing bounds check against a hardcoded CMap value size, which can lead to out-of-bounds access.
arvo:42656
n132/arvo:42656-vul
/src/ghostpdl
[ { "end_line": 1081, "function_name": "pdfi_read_cff_dict", "start_line": 791, "target_file": "/src/ghostpdl/pdf/pdf_font1C.c" } ]
Memcpy-param-overlap
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3212098265 INFO: Loaded 3 modules (182802 inline 8-bit counters): 13708 [0x7f08f44e89e0, 0x7f08f44ebf6c), 959 [0x7f08f4549a40, 0x7f08f4549dff), 168135 [0x2d9ce30, 0x2dc5ef7), INFO: Loaded 3 PC tables (182802 PCs): 13708 [0x7f08f44ebf70,0x7f08f452183...
cpp
47e220942dfc68de777b91db1c2b3e81d0275e1b
https://github.com/ArtifexSoftware/ghostpdl/commit/0f8c0b5742577e31e419e84fbf0bcd42db0c5f41
null
arvo:42687
n132/arvo:42687-vul
/src/ghostpdl
[ { "end_line": 1139, "function_name": "pdfi_read_token", "start_line": 1000, "target_file": "/src/ghostpdl/pdf/pdf_int.c" } ]
UNKNOWN READ
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4018172000 INFO: Loaded 3 modules (182702 inline 8-bit counters): 13708 [0x7f94407679e0, 0x7f944076af6c), 959 [0x7f94407c8a40, 0x7f94407c8dff), 168035 [0x2d9be30, 0x2dc4e93), INFO: Loaded 3 PC tables (182702 PCs): 13708 [0x7f944076af70,0x7f94407a083...
cpp
f6506e9d48c7abf82f711df87383af90b9797969
https://github.com/ArtifexSoftware/ghostpdl/commit/3ce8214d8fc77be42eb6ad618c972113d4cb0d24
A vulnerability exists in the array read logic where, upon encountering a ']' without a corresponding initial mark ('['), the code attempts to construct an array from objects on the stack. If this fails, the stack is cleared and recovery is attempted, which discards objects expected by higher level code. This can lead ...
arvo:42729
n132/arvo:42729-vul
/src/selinux
[ { "end_line": 968, "function_name": "mls_semantic_level_expand", "start_line": 916, "target_file": "/src/selinux/libsepol/src/expand.c" } ]
UNKNOWN READ
selinux
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 550700852 INFO: Loaded 1 modules (10453 inline 8-bit counters): 10453 [0x6b94a0, 0x6bbd75), INFO: Loaded 1 PC tables (10453 PCs): 10453 [0x6bbd78,0x6e4ac8), /out/binpolicy-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:...
c
b2ba721ebba087123f5a527361e9796b6880ab85
https://github.com/SELinuxProject/selinux/commit/b78560fd372e01c11ca4f183f929d99b1f89f314
null
arvo:42736
n132/arvo:42736-vul
/src/ghostpdl
[ { "end_line": 668, "function_name": "pdf_cmap_open_file", "start_line": 639, "target_file": "/src/ghostpdl/pdf/pdf_cmap.c" } ]
Stack-buffer-overflow WRITE {*}
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3385388961 INFO: Loaded 3 modules (182726 inline 8-bit counters): 13708 [0x7f8f8dbf49e0, 0x7f8f8dbf7f6c), 959 [0x7f8f8dc55a40, 0x7f8f8dc55dff), 168059 [0x2d9be70, 0x2dc4eeb), INFO: Loaded 3 PC tables (182726 PCs): 13708 [0x7f8f8dbf7f70,0x7f8f8dc2d83...
cpp
2b8c6f669e9525fdc25aadffefdc5f8b978fb0e0
https://github.com/ArtifexSoftware/ghostpdl/commit/7f5d467726db47da4102a6d6f1d49e63d3c0b77f
A vulnerability exists where the code does not error if a CMap name exceeds the maximum file name length in the relevant file.
arvo:42741
n132/arvo:42741-vul
/src/selinux
[ { "end_line": 968, "function_name": "mls_semantic_level_expand", "start_line": 916, "target_file": "/src/selinux/libsepol/src/expand.c" } ]
Segv on unknown address
selinux
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1576441869 INFO: Loaded 1 modules (10453 inline 8-bit counters): 10453 [0x6b94a0, 0x6bbd75), INFO: Loaded 1 PC tables (10453 PCs): 10453 [0x6bbd78,0x6e4ac8), /out/binpolicy-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer...
c
b2ba721ebba087123f5a527361e9796b6880ab85
https://github.com/SELinuxProject/selinux/commit/b78560fd372e01c11ca4f183f929d99b1f89f314
null
arvo:42783
n132/arvo:42783-vul
/src/ghostpdl
[ { "end_line": 1459, "function_name": "pdfi_annot_draw_LE_one", "start_line": 1426, "target_file": "/src/ghostpdl/pdf/pdf_annot.c" } ]
Stack-buffer-overflow WRITE {*}
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1545580027 INFO: Loaded 3 modules (182709 inline 8-bit counters): 13708 [0x7f053a4189e0, 0x7f053a41bf6c), 959 [0x7f053a479a40, 0x7f053a479dff), 168042 [0x2d9be70, 0x2dc4eda), INFO: Loaded 3 PC tables (182709 PCs): 13708 [0x7f053a41bf70,0x7f053a45183...
cpp
66d5a16fb83bbddf63b11124b7c8e75946b8d84c
https://github.com/ArtifexSoftware/ghostpdl/commit/efd5f9a71af7bd5ab3816ba49edc8c3f7c370bae
null
arvo:42894
n132/arvo:42894-vul
/src/php-src
[ { "end_line": 1439, "function_name": "_zend_hash_del_el", "start_line": 1417, "target_file": "/src/php-src/Zend/zend_hash.c" } ]
Heap-use-after-free READ 4
php-src
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3506202830 INFO: Loaded 2 modules (171598 inline 8-bit counters): 142702 [0x98bd2a0, 0x98e000e), 28896 [0xf47b4200, 0xf47bb2e0), INFO: Loaded 2 PC tables (171598 PCs): 142702 [0x98e0010,0x99f6b80), 28896 [0xf47bb2e0,0xf47f39e0), /out/php-fuzz-traci...
c
8b235380347d6dbdfeabf96bbb5f05f446cd5954
https://github.com/php/php-src/commit/eee3b1d917591e5106aef9fd4fe93393e95fc13d
A vulnerability exists where Bucket->key is not removed before the destructor call, which may result in the destructor updating the same HashTable.
arvo:42908
n132/arvo:42908-vul
/src/ghostpdl
[ { "end_line": 318, "function_name": "pdfi_oc_is_ocg_visible", "start_line": 284, "target_file": "/src/ghostpdl/pdf/pdf_optcontent.c" } ]
Stack-buffer-overflow WRITE {*}
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2794310407 INFO: Loaded 3 modules (182720 inline 8-bit counters): 13708 [0x7ff662cf49e0, 0x7ff662cf7f6c), 959 [0x7ff662d55a40, 0x7ff662d55dff), 168053 [0x2d9be50, 0x2dc4ec5), INFO: Loaded 3 PC tables (182720 PCs): 13708 [0x7ff662cf7f70,0x7ff662d2d83...
cpp
4685df2e428b3a13273fb37b4e71a9177bc5a827
https://github.com/ArtifexSoftware/ghostpdl/commit/fabad29820734af831cf4f2ae6c4beb4179d4733
null
arvo:42917
n132/arvo:42917-vul
/src/ghostpdl
[ { "end_line": 233, "function_name": "general_endcidrange_func", "start_line": 146, "target_file": "/src/ghostpdl/pdf/pdf_cmap.c" } ]
UNKNOWN READ
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2212546870 INFO: Loaded 3 modules (182806 inline 8-bit counters): 13708 [0x7f2e42bc99e0, 0x7f2e42bccf6c), 959 [0x7f2e42c2aa40, 0x7f2e42c2adff), 168139 [0x2d9ce30, 0x2dc5efb), INFO: Loaded 3 PC tables (182806 PCs): 13708 [0x7f2e42bccf70,0x7f2e42c0283...
cpp
0f8c0b5742577e31e419e84fbf0bcd42db0c5f41
https://github.com/ArtifexSoftware/ghostpdl/commit/2c954310adc5753565a30dfe1b080f6a97ed4b4c
A missing bounds check against the hard coded size limit on CMap value sizes in the code allows for potential out-of-bounds access. One size limit is already checked, but the other is not, leading to a security vulnerability.
arvo:4296
n132/arvo:4296-vul
/src/open62541
[ { "end_line": 963, "function_name": "ExtensionObject_decodeBinaryContent", "start_line": 938, "target_file": "/src/open62541/src/ua_types_encoding_binary.c" } ]
Heap-double-free
open62541
asan
INFO: Seed: 525853605 INFO: Loaded 1 modules (4798 inline 8-bit counters): 4798 [0xa08668, 0xa09926), INFO: Loaded 1 PC tables (4798 PCs): 4798 [0xa09928,0xa1c508), /out/fuzz_binary_decode: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==1023==E...
cpp
23131fe8aec1143aceb587386f8d01b656d2a905
https://github.com/open62541/open62541/commit/9165b056a95f3ff5db23dbf9628acb1efee6f86b
null
arvo:42980
n132/arvo:42980-vul
/src/ghostpdl
[ { "end_line": 807, "function_name": "read_xref_section", "start_line": 660, "target_file": "/src/ghostpdl/pdf/pdf_xref.c" } ]
UNKNOWN READ
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3706346238 INFO: Loaded 3 modules (182723 inline 8-bit counters): 13708 [0x7fa861cbd9e0, 0x7fa861cc0f6c), 959 [0x7fa861d1ea40, 0x7fa861d1edff), 168056 [0x2d9be50, 0x2dc4ec8), INFO: Loaded 3 PC tables (182723 PCs): 13708 [0x7fa861cc0f70,0x7fa861cf683...
cpp
fabad29820734af831cf4f2ae6c4beb4179d4733
https://github.com/ArtifexSoftware/ghostpdl/commit/b0855fa22cd6ba447482ee2ae1c5e091428c4bc0
null
arvo:42998
n132/arvo:42998-vul
/src/ghostpdl
[ { "end_line": 1167, "function_name": "pdfi_Tj", "start_line": 1066, "target_file": "/src/ghostpdl/pdf/pdf_text.c" } ]
UNKNOWN READ
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3065195221 INFO: Loaded 3 modules (182862 inline 8-bit counters): 13708 [0x7ff44994e9e0, 0x7ff449951f6c), 959 [0x7ff4499afa40, 0x7ff4499afdff), 168195 [0x2d9ee30, 0x2dc7f33), INFO: Loaded 3 PC tables (182862 PCs): 13708 [0x7ff449951f70,0x7ff44998783...
cpp
b98c81c443fc9ea7c6351eff306da74765d2581e
https://github.com/ArtifexSoftware/ghostpdl/commit/4affbf8fe0e5982058c498a33689cc5182eab0ed
The vulnerability occurs in the text drawing operation, where the code relies on the operand stack reference for the string operand to remain valid throughout the operation. If a pdfi error occurs during text drawing, it can cause the entire stack to be cleared, resulting in the string object becoming invalid while sti...
arvo:4300
n132/arvo:4300-vul
/src/open62541
[ { "end_line": 963, "function_name": "ExtensionObject_decodeBinaryContent", "start_line": 938, "target_file": "/src/open62541/src/ua_types_encoding_binary.c" } ]
Heap-use-after-free READ {*}
open62541
asan
INFO: Seed: 1839632438 INFO: Loaded 1 modules (4798 inline 8-bit counters): 4798 [0xa08668, 0xa09926), INFO: Loaded 1 PC tables (4798 PCs): 4798 [0xa09928,0xa1c508), /out/fuzz_binary_decode: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==1024==...
cpp
23131fe8aec1143aceb587386f8d01b656d2a905
https://github.com/open62541/open62541/commit/9165b056a95f3ff5db23dbf9628acb1efee6f86b
null
arvo:43004
n132/arvo:43004-vul
/src/ghostpdl
[ { "end_line": 2040, "function_name": "pdfi_create_DeviceN", "start_line": 1680, "target_file": "/src/ghostpdl/pdf/pdf_colour.c" } ]
UNKNOWN READ
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3760540884 INFO: Loaded 3 modules (182787 inline 8-bit counters): 13708 [0x7f59570d19e0, 0x7f59570d4f6c), 959 [0x7f5957132a40, 0x7f5957132dff), 168120 [0x2d9ce50, 0x2dc5f08), INFO: Loaded 3 PC tables (182787 PCs): 13708 [0x7f59570d4f70,0x7f595710a83...
cpp
f046d29e51de5b185d054e3c88b5fa337a0e6ea2
https://github.com/ArtifexSoftware/ghostpdl/commit/20face1eeb418935307731d4e2e4bada028c7ba7
A countdown error occurs where, on error, an object is counted down, and later counted down again, eventually leading to an attempt to use a stale cache entry and causing a segmentation fault.
arvo:43012
n132/arvo:43012-vul
/src/ghostpdl
[ { "end_line": 338, "function_name": "pdfi_trans_set_mask", "start_line": 82, "target_file": "/src/ghostpdl/pdf/pdf_trans.c" } ]
Stack-buffer-overflow WRITE 4
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3694844542 INFO: Loaded 3 modules (182736 inline 8-bit counters): 13708 [0x7f91a0cf69e0, 0x7f91a0cf9f6c), 959 [0x7f91a0d57a40, 0x7f91a0d57dff), 168069 [0x2d9be50, 0x2dc4ed5), INFO: Loaded 3 PC tables (182736 PCs): 13708 [0x7f91a0cf9f70,0x7f91a0d2f83...
cpp
d066f5000d9a959708838c0ee471ffeb84d00bfc
https://github.com/ArtifexSoftware/ghostpdl/commit/321a00bd85a497c0b2424b906eb9e9d309e31321
A vulnerability exists in gs_begin_transparency_mask() where any supplied transfer function is used without validating that it is a 1-in, 1-out function. The code assumes a single output and only supplies a single float for the output value, but does not check if the transfer function actually has a single output befor...
arvo:43045
n132/arvo:43045-vul
/src/ghostpdl
[ { "end_line": 807, "function_name": "read_xref_section", "start_line": 660, "target_file": "/src/ghostpdl/pdf/pdf_xref.c" } ]
Heap-buffer-overflow READ 8
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 737349824 INFO: Loaded 3 modules (182723 inline 8-bit counters): 13708 [0x7f4288a059e0, 0x7f4288a08f6c), 959 [0x7f4288a66a40, 0x7f4288a66dff), 168056 [0x2d9be50, 0x2dc4ec8), INFO: Loaded 3 PC tables (182723 PCs): 13708 [0x7f4288a08f70,0x7f4288a3e830...
cpp
fabad29820734af831cf4f2ae6c4beb4179d4733
https://github.com/ArtifexSoftware/ghostpdl/commit/b0855fa22cd6ba447482ee2ae1c5e091428c4bc0
null
arvo:43156
n132/arvo:43156-vul
/src/ghostpdl
[ { "end_line": 230, "function_name": "general_endcidrange_func", "start_line": 143, "target_file": "/src/ghostpdl/pdf/pdf_cmap.c" } ]
Negative-size-param
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2488905627 INFO: Loaded 3 modules (182793 inline 8-bit counters): 13708 [0x7f853c0169e0, 0x7f853c019f6c), 959 [0x7f853c077a40, 0x7f853c077dff), 168126 [0x2d9cf10, 0x2dc5fce), INFO: Loaded 3 PC tables (182793 PCs): 13708 [0x7f853c019f70,0x7f853c04f83...
cpp
8bd3f7dba33341b622b60e13446a9cc101447e76
https://github.com/ArtifexSoftware/ghostpdl/commit/f7dc952613f4e614fae5fe859a5b6a90e3e17bf7
The graphics library uses a hard coded limit for the size of the prefix and key values in CMap. There is a vulnerability where prefix and key values are not checked to ensure they fit within these limits before writing, which can lead to buffer overflows.
arvo:43209
n132/arvo:43209-vul
/src/selinux
[ { "end_line": 792, "function_name": "cil_resolve_classcommon", "start_line": 745, "target_file": "/src/selinux/libsepol/cil/src/cil_resolve_ast.c" } ]
Heap-use-after-free READ 8
selinux
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/secilc-fuzzer ================================================================= ==557==ERROR: AddressSanitizer: heap-use-after-free on address 0x6070000000b0 at pc 0x0000005b5d4e bp 0x7ffcbdb6a840 sp 0x7ffcbdb6a838 READ of size 8 at 0x60700...
c
f0823bbbb58c5d5cd82a05b3c76106762a518bfa
https://github.com/SELinuxProject/selinux/commit/86cdb9f11915187cedee327cb833421374e500d1
A vulnerability exists in libsepol/cil where the class in a classcommon is not properly ensured to be a kernel class. Map classes use the same struct as kernel classes, but only kernel classes use the pointer to a common class. When resolving a classcommon, the code does not verify that the found class is a kernel clas...
arvo:4322
n132/arvo:4322-vul
/src/librawspeed
[ { "end_line": 49, "function_name": "SonyArw2Decompressor::SonyArw2Decompressor", "start_line": 34, "target_file": "/src/librawspeed/src/librawspeed/decompressors/SonyArw2Decompressor.cpp" } ]
Use-of-uninitialized-value
librawspeed
msan
INFO: Seed: 246111057 INFO: Loaded 1 modules (1042 inline 8-bit counters): 1042 [0x9eeae0, 0x9eeef2), INFO: Loaded 1 PC tables (1042 PCs): 1042 [0x9eeef8,0x9f3018), /out/SonyArw2DecompressorFuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 ...
cpp
06e81c409f091e17e290635fe41c909952f798bc
https://github.com/darktable-org/rawspeed/commit/e1b849034261580c2e4e8598408fc6fba8eec91f
The SonyArw2Decompressor does not ensure that the width is a multiple of 32.
arvo:43255
n132/arvo:43255-vul
/src/ghostpdl
[ { "end_line": 1187, "function_name": "pdf_ps_put_oper_func", "start_line": 1166, "target_file": "/src/ghostpdl/pdf/pdf_fontps.c" } ]
UNKNOWN READ
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3489962186 INFO: Loaded 3 modules (182792 inline 8-bit counters): 13708 [0x7f2ab8e4e9e0, 0x7f2ab8e51f6c), 959 [0x7f2ab8eafa40, 0x7f2ab8eafdff), 168125 [0x2d9cf10, 0x2dc5fcd), INFO: Loaded 3 PC tables (182792 PCs): 13708 [0x7f2ab8e51f70,0x7f2ab8e8783...
cpp
3d7bcf6084105e5f577a760bc84675cc62617eb5
https://github.com/ArtifexSoftware/ghostpdl/commit/8bd3f7dba33341b622b60e13446a9cc101447e76
A vulnerability exists in Type 1 font handling where the code does not ensure that the index is greater than or equal to 0 before writing to the Encoding array, potentially leading to out-of-bounds writes.
arvo:43268
n132/arvo:43268-vul
/src/ghostpdl
[ { "end_line": 964, "function_name": "pdfi_dereference", "start_line": 801, "target_file": "/src/ghostpdl/pdf/pdf_deref.c" } ]
Heap-use-after-free READ 4
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3684875037 INFO: Loaded 3 modules (182770 inline 8-bit counters): 13708 [0x7f9404e4e9e0, 0x7f9404e51f6c), 959 [0x7f9404eafa40, 0x7f9404eafdff), 168103 [0x2d9de30, 0x2dc6ed7), INFO: Loaded 3 PC tables (182770 PCs): 13708 [0x7f9404e51f70,0x7f9404e8783...
cpp
53a5c7795c5d4b641dd8412d0087a8c4442498ab
https://github.com/ArtifexSoftware/ghostpdl/commit/3f5a2b75b2914b41ee600ab6226f1b4061bf267e
A broken PDF file causes a repair to occur while reading an object and dereferencing an indirect reference. The repair process discards and rebuilds the xref table, which invalidates the reference to the xref entry. This results in the reference becoming outdated after reading an object.
arvo:43365
n132/arvo:43365-vul
/src/zstd
[ { "end_line": 289, "function_name": "ZSTD_litLengthPrice", "start_line": 270, "target_file": "/src/zstd/lib/compress/zstd_opt.c" } ]
Global-buffer-overflow READ 1
zstd
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/simple_compress ================================================================= ==755==ERROR: AddressSanitizer: global-buffer-overflow on address 0x0000008f5224 at pc 0x000000704439 bp 0x7ffcc8320510 sp 0x7ffcc8320508 READ of size 1 at 0x...
c
844c53ed75e199b969633dacb4ef455dedf6eaef
https://github.com/facebook/zstd/commit/0677b26b6d15f35f027eaabf11cfaa0af541f8c8
A security vulnerability exists in the optimal parser in the opt module, where improper handling of input can lead to unexpected behavior.
arvo:43370
n132/arvo:43370-vul
/src/wolfmqtt
[ { "end_line": 1175, "function_name": "MqttClient_WaitType", "start_line": 796, "target_file": "/src/wolfmqtt/src/mqtt_client.c" } ]
UNKNOWN READ
wolfmqtt
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3542111150 INFO: Loaded 1 modules (21655 inline 8-bit counters): 21655 [0x7f2830, 0x7f7cc7), INFO: Loaded 1 PC tables (21655 PCs): 21655 [0x731508,0x785e78), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:...
cpp
d937a81af6f94e8a0918222b267b462eed218a9a
https://github.com/wolfSSL/wolfMQTT/commit/17eb652346678bd189742d7e45c946cae649d859
null
arvo:43372
n132/arvo:43372-vul
/src/binutils-gdb
[ { "end_line": 13295, "function_name": "OP_VEX", "start_line": 13147, "target_file": "/src/binutils-gdb/opcodes/i386-dis.c" } ]
Use-of-uninitialized-value
binutils-gdb
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1819473320 INFO: Loaded 1 modules (223481 inline 8-bit counters): 223481 [0x35083b8, 0x353ecb1), INFO: Loaded 1 PC tables (223481 PCs): 223481 [0x2eb8788,0x3221718), /out/fuzz_disas_ext-bfd_arch_i386: Running 1 inputs 1 time(s) each. Running: /tmp/...
c
0b35f123c200522998a81335dc218551ca7b3d92
https://github.com/bminor/binutils-gdb/commit/ce20459e162175710d8ef56118fc34edabfdce5e
A vulnerability exists in i386-dis.c where SIB (Scale-Index-Base) information is used without verifying its presence. The struct instr_info lacks a has_sib field, leading to potential misuse of SIB data. Functions such as get_sib, OP_E_memory, and OP_VEX access or rely on SIB information without checking if it is valid...
arvo:43414
n132/arvo:43414-vul
/src/assimp
[ { "end_line": 142, "function_name": "IOSystem2Unzip::opendisk", "start_line": 122, "target_file": "/src/assimp/code/Common/ZipArchiveIOSystem.cpp" } ]
Heap-buffer-overflow READ 1
assimp
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 364236641 INFO: Loaded 1 modules (209214 inline 8-bit counters): 209214 [0x1cdc590, 0x1d0f6ce), INFO: Loaded 1 PC tables (209214 PCs): 209214 [0x1d0f6d0,0x2040ab0), /out/assimp_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Info, T0: L...
cpp
1bf5dd2731718e7243c42e6c0dfb175c3f1d0e57
https://github.com/assimp/assimp/commit/c14eccefaf0ba0286d2e9f3ae7b8dd1f3e055a27
A bug exists where the condition 'i >= 0' is always true if 'disk_filename' does not contain a dot (.), causing 'i' to overflow. This affects the for loop's intended operation.
arvo:4345
n132/arvo:4345-vul
/src/open62541
[ { "end_line": 963, "function_name": "ExtensionObject_decodeBinaryContent", "start_line": 938, "target_file": "/src/open62541/src/ua_types_encoding_binary.c" } ]
Heap-double-free
open62541
asan
INFO: Seed: 678907315 INFO: Loaded 1 modules (4791 inline 8-bit counters): 4791 [0xa07668, 0xa0891f), INFO: Loaded 1 PC tables (4791 PCs): 4791 [0xa08920,0xa1b490), /out/fuzz_binary_message: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==1024==...
cpp
23131fe8aec1143aceb587386f8d01b656d2a905
https://github.com/open62541/open62541/commit/9165b056a95f3ff5db23dbf9628acb1efee6f86b
null
arvo:4346
n132/arvo:4346-vul
/src/open62541
[ { "end_line": 963, "function_name": "ExtensionObject_decodeBinaryContent", "start_line": 938, "target_file": "/src/open62541/src/ua_types_encoding_binary.c" } ]
Heap-use-after-free READ 2
open62541
asan
INFO: Seed: 436245016 INFO: Loaded 1 modules (4798 inline 8-bit counters): 4798 [0xa08668, 0xa09926), INFO: Loaded 1 PC tables (4798 PCs): 4798 [0xa09928,0xa1c508), /out/fuzz_binary_decode: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==1024==E...
cpp
23131fe8aec1143aceb587386f8d01b656d2a905
https://github.com/open62541/open62541/commit/9165b056a95f3ff5db23dbf9628acb1efee6f86b
null
arvo:43461
n132/arvo:43461-vul
/src/c-blosc2
[ { "end_line": 701, "function_name": "ndlz4_decompress", "start_line": 512, "target_file": "/src/c-blosc2/plugins/codecs/ndlz/ndlz4x4.c" } ]
UNKNOWN WRITE
c-blosc2
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1445881294 INFO: Loaded 1 modules (47541 inline 8-bit counters): 47541 [0x11d893c, 0x11e42f1), INFO: Loaded 1 PC tables (47541 PCs): 47541 [0xebd6d8,0xf77228), /out/decompress_chunk_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc MemoryS...
c
4460dfe69d7a947c5278a756113005cdf9c1fef9
https://github.com/Blosc/c-blosc2/commit/d77d3ebe14d6fb7085fde26c30678a82f6fe562c
null
arvo:43519
n132/arvo:43519-vul
/src/c-blosc2
[ { "end_line": 578, "function_name": "ndlz8_decompress", "start_line": 429, "target_file": "/src/c-blosc2/plugins/codecs/ndlz/ndlz8x8.c" } ]
Heap-buffer-overflow READ 8
c-blosc2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 842235564 INFO: Loaded 1 modules (48555 inline 8-bit counters): 48555 [0xf2e680, 0xf3a42b), INFO: Loaded 1 PC tables (48555 PCs): 48555 [0xc10110,0xccdbc0), /out/decompress_chunk_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==========...
c
79b6995ab82e09ccd1bd50f50e6af1ef40280c4c
https://github.com/Blosc/c-blosc2/commit/ce2e8fe5f2fdb3779505935f05f93481d4905e62
null
arvo:43599
n132/arvo:43599-vul
/src/ghostpdl
[ { "end_line": 1100, "function_name": "pdfi_read_cff_dict", "start_line": 791, "target_file": "/src/ghostpdl/pdf/pdf_font1C.c" } ]
UNKNOWN READ
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 826942434 INFO: Loaded 3 modules (182934 inline 8-bit counters): 13708 [0x7f45eb2a69e0, 0x7f45eb2a9f6c), 959 [0x7f45eb307a40, 0x7f45eb307dff), 168267 [0x2da2170, 0x2dcb2bb), INFO: Loaded 3 PC tables (182934 PCs): 13708 [0x7f45eb2a9f70,0x7f45eb2df830...
cpp
7a92e712874a44fe77bfe220ea695391661a4988
https://github.com/ArtifexSoftware/ghostpdl/commit/3536cb075b8d7a3cd2bbe62e8ef879f56be60700
A vulnerability exists in the CFF dictionary code where file offsets are not validated for negative values. The code checks for values that are too large but fails to check for negative offset values.
arvo:43680
n132/arvo:43680-vul
/src/ghostpdl
[ { "end_line": 215, "function_name": "pdf_ps_stack_push", "start_line": 176, "target_file": "/src/ghostpdl/pdf/pdf_fontps.h" } ]
UNKNOWN READ
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3620528580 INFO: Loaded 3 modules (182961 inline 8-bit counters): 13708 [0x7f5127ea69e0, 0x7f5127ea9f6c), 959 [0x7f5127f07a40, 0x7f5127f07dff), 168294 [0x2da2170, 0x2dcb2d6), INFO: Loaded 3 PC tables (182961 PCs): 13708 [0x7f5127ea9f70,0x7f5127edf83...
cpp
dc6a54dd6a94ce208cda076fab3fd99c898bbe3a
https://github.com/ArtifexSoftware/ghostpdl/commit/e5187d467a4560cbd0b74a682fc3e71cb64edcc0
The minimal PS-like interpreter in pdfi allows the operand stack to be extended, but the code misses handling of memory allocation failure for the extended stack, leading to a potential vulnerability when an out-of-memory error occurs during stack extension.
arvo:43722
n132/arvo:43722-vul
/src/imagemagick
[ { "end_line": 1596, "function_name": "GetConstantColour", "start_line": 1520, "target_file": "/src/imagemagick/MagickCore/fx.c" } ]
Heap-buffer-overflow READ 1
imagemagick
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2948215354 INFO: Loaded 1 modules (227920 inline 8-bit counters): 227920 [0x1f4dd90, 0x1f857e0), INFO: Loaded 1 PC tables (227920 PCs): 227920 [0x1f857e0,0x22ffce0), /out/encoder_label_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ====...
cpp
0a0e0e44bd7e43c767ef594b9059a8c09c8a4943
https://github.com/imagemagick/imagemagick/commit/def69fd7bee47398269378be88d16e8be4328c7a
null
arvo:43841
n132/arvo:43841-vul
/src/leptonica
[ { "end_line": 137, "function_name": "LLVMFuzzerTestOneInput", "start_line": 3, "target_file": "/src/leptonica/prog/fuzzing/pix3_fuzzer.cc" } ]
Stack-buffer-overflow READ 4
leptonica
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1248412791 INFO: Loaded 1 modules (116784 inline 8-bit counters): 116784 [0x16365b0, 0x1652de0), INFO: Loaded 1 PC tables (116784 PCs): 116784 [0x1652de0,0x181b0e0), /out/pix3_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =============...
cpp
a8f9da31004d98e1267860edfda1cb8c9f8b29e9
https://github.com/DanBloomberg/leptonica/commit/748723a795e48ce0ec0ce2fa78082ef0c62aac9c
null
arvo:43847
n132/arvo:43847-vul
/src/PcapPlusPlus
[ { "end_line": 149, "function_name": "IDnsResource::decodeName", "start_line": 34, "target_file": "/src/PcapPlusPlus/Packet++/src/DnsResource.cpp" } ]
Stack-buffer-overflow WRITE 1
PcapPlusPlus
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2572195643 INFO: Loaded 1 modules (33189 inline 8-bit counters): 33189 [0x9b3c38, 0x9bbddd), INFO: Loaded 1 PC tables (33189 PCs): 33189 [0x9bbde0,0xa3d830), /out/FuzzTarget: Running 1 inputs 1 time(s) each. Running: /tmp/poc ======================...
cpp
847ba68f02c2c5e7af43f39c1b5b81fa7e0c0374
https://github.com/seladb/PcapPlusPlus/commit/2295654a792beed3d2b2e81d346271089fa1cd02
A stack-buffer-overflow WRITE vulnerability exists in pcpp::IDnsResource::decodeName, where if the decoded name exactly fits the 256 character buffer and the last character ([255]) is '.', the resultPtr points just past the buffer, causing resultPtr[0] = 0; to perform an off-by-one write beyond the buffer boundary.
arvo:43895
n132/arvo:43895-vul
/src/imagemagick
[ { "end_line": 2277, "function_name": "GetOperand", "start_line": 1984, "target_file": "/src/imagemagick/MagickCore/fx.c" } ]
Heap-buffer-overflow READ 1
imagemagick
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/encoder_label_fuzzer ================================================================= ==313283==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000019f8 at pc 0x0000009bd415 bp 0x7fff7a518e50 sp 0x7fff7a518e48 READ of size 1...
cpp
4a0226a0b05795da1b9f018d4322c7aaf314e41b
https://github.com/imagemagick/imagemagick/commit/d6b1d74cbd6967e070ee5a614cc0b37dbfb4a662
null
arvo:44008
n132/arvo:44008-vul
/src/leptonica
[ { "end_line": 3407, "function_name": "pixCountArbInRect", "start_line": 3341, "target_file": "/src/leptonica/src/pix3.c" } ]
Heap-buffer-overflow READ 1
leptonica
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4134099905 INFO: Loaded 1 modules (116786 inline 8-bit counters): 116786 [0x16365f0, 0x1652e22), INFO: Loaded 1 PC tables (116786 PCs): 116786 [0x1652e28,0x181b148), /out/pix3_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =============...
cpp
748723a795e48ce0ec0ce2fa78082ef0c62aac9c
https://github.com/DanBloomberg/leptonica/commit/f694a026b400a5f501f055e536eff2bfaa3c1bc1
An overflow occurs in the function pixCountArbInRect() in pix3_fuzzer.cc due to a bug in pixel access, where the wrong depth is used. The function is intended for use on all pix with depth less than or equal to 8.
arvo:44034
n132/arvo:44034-vul
/src/ghostpdl
[ { "end_line": 364, "function_name": "pdfi_open_CIDFont_substitute_file", "start_line": 171, "target_file": "/src/ghostpdl/pdf/pdf_font.c" } ]
Stack-buffer-overflow WRITE {*}
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 817253842 INFO: Loaded 3 modules (183029 inline 8-bit counters): 13708 [0x7fb6bdb2f9e0, 0x7fb6bdb32f6c), 959 [0x7fb6bdb90a40, 0x7fb6bdb90dff), 168362 [0x2da40b0, 0x2dcd25a), INFO: Loaded 3 PC tables (183029 PCs): 13708 [0x7fb6bdb32f70,0x7fb6bdb68830...
cpp
c2e848fe05d9ffa99f61285bb1f33f717844abcb
https://github.com/ArtifexSoftware/ghostpdl/commit/bd747c5c2d320cd80ce08f16627c70a77ff67978
A vulnerability exists in the CIDFont fallback mechanism where the buffer may not be large enough when attempting to use the fallback name of <Registry>-<Ordering> from the CIDSystemInfo dictionary.
arvo:44151
n132/arvo:44151-vul
/src/ghostpdl
[ { "end_line": 1315, "function_name": "pdfi_TJ", "start_line": 1169, "target_file": "/src/ghostpdl/pdf/pdf_text.c" } ]
Segv on unknown address
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3441442508 INFO: Loaded 3 modules (183058 inline 8-bit counters): 13708 [0x7fdc9a3479e0, 0x7fdc9a34af6c), 959 [0x7fdc9a3a8a40, 0x7fdc9a3a8dff), 168391 [0x2da50f0, 0x2dce2b7), INFO: Loaded 3 PC tables (183058 PCs): 13708 [0x7fdc9a34af70,0x7fdc9a38083...
cpp
cd92dea2720e365892000bd6f0c826ffaa871a84
https://github.com/ArtifexSoftware/ghostpdl/commit/85fa6e1874189a349e9842fbf1ed90e2fd474588
The function pdfi_TJ() holds a local, reference-counted reference to the operand array. If an error occurs, the operand stack reference to the array can disappear, causing the object to be freed while it is still in use.
arvo:44199
n132/arvo:44199-vul
/src/libplist
[ { "end_line": 745, "function_name": "plist_from_json", "start_line": 674, "target_file": "/src/libplist/src/jplist.c" } ]
Heap-buffer-overflow READ 4
libplist
asan
================================================================= ==9661==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x621000002500 at pc 0x0000004dbdf9 bp 0x7ffcabd749b0 sp 0x7ffcabd749a8 READ of size 4 at 0x621000002500 thread T0 SCARINESS: 17 (4-byte-read-heap-buffer-overflow) #0 0x4dbdf8 in parse_...
cpp
25f2f01c2693da8cc651d80debda9ad61fa17743
https://github.com/libimobiledevice/libplist/commit/924ba961d68f6833f617fd3ad03c40f63f287142
An out-of-bounds read occurs in jplist when the JSMN token index is not properly validated to ensure it is within the valid range.
arvo:44221
n132/arvo:44221-vul
/src/gpac
[ { "end_line": 1138, "function_name": "diST_box_read", "start_line": 1129, "target_file": "/src/gpac/src/isomedia/box_code_3gpp.c" } ]
Stack-buffer-overflow WRITE 1
gpac
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1160697464 INFO: Loaded 1 modules (201858 inline 8-bit counters): 201858 [0x1e77208, 0x1ea868a), INFO: Loaded 1 PC tables (201858 PCs): 201858 [0x1ea8690,0x21bceb0), /out/fuzz_parse: Running 1 inputs 1 time(s) each. Running: /tmp/poc [BS] Atte...
c
1773b7a34bc08734aee7d3f5dfe65d06389fe15a
https://github.com/gpac/gpac/commit/3dbe11b37d65c8472faf0654410068e5500b3adb
null
arvo:44264
n132/arvo:44264-vul
/src/ghostpdl
[ { "end_line": 377, "function_name": "pdfi_pscript_interpret", "start_line": 165, "target_file": "/src/ghostpdl/pdf/pdf_fontps.c" } ]
Heap-buffer-overflow READ 1
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 485676650 INFO: Loaded 3 modules (183065 inline 8-bit counters): 13708 [0x7f5c34ae89e0, 0x7f5c34aebf6c), 959 [0x7f5c34b49a40, 0x7f5c34b49dff), 168398 [0x2da50f0, 0x2dce2be), INFO: Loaded 3 PC tables (183065 PCs): 13708 [0x7f5c34aebf70,0x7f5c34b21830...
cpp
5db3e3fa6a3671fc95ebcf40b245a2f213cd9d6f
https://github.com/ArtifexSoftware/ghostpdl/commit/3c75a977879b066c20f6c9587481ac93e476630b
null
arvo:44406
n132/arvo:44406-vul
/src/ghostpdl
[ { "end_line": 997, "function_name": "ps_font_eexec_func", "start_line": 976, "target_file": "/src/ghostpdl/pdf/pdf_fontps.c" } ]
Heap-buffer-overflow READ 1
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4212362696 INFO: Loaded 3 modules (183094 inline 8-bit counters): 13708 [0x7f795446c9e0, 0x7f795446ff6c), 959 [0x7f79544cda40, 0x7f79544cddff), 168427 [0x2da7050, 0x2dd023b), INFO: Loaded 3 PC tables (183094 PCs): 13708 [0x7f795446ff70,0x7f79544a583...
cpp
a16d4303a172eb1f4f0e6c0133a728fe5f78c07e
https://github.com/ArtifexSoftware/ghostpdl/commit/a07b2982ac60f0e563e6a282bf2f8fdc81ae3c1c
A vulnerability exists in the eexec decoding process due to insufficient buffer bounds checking in the relevant code. The function fails to properly check for a zero length buffer in addition to a negative buffer size, which can lead to security issues.
arvo:44432
n132/arvo:44432-vul
/src/libredwg
[ { "end_line": 1289, "function_name": "read_file_header", "start_line": 1211, "target_file": "/src/libredwg/src/decode_r2007.c" } ]
Stack-buffer-overflow WRITE 1
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3452877367 INFO: Loaded 1 modules (555191 inline 8-bit counters): 555191 [0x4942aa0, 0x49ca357), INFO: Loaded 1 PC tables (555191 PCs): 555191 [0x3e3f4c8,0x46b8038), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
c
259072193fa0562587b3d971adb949aea3887091
https://github.com/LibreDWG/libredwg/commit/fe03c5a89cbd441b6840335bd484cf08bc65c7c4
A stack-buffer-overflow exists in decompress_rNUMBER due to passing `sizeof (r2007_file_header) + 1` in `read_file_header`, which leads to an off-by-one write buffer overflow.
arvo:44439
n132/arvo:44439-vul
/src/libredwg
[ { "end_line": 12096, "function_name": "dxf_tables_read", "start_line": 11941, "target_file": "/src/libredwg/src/in_dxf.c" } ]
Heap-buffer-overflow READ 8
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 377082652 INFO: Loaded 1 modules (471864 inline 8-bit counters): 471864 [0x4354380, 0x43c76b8), INFO: Loaded 1 PC tables (471864 PCs): 471864 [0x37b3930,0x3ee6cb0), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc =================...
c
78ffe2a4064935824b274d38cae3429c940bdc0b
https://github.com/LibreDWG/libredwg/commit/0a390fa7291ee439d2bb2bed998e76302e539b77
null
arvo:44457
n132/arvo:44457-vul
/src/imagemagick
[ { "end_line": 2358, "function_name": "ProcessTernaryOpr", "start_line": 2309, "target_file": "/src/imagemagick/MagickCore/fx.c" } ]
Heap-buffer-overflow READ 4
imagemagick
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 78070340 INFO: Loaded 1 modules (228358 inline 8-bit counters): 228358 [0x1f55490, 0x1f8d096), INFO: Loaded 1 PC tables (228358 PCs): 228358 [0x1f8d098,0x23090f8), /out/encoder_label_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ======...
cpp
f578dad6151beb51747e7928770975ccddf064b6
https://github.com/imagemagick/imagemagick/commit/a9bd4c0e16d034f733c93d5d1b022f9e5f78e70e
null