task_id
stringlengths
8
10
docker_image
stringlengths
17
19
basedir
stringclasses
157 values
target_functions
listlengths
1
3
crash_type
stringclasses
85 values
project_name
stringclasses
157 values
sanitizer
stringclasses
3 values
sanitizer_output
stringlengths
1.13k
6.5M
language
stringclasses
2 values
vuln_commit
stringlengths
40
40
fix
stringlengths
69
110
vulnerability_description
stringlengths
38
824
arvo:44503
n132/arvo:44503-vul
/src/libcoap
[ { "end_line": 23, "function_name": "LLVMFuzzerTestOneInput", "start_line": 6, "target_file": "/src/libcoap/tests/oss-fuzz/pdu_parse_target.c" } ]
Heap-buffer-overflow READ 1
libcoap
asan
Reading 260 bytes from /tmp/poc Apr 10 12:17:04.374 DEBG coap_pdu_parse: UDP version not supported ================================================================= ==11469==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x612000000146 at pc 0x0000004ecdc4 bp 0x7fffa50b0da0 sp 0x7fffa50b0d98 READ of size 1 at...
c
a2e0046c802fece506df2edf05df4969613ab133
https://github.com/obgm/libcoap/commit/ba585f848ff527f2181f8f2bfd40520563e9e68d
A vulnerability exists in pdu_parse_target.c where the result of coap_pdu_parse() is not checked. If coap_pdu_parse() returns 0, the contents of pdu are undefined and must not be processed, leading to potential undefined behavior when the contents are used without verifying successful parsing.
arvo:4451
n132/arvo:4451-vul
/src/librawspeed
[ { "end_line": 145, "function_name": "LJpegDecompressor::decodeN", "start_line": 97, "target_file": "/src/librawspeed/src/librawspeed/decompressors/LJpegDecompressor.cpp" } ]
Use-after-poison WRITE 2
librawspeed
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/LJpegDecompressorFuzzer < INPUT_FILE or /out/LJpegDecompressorFuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags...
cpp
0b5389f22c17082864de100a6efedbaa4b0d894f
https://github.com/darktable-org/rawspeed/commit/580add2219c696e425087bc61b952f4ccb295f09
A vulnerability exists in LJpegDecompressor::decodeN() due to improper clipping of the current slice width.
arvo:44574
n132/arvo:44574-vul
/src/libplist
[ { "end_line": 541, "function_name": "parse_primitive", "start_line": 469, "target_file": "/src/libplist/src/jplist.c" } ]
Heap-buffer-overflow READ 1
libplist
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3695576432 INFO: Loaded 1 modules (2744 inline 8-bit counters): 2744 [0x5f7450, 0x5f7f08), INFO: Loaded 1 PC tables (2744 PCs): 2744 [0x5f7f08,0x602a88), /out/jplist_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =======================...
cpp
c035c6bcea282fb31c08eddae73b16fb8e5543f0
https://github.com/libimobiledevice/libplist/commit/7d2cdc6f378f1d6d5631b7739398dd50bea62663
An out-of-bounds read occurs in the jplist module due to an incorrect bounds check.
arvo:44610
n132/arvo:44610-vul
/src/ghostpdl
[ { "end_line": 408, "function_name": "pdfi_process_xref_stream", "start_line": 146, "target_file": "/src/ghostpdl/pdf/pdf_xref.c" } ]
Heap-buffer-overflow WRITE 8
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4011093845 INFO: Loaded 3 modules (183035 inline 8-bit counters): 13708 [0x7fb5fd4d89e0, 0x7fb5fd4dbf6c), 959 [0x7fb5fd539a40, 0x7fb5fd539dff), 168368 [0x2da5030, 0x2dce1e0), INFO: Loaded 3 PC tables (183035 PCs): 13708 [0x7fb5fd4dbf70,0x7fb5fd51183...
cpp
e83a349bf7a7dee1dd31a1c35b0d6f52ddd23c16
https://github.com/ArtifexSoftware/ghostpdl/commit/30770fce40f0b47c4da1c41e187b45f9f59edc63
A vulnerability exists where Xref streams with a declared /Size of 0 are still processed, even though they have no entries, instead of stopping as expected.
arvo:44659
n132/arvo:44659-vul
/src/unicorn
[ { "end_line": 171, "function_name": "x86_reg_reset", "start_line": 68, "target_file": "/src/unicorn/qemu/target/i386/unicorn.c" } ]
UNKNOWN READ
unicorn
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 349156410 INFO: Loaded 1 modules (444711 inline 8-bit counters): 444711 [0x3dc0970, 0x3e2d297), INFO: Loaded 1 PC tables (444711 PCs): 444711 [0x3e2d298,0x44f6508), /out/fuzz_emu_x86_32: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSan...
cpp
a91319908d67644cc4cc9befc8bdb1eb04ed083e
https://github.com/unicorn-engine/unicorn/commit/14404ef04b55662f605c00b31a479e50caff72ab
The vulnerability is that cpuid results are hardcoded in the code, rather than being set by the selected CPU. This can lead to incorrect or insecure behavior if the cpuid values do not match the actual CPU configuration.
arvo:44683
n132/arvo:44683-vul
/src/wolfmqtt
[ { "end_line": 1240, "function_name": "MqttClient_WaitType", "start_line": 830, "target_file": "/src/wolfmqtt/src/mqtt_client.c" } ]
Segv on unknown address
wolfmqtt
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2895515573 INFO: Loaded 1 modules (21597 inline 8-bit counters): 21597 [0x91cde0, 0x92223d), INFO: Loaded 1 PC tables (21597 PCs): 21597 [0x861d98,0x8b6368), /out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc MemorySanitizer:D...
cpp
eeecd182b2a5ee4d84955f36c24a307d641e5191
https://github.com/wolfSSL/wolfMQTT/commit/ddb274170da451ff15bc4dcdab0c9bfbaab19468
null
arvo:44695
n132/arvo:44695-vul
/src/libplist
[ { "end_line": 541, "function_name": "parse_primitive", "start_line": 469, "target_file": "/src/libplist/src/jplist.c" } ]
Heap-buffer-overflow READ 1
libplist
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1095530267 INFO: Loaded 1 modules (2744 inline 8-bit counters): 2744 [0x5f5450, 0x5f5f08), INFO: Loaded 1 PC tables (2744 PCs): 2744 [0x5f5f08,0x600a88), /out/jplist_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =======================...
cpp
38759317cbda07288f48268cf0c1bebaf54ef869
https://github.com/libimobiledevice/libplist/commit/106c4ee7f53ef800a82fce9638f29756e8b78640
An out-of-bounds read occurs in the jplist module due to an incorrect bounds check.
arvo:44791
n132/arvo:44791-vul
/src/fmt
[ { "end_line": 2147, "function_name": "do_write_float", "start_line": 2042, "target_file": "/src/fmt/include/fmt/format.h" } ]
Heap-buffer-overflow WRITE 1
fmt
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1472619042 INFO: Loaded 1 modules (73387 inline 8-bit counters): 73387 [0xe7dd18, 0xe8fbc3), INFO: Loaded 1 PC tables (73387 PCs): 73387 [0xc958a8,0xdb4358), /out/chrono-duration-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==========...
cpp
0742606f199d9839123d36c5cb65c548f5f46f6e
https://github.com/fmtlib/fmt/commit/86477f7ecc1606e15abae1ff784e6b0c55d99619
null
arvo:44846
n132/arvo:44846-vul
/src/aom
[ { "end_line": 1401, "function_name": "decode_partition", "start_line": 1253, "target_file": "/src/aom/av1/decoder/decodeframe.c" } ]
UNKNOWN READ
aom
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1343573519 INFO: Loaded 1 modules (58184 inline 8-bit counters): 58184 [0x953a50, 0x961d98), INFO: Loaded 1 PC tables (58184 PCs): 58184 [0x961d98,0xa45218), /out/av1_dec_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorS...
cpp
493cf67c62441838a56c5ea6f8dfbf6777e3cee7
https://aomedia.googlesource.com/aom/+/ee9dbcb018f20f16348b22bc413dec1c9d901183%5E%21/
null
arvo:44855
n132/arvo:44855-vul
/src/ghostpdl
[ { "end_line": 922, "function_name": "load_glyph", "start_line": 547, "target_file": "/src/ghostpdl/base/fapi_ft.c" } ]
UNKNOWN READ
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 340911018 INFO: Loaded 3 modules (183131 inline 8-bit counters): 13708 [0x7fd8b1ec89e0, 0x7fd8b1ecbf6c), 959 [0x7fd8b1f29a40, 0x7fd8b1f29dff), 168464 [0x3130030, 0x3159240), INFO: Loaded 3 PC tables (183131 PCs): 13708 [0x7fd8b1ecbf70,0x7fd8b1f01830...
cpp
55204831fe58540c6e573e9fa63f1a30a0fb83cb
https://github.com/ArtifexSoftware/ghostpdl/commit/c8051ae666672cb7ca39531e28ec85636e1ce6d5
A vulnerability exists where, in an "in extremis" fallback case, the return code from Freetype is not acted upon, leaving a partially initialised glyph bitmap in memory. This bitmap is subsequently used, which results in a crash.
arvo:44862
n132/arvo:44862-vul
/src/aom
[ { "end_line": 1401, "function_name": "decode_partition", "start_line": 1253, "target_file": "/src/aom/av1/decoder/decodeframe.c" } ]
Heap-buffer-overflow WRITE 4
aom
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/av1_dec_fuzzer ================================================================= ==3206==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x615000000554 at pc 0x000000522ea1 bp 0x7ffe29b94600 sp 0x7ffe29b945f8 WRITE of size 4 at 0x6...
cpp
493cf67c62441838a56c5ea6f8dfbf6777e3cee7
https://aomedia.googlesource.com/aom/+/ee9dbcb018f20f16348b22bc413dec1c9d901183%5E%21/
null
arvo:44983
n132/arvo:44983-vul
/src/ghostpdl
[ { "end_line": 1445, "function_name": "pdfi_initialise_Decryption", "start_line": 1358, "target_file": "/src/ghostpdl/pdf/pdf_sec.c" } ]
Stack-buffer-overflow READ {*}
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 914153380 INFO: Loaded 3 modules (183097 inline 8-bit counters): 13708 [0x7f2e06ccf9e0, 0x7f2e06cd2f6c), 959 [0x7f2e06d30a40, 0x7f2e06d30dff), 168430 [0x312f030, 0x315821e), INFO: Loaded 3 PC tables (183097 PCs): 13708 [0x7f2e06cd2f70,0x7f2e06d08830...
cpp
91c77c64d4b478f4bd0cf540523c1591bc49b9ee
https://github.com/ArtifexSoftware/ghostpdl/commit/4a79f807fd13bd0e53bd1aad6f26066be8bf0b15
A vulnerability exists where the /Length value from the Encrypt dictionary is used for decryption, even for encryption types where this is not valid. The KeyLen value is incorrectly handled for encryption types where it should not be variable, and there is a lack of checks for minimum/maximum values and multiples of 8 ...
arvo:4511
n132/arvo:4511-vul
/src/librawspeed
[ { "end_line": 53, "function_name": "PanasonicDecompressor::PanasonicDecompressor", "start_line": 33, "target_file": "/src/librawspeed/src/librawspeed/decompressors/PanasonicDecompressor.cpp" } ]
Heap-buffer-overflow WRITE {*}
librawspeed
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/PanasonicDecompressorFuzzer < INPUT_FILE or /out/PanasonicDecompressorFuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [a...
cpp
40bf207f78cdee81de330511ea73d447226e82a6
https://github.com/darktable-org/rawspeed/commit/b08b150e21a096e49f56dc044537295991986fa4
A vulnerability exists in PanasonicDecompressor where load_flags is not properly sanitized.
arvo:45192
n132/arvo:45192-vul
/src/mruby
[ { "end_line": 428, "function_name": "unpack_BER", "start_line": 410, "target_file": "/src/mruby/mrbgems/mruby-pack/src/pack.c" } ]
Index-out-of-bounds
mruby
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 56701416 INFO: Loaded 1 modules (24497 inline 8-bit counters): 24497 [0x6efc50, 0x6f5c01), INFO: Loaded 1 PC tables (24497 PCs): 24497 [0x60fb40,0x66f650), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc /src/mruby/src/string....
c
31d4bbcfea0e216aa2e3b856c0e177802ad84a2d
https://github.com/mruby/mruby/commit/bc9476e7caa75e0a258682f4dc3247a00fed5581
The function unpack_BER() in unpack.c assumes that the string length is not zero.
arvo:45222
n132/arvo:45222-vul
/src/ghostpdl
[ { "end_line": 1990, "function_name": "pdfi_read_cff", "start_line": 1602, "target_file": "/src/ghostpdl/pdf/pdf_font1C.c" } ]
UNKNOWN READ
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2260267291 INFO: Loaded 3 modules (183187 inline 8-bit counters): 13708 [0x7f6891edb9e0, 0x7f6891edef6c), 959 [0x7f6891f3ca40, 0x7f6891f3cdff), 168520 [0x3132eb0, 0x315c0f8), INFO: Loaded 3 PC tables (183187 PCs): 13708 [0x7f6891edef70,0x7f6891f1483...
cpp
ed4ea44d3a6e0f705fa055a81beef964a1b1cfea
https://github.com/ArtifexSoftware/ghostpdl/commit/edb02250825f20203c137886c5253a908b536985
A missing bounds check in the fdselect proc selection offset allows out-of-bounds access.
arvo:45302
n132/arvo:45302-vul
/src/exiv2
[ { "end_line": 207, "function_name": "Photoshop::setIptcIrb", "start_line": 141, "target_file": "/src/exiv2/src/jpgimage.cpp" } ]
Container-overflow READ 4
exiv2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 391655050 INFO: Loaded 1 modules (55209 inline 8-bit counters): 55209 [0xeb94d0, 0xec6c79), INFO: Loaded 1 PC tables (55209 PCs): 55209 [0xec6c80,0xf9e710), /out/fuzz-read-print-write: Running 1 inputs 1 time(s) each. Running: /tmp/poc ============...
cpp
6e9eca445aa6fffa308e30fcf0168cb28c106a70
https://github.com/Exiv2/exiv2/commit/e715243aa51fa38a89d35ea377d267600217e192
null
arvo:45347
n132/arvo:45347-vul
/src/ghostpdl
[ { "end_line": 666, "function_name": "pdfi_get_image_info", "start_line": 438, "target_file": "/src/ghostpdl/pdf/pdf_image.c" } ]
UNKNOWN READ
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2370486385 INFO: Loaded 3 modules (183188 inline 8-bit counters): 13708 [0x7f04148169e0, 0x7f0414819f6c), 959 [0x7f0414877a40, 0x7f0414877dff), 168521 [0x3130eb0, 0x315a0f9), INFO: Loaded 3 PC tables (183188 PCs): 13708 [0x7f0414819f70,0x7f041484f83...
cpp
648937e3ee1a05a475be57ed590b4913e4eedce9
https://github.com/ArtifexSoftware/ghostpdl/commit/a9c7640b90bc583e04be7b1eebccd5c07e79c063
A vulnerability exists where the interpreter processes inline images with a /H (height) parameter set to a negative value (e.g., -19). The interpreter passes this negative value to the image rendering code, which does nothing but reports that it has consumed a negative number of rows. When the interpreter then attempts...
arvo:45430
n132/arvo:45430-vul
/src/opensc
[ { "end_line": 1367, "function_name": "do_fileid", "start_line": 1324, "target_file": "/src/opensc/src/pkcs15init/profile.c" } ]
Heap-buffer-overflow WRITE 2
opensc
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2161381824 INFO: Loaded 1 modules (40924 inline 8-bit counters): 40924 [0xf01b30, 0xf0bb0c), INFO: Loaded 1 PC tables (40924 PCs): 40924 [0xd35790,0xdd5550), /out/fuzz_pkcs15init: Running 1 inputs 1 time(s) each. Running: /tmp/poc =================...
c
1e6558ad6fb4cb508bd6a9d115e0899eaf6d3926
https://github.com/OpenSC/OpenSC/commit/8697a01850d5e02a3099acd5160d0a0ee2d31077
null
arvo:45455
n132/arvo:45455-vul
/src/libxml2
[ { "end_line": 7489, "function_name": "xmlParseReference", "start_line": 7067, "target_file": "/src/libxml2/parser.c" } ]
Invalid-free
libxml2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4134474854 INFO: Loaded 1 modules (54247 inline 8-bit counters): 54247 [0x8764de0, 0x87721c7), INFO: Loaded 1 PC tables (54247 PCs): 54247 [0x8654dbc,0x86becf4), /out/schema: Running 1 inputs 1 time(s) each. Running: /tmp/poc ======================...
c
83d5a87e372c9688d6dbacade2a4959ead8d38c8
https://gitlab.gnome.org/GNOME/libxml2/-/commit/968495442964f3ea72499dfbdba9e2fa9d77f9b7
null
arvo:45459
n132/arvo:45459-vul
/src/opensc
[ { "end_line": 187, "function_name": "do_store_data_object", "start_line": 168, "target_file": "/src/opensc/src/tests/fuzzing/fuzz_pkcs15init.c" } ]
Stack-buffer-overflow READ {*}
opensc
asan
Reading 101 bytes from /tmp/poc ================================================================= ==42893==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ff3b70acf20 at pc 0x000000452523 bp 0x7ffc0a460fd0 sp 0x7ffc0a460788 READ of size 17 at 0x7ff3b70acf20 thread T0 SCARINESS: 41 (multi-byte-read-stack-bu...
c
2c9dddc7386dbb57844cf17688859e735a783fd8
https://github.com/OpenSC/OpenSC/commit/4d7368fd3519a4778765b8eb818af0941a8d4f25
null
arvo:45473
n132/arvo:45473-vul
/src/libxml2
[ { "end_line": 7489, "function_name": "xmlParseReference", "start_line": 7067, "target_file": "/src/libxml2/parser.c" } ]
Use-of-uninitialized-value
libxml2
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 420417644 INFO: Loaded 1 modules (54107 inline 8-bit counters): 54107 [0xd2f4a4, 0xd3c7ff), INFO: Loaded 1 PC tables (54107 PCs): 54107 [0xbed950,0xcc0f00), /out/schema: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==9132==WARNING: MemorySani...
c
83d5a87e372c9688d6dbacade2a4959ead8d38c8
https://gitlab.gnome.org/GNOME/libxml2/-/commit/968495442964f3ea72499dfbdba9e2fa9d77f9b7
null
arvo:45493
n132/arvo:45493-vul
/src/selinux
[ { "end_line": 529, "function_name": "cond_init_bool_indexes", "start_line": 520, "target_file": "/src/selinux/libsepol/src/conditional.c" } ]
Use-of-uninitialized-value
selinux
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1660423461 INFO: Loaded 1 modules (10582 inline 8-bit counters): 10582 [0x6f6e5b, 0x6f97b1), INFO: Loaded 1 PC tables (10582 PCs): 10582 [0x6f97b8,0x722d18), /out/binpolicy-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==559==WARNING: ...
c
5456002f1afb99cb8fdbf14a3496eccdbb289147
https://github.com/SELinuxProject/selinux/commit/dfc652f01ea22e367c39d132873735473608f8fa
The bool_val_to_struct array in libsepol is allocated using mallocarray(), which does not initialize the memory to zero. This can lead to the use of uninitialized memory when validating malformed binary policies.
arvo:45534
n132/arvo:45534-vul
/src/libxml2
[ { "end_line": 7489, "function_name": "xmlParseReference", "start_line": 7067, "target_file": "/src/libxml2/parser.c" } ]
Use-of-uninitialized-value
libxml2
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3579070522 INFO: Loaded 1 modules (54107 inline 8-bit counters): 54107 [0xd2f4a4, 0xd3c7ff), INFO: Loaded 1 PC tables (54107 PCs): 54107 [0xbed950,0xcc0f00), /out/schema: Running 1 inputs 1 time(s) each. Running: /tmp/poc Uninitialized bytes in Mem...
c
83d5a87e372c9688d6dbacade2a4959ead8d38c8
https://gitlab.gnome.org/GNOME/libxml2/-/commit/968495442964f3ea72499dfbdba9e2fa9d77f9b7
null
arvo:45555
n132/arvo:45555-vul
/src/libxml2
[ { "end_line": 7489, "function_name": "xmlParseReference", "start_line": 7067, "target_file": "/src/libxml2/parser.c" } ]
Use-of-uninitialized-value
libxml2
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3089934650 INFO: Loaded 1 modules (54107 inline 8-bit counters): 54107 [0xd2f4a4, 0xd3c7ff), INFO: Loaded 1 PC tables (54107 PCs): 54107 [0xbed950,0xcc0f00), /out/schema: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==9130==WARNING: MemorySan...
c
83d5a87e372c9688d6dbacade2a4959ead8d38c8
https://gitlab.gnome.org/GNOME/libxml2/-/commit/968495442964f3ea72499dfbdba9e2fa9d77f9b7
null
arvo:45603
n132/arvo:45603-vul
/src/freeradius-server
[ { "end_line": 726, "function_name": "fr_dhcpv4_decode_option", "start_line": 620, "target_file": "/src/freeradius-server/src/protocols/dhcpv4/decode.c" } ]
Heap-buffer-overflow READ 1
freeradius-server
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 317882529 INFO: Loaded 3 modules (18937 inline 8-bit counters): 17570 [0x7f48934d4558, 0x7f48934d89fa), 1318 [0x7f4892ea6b38, 0x7f4892ea705e), 49 [0x5c2648, 0x5c2679), INFO: Loaded 3 PC tables (18937 PCs): 17570 [0x7f48934d8a00,0x7f489351d420), 1318...
c
715997169adb1d7b850c5e0930003293ef401872
https://github.com/FreeRADIUS/freeradius-server/commit/622489f07fd4fd4eaefdb24fa1381aab3bed3ed3
A vulnerability exists where the code does not check if there is room for the header, potentially leading to buffer overflows or memory corruption.
arvo:4561
n132/arvo:4561-vul
/src/open62541
[ { "end_line": 795, "function_name": "writeArrayDimensionsAttribute", "start_line": 734, "target_file": "/src/open62541/src/server/ua_services_attribute.c" } ]
UNKNOWN READ
open62541
ubsan
INFO: Seed: 2961018086 INFO: Loaded 1 modules (5148 inline 8-bit counters): 5148 [0x7c83f0, 0x7c980c), INFO: Loaded 1 PC tables (5148 PCs): 5148 [0x7c9810,0x7dd9d0), /out/fuzz_binary_message: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSanitizer:DEADLYSIGNAL ==875==ERROR: UndefinedBehaviorSa...
cpp
de11543f218d89ce99d8b102189882ac50789a00
https://github.com/open62541/open62541/commit/334e25a86d977e389fabe3006be3ff1a40c16ddb
null
arvo:4569
n132/arvo:4569-vul
/src/open62541
[ { "end_line": 795, "function_name": "writeArrayDimensionsAttribute", "start_line": 734, "target_file": "/src/open62541/src/server/ua_services_attribute.c" } ]
UNKNOWN WRITE
open62541
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_binary_message < INPUT_FILE or /out/fuzz_binary_message INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/f...
cpp
de11543f218d89ce99d8b102189882ac50789a00
https://github.com/open62541/open62541/commit/334e25a86d977e389fabe3006be3ff1a40c16ddb
null
arvo:45822
n132/arvo:45822-vul
/src/libjxl
[ { "end_line": 153, "function_name": "ProcessRow", "start_line": 104, "target_file": "/src/libjxl/lib/jxl/render_pipeline/stage_blending.cc" } ]
Heap-buffer-overflow READ 4
libjxl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4264898620 INFO: Loaded 1 modules (238447 inline 8-bit counters): 238447 [0x3e14b90, 0x3e4eeff), INFO: Loaded 1 PC tables (238447 PCs): 238447 [0x3e4ef00,0x41f25f0), /out/smartcrop_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ========...
cpp
448e84d10bfec798c71338af044151e315f538e9
https://github.com/libjxl/libjxl/commit/d3ccd9060bf52848970d331c4025f64fe93a3490
A vulnerability exists where it is assumed that the RP has the same number of channels as the image. Noise can cause the RP to have 3 additional channels, leading to potential issues.
arvo:45880
n132/arvo:45880-vul
/src/opensc
[ { "end_line": 1367, "function_name": "do_fileid", "start_line": 1324, "target_file": "/src/opensc/src/pkcs15init/profile.c" } ]
Stack-use-after-return READ 1
opensc
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 253670925 INFO: Loaded 1 modules (40924 inline 8-bit counters): 40924 [0xf01b30, 0xf0bb0c), INFO: Loaded 1 PC tables (40924 PCs): 40924 [0xd35790,0xdd5550), /out/fuzz_pkcs15init: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==================...
c
1e6558ad6fb4cb508bd6a9d115e0899eaf6d3926
https://github.com/OpenSC/OpenSC/commit/8697a01850d5e02a3099acd5160d0a0ee2d31077
null
arvo:45886
n132/arvo:45886-vul
/src/ghostpdl
[ { "end_line": 987, "function_name": "pdfi_set_gray_transfer", "start_line": 952, "target_file": "/src/ghostpdl/pdf/pdf_gstate.c" } ]
Stack-buffer-overflow WRITE 4
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2412804013 INFO: Loaded 3 modules (183225 inline 8-bit counters): 13708 [0x7f61140299e0, 0x7f611402cf6c), 959 [0x7f611408aa40, 0x7f611408adff), 168558 [0x3133ef0, 0x315d15e), INFO: Loaded 3 PC tables (183225 PCs): 13708 [0x7f611402cf70,0x7f611406283...
cpp
351ac4c05da840d52fb703e5f0a2f582989ef8a0
https://github.com/ArtifexSoftware/ghostpdl/commit/9f6772c1292022dee6576b2f3d0c258e523af834
null
arvo:45892
n132/arvo:45892-vul
/src/ghostpdl
[ { "end_line": 777, "function_name": "pdfi_trans_setup", "start_line": 697, "target_file": "/src/ghostpdl/pdf/pdf_trans.c" } ]
UNKNOWN READ
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 363822396 INFO: Loaded 3 modules (183232 inline 8-bit counters): 13708 [0x7fde3be929e0, 0x7fde3be95f6c), 959 [0x7fde3bef3a40, 0x7fde3bef3dff), 168565 [0x3133ef0, 0x315d165), INFO: Loaded 3 PC tables (183232 PCs): 13708 [0x7fde3be95f70,0x7fde3becb830...
cpp
eee28843b33ac5dbf0e03c289e1d9f7d035dc316
https://github.com/ArtifexSoftware/ghostpdl/commit/dc67c64d6d61f5fa9b065c03cabd237d67158802
null
arvo:45969
n132/arvo:45969-vul
/src/opensc
[ { "end_line": 1367, "function_name": "do_fileid", "start_line": 1324, "target_file": "/src/opensc/src/pkcs15init/profile.c" } ]
Segv on unknown address
opensc
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2762987176 INFO: Loaded 1 modules (40924 inline 8-bit counters): 40924 [0xf01b30, 0xf0bb0c), INFO: Loaded 1 PC tables (40924 PCs): 40924 [0xd35790,0xdd5550), /out/fuzz_pkcs15init: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:...
c
1e6558ad6fb4cb508bd6a9d115e0899eaf6d3926
https://github.com/OpenSC/OpenSC/commit/8697a01850d5e02a3099acd5160d0a0ee2d31077
null
arvo:45993
n132/arvo:45993-vul
/src/exiv2
[ { "end_line": 31, "function_name": "isValidBoxFileType", "start_line": 12, "target_file": "/src/exiv2/src/jp2image_int.cpp" } ]
Heap-buffer-overflow READ 1
exiv2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 209186682 INFO: Loaded 1 modules (55139 inline 8-bit counters): 55139 [0xeba510, 0xec7c73), INFO: Loaded 1 PC tables (55139 PCs): 55139 [0xec7c78,0xf9f2a8), /out/fuzz-read-print-write: Running 1 inputs 1 time(s) each. Running: /tmp/poc ============...
cpp
3b9fcb4b3d497e733d55de923388dccc61750970
https://github.com/Exiv2/exiv2/commit/d16ca65b01188d28afbe5a52b1495ac0270dd95a
An out of bounds read occurs in the isValidBoxFileType() function.
arvo:46002
n132/arvo:46002-vul
/src/opensc
[ { "end_line": 397, "function_name": "cosm_new_file", "start_line": 306, "target_file": "/src/opensc/src/pkcs15init/pkcs15-epass2003.c" } ]
Heap-buffer-overflow WRITE 1
opensc
asan
Reading 14971 bytes from /tmp/poc ================================================================= ==42893==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61500000237f at pc 0x000000b74b51 bp 0x7fffa1c02010 sp 0x7fffa1c02008 WRITE of size 1 at 0x61500000237f thread T0 SCARINESS: 31 (1-byte-write-heap-buffe...
c
dd4876d262be4c1ec089c7a64edf3b524c8ebe0e
https://github.com/OpenSC/OpenSC/commit/089cedc7520fbb9e0e4a912c4c3866a1aa429de6
null
arvo:46006
n132/arvo:46006-vul
/src/opensc
[ { "end_line": 1315, "function_name": "epass2003_hook_path", "start_line": 1287, "target_file": "/src/opensc/src/libopensc/card-epass2003.c" } ]
Heap-buffer-overflow READ 1
opensc
asan
Reading 103 bytes from /tmp/poc ================================================================= ==42895==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6150000011fe at pc 0x0000007b9577 bp 0x7ffe53800c60 sp 0x7ffe53800c58 READ of size 1 at 0x6150000011fe thread T0 SCARINESS: 12 (1-byte-read-heap-buffer-ov...
c
089cedc7520fbb9e0e4a912c4c3866a1aa429de6
https://github.com/OpenSC/OpenSC/commit/da37a0d5ece632080351c529ac87f00495eddbfa
null
arvo:46243
n132/arvo:46243-vul
/src/libjxl
[ { "end_line": 789, "function_name": "LowMemoryRenderPipeline::ProcessBuffers", "start_line": 708, "target_file": "/src/libjxl/lib/jxl/render_pipeline/low_memory_render_pipeline.cc" } ]
Negative-size-param
libjxl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 845164582 INFO: Loaded 1 modules (25656 inline 8-bit counters): 25656 [0x561a655d2418, 0x561a655d8850), INFO: Loaded 1 PC tables (25656 PCs): 25656 [0x561a655d8850,0x561a6563cbd0), /out/djxl_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/po...
cpp
ca1aa63eb1df8d7f51641bf4c61e94f6a3367823
https://github.com/libjxl/libjxl/commit/6140e82cbbf79a360adf8a75e11e8d76847dbcca
null
arvo:46309
n132/arvo:46309-vul
/src/openexr
[ { "end_line": 1565, "function_name": "memstream_read", "start_line": 1544, "target_file": "/src/openexr/src/lib/OpenEXRUtil/ImfCheckFile.cpp" } ]
Heap-buffer-overflow READ {*}
openexr
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3253208089 INFO: Loaded 1 modules (37446 inline 8-bit counters): 37446 [0xd397e8, 0xd42a2e), INFO: Loaded 1 PC tables (37446 PCs): 37446 [0xd42a30,0xdd4e90), /out/openexr_exrcheck_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =========...
cpp
f09788d9dbc3f1a7a79d669c2d51e5679c492c70
https://github.com/AcademySoftwareFoundation/openexr/commit/36af3db60e2c4dff4c3efe51cd83a28add116871
A potential overflow occurs in the CheckFile core reading function due to improper handling of file size calculations.
arvo:46323
n132/arvo:46323-vul
/src/libxml2
[ { "end_line": 4403, "function_name": "xmlStaticCopyNode", "start_line": 4207, "target_file": "/src/libxml2/tree.c" } ]
Heap-use-after-free READ 8
libxml2
asan
Running LLVMFuzzerInitialize ... continue... ================================================================= ==10835==ERROR: AddressSanitizer: heap-use-after-free on address 0x60c000000dd8 at pc 0x00000056bdcd bp 0x7ffd3089b9b0 sp 0x7ffd3089b9a8 READ of size 8 at 0x60c000000dd8 thread T0 SCARINESS: 51 (8-byte-read-he...
c
a5724a3b4aba00a7ceebe8cefe3f589568cf50f2
https://gitlab.gnome.org/GNOME/libxml2/-/commit/41afa89fc94a6b1cef0d0cb19263875ecf08adb6
A regression in xmlStaticCopyNode occurs because it does not account for coalesced text nodes. This issue can be triggered if other code fails to coalesce text nodes properly, as seen in xinclude.c.
arvo:46541
n132/arvo:46541-vul
/src/mupdf
[ { "end_line": 585, "function_name": "pdf_load_embedded_font", "start_line": 550, "target_file": "/src/mupdf/source/pdf/pdf-font.c" } ]
Use-of-uninitialized-value
mupdf
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2712649312 INFO: Loaded 1 modules (150792 inline 8-bit counters): 150792 [0x404ab2d, 0x406f835), INFO: Loaded 1 PC tables (150792 PCs): 150792 [0x1d52320,0x1f9f3a0), /out/pdf_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc error: cannot ...
cpp
27e2d170cbb5b5f93a619267c97100a1ee0dec73
https://github.com/ArtifexSoftware/mupdf/commit/7153308d4a9bb08c481991ea974a3daeb77bde2c
A vulnerability exists where a buffer is not marked with fz_var(), which can lead to the use of a freed pointer.
arvo:46543
n132/arvo:46543-vul
/src/gstreamer
[ { "end_line": 207, "function_name": "gst_sub_parse_data_format_autodetect", "start_line": 96, "target_file": "/src/gstreamer/subprojects/gst-plugins-base/gst/subparse/gstsubparseelement.c" } ]
Heap-buffer-overflow READ 1
gstreamer
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/typefind 0:00:00.029101411 33260 0x619000008860 ERROR   GST_PLUGIN_LOADING gstpluginloader.c:442:gst_plugin_loader_try_helper: Spawning gst-plugin-scanner helper failed: Failed to execute child proce...
c
aa121fd12053ba14dc30631ec4778965134bd68d
https://gitlab.freedesktop.org/gstreamer/gstreamer.gitc2ac57f6c970ab6129507bb04bcea47a693ab17f
A vulnerability exists in subparse where, if the length of the string is 0, the code attempts to access str[len - 1], which resolves to str[-1]. This results in an invalid string index.
arvo:46615
n132/arvo:46615-vul
/src/libraw
[ { "end_line": 523, "function_name": "LibRaw::phase_one_correct", "start_line": 198, "target_file": "/src/libraw/src/decoders/load_mfbacks.cpp" } ]
Use-of-uninitialized-value
libraw
msan
INFO: Seed: 2555088338 INFO: Loaded 1 modules (19249 inline 8-bit counters): 19249 [0xbd7310, 0xbdbe41), INFO: Loaded 1 PC tables (19249 PCs): 19249 [0x8e4d78,0x930088), /out/libraw_cr2_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc unknown file: data corrupted at 32924 ==54051==WARNING: MemorySanitizer...
cpp
b979a78cb8f3c7dbcebd51532881ac368c79ecce
https://github.com/libraw/libraw/commit/ce2250c6645897d1ff6a44c8167dde76730a0372
A use-of-uninitialized-value vulnerability exists in the function LibRaw::phase_one_flat_field. When LibRaw::read_shorts fails to read from the stream because it is already at EOF, it does not initialize the output pixel buffer. The uninitialized buffer is then used, for example, in the following code: ```cpp ushor...
arvo:46653
n132/arvo:46653-vul
/src/opensc
[ { "end_line": 645, "function_name": "sc_pkcs15init_delete_by_path", "start_line": 570, "target_file": "/src/opensc/src/pkcs15init/pkcs15-lib.c" } ]
Heap-buffer-overflow READ 1
opensc
asan
Reading 130885 bytes from /tmp/poc ================================================================= ==41409==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6150000020fe at pc 0x0000004e453c bp 0x7fff48522270 sp 0x7fff48522268 READ of size 1 at 0x6150000020fe thread T0 SCARINESS: 12 (1-byte-read-heap-buffer...
c
9035200bb931ef11a422854435079824fb9ae580
https://github.com/OpenSC/OpenSC/commit/1e6558ad6fb4cb508bd6a9d115e0899eaf6d3926
A heap-buffer-overflow vulnerability exists in the function sc_pkcs15init_delete_by_path due to insufficient input checking, which allows out-of-bounds memory reads.
arvo:46734
n132/arvo:46734-vul
/src/ghostpdl
[ { "end_line": 1326, "function_name": "chunk_free_object", "start_line": 1073, "target_file": "/src/ghostpdl/base/gsmchunk.c" } ]
Segv on unknown address
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3667824308 INFO: Loaded 3 modules (183400 inline 8-bit counters): 13708 [0x7f31755249e0, 0x7f3175527f6c), 959 [0x7f3175585a40, 0x7f3175585dff), 168733 [0x3139510, 0x316282d), INFO: Loaded 3 PC tables (183400 PCs): 13708 [0x7f3175527f70,0x7f317555d83...
cpp
7286646aff85378100d2000d25cfdc0cc034016f
https://github.com/ArtifexSoftware/ghostpdl/commit/479649281467ca84a220873d51c7a461b5a78104
A vulnerability exists due to inconsistency between the chunk allocating and freeing code in identifying single object chunks, where the allocating code uses the "padded" size and the freeing code also uses the "padded" size. This mismatch causes confusion with other areas in the code, leading to potential segmentation...
arvo:46779
n132/arvo:46779-vul
/src/sleuthkit
[ { "end_line": 3360, "function_name": "ntfs_load_bmap", "start_line": 3239, "target_file": "/src/sleuthkit/tsk/fs/ntfs.c" } ]
Heap-buffer-overflow READ 1
sleuthkit
asan
================================================================= ==19641==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000003bc0 at pc 0x00000057694a bp 0x7ffc6f8bad60 sp 0x7ffc6f8bad58 READ of size 1 at 0x619000003bc0 thread T0 SCARINESS: 22 (1-byte-read-heap-buffer-overflow-far-from-bounds) #0 0...
cpp
3bb323fbd6d56ec5d78e3c512bbb12c61e767530
https://github.com/sleuthkit/sleuthkit/commit/803484dc3e71379d1cc3e3a2f0c56e3891b1c7bd
A heap-buffer-overflow READ occurs in the ntfs_make_data_run function.
arvo:46852
n132/arvo:46852-vul
/src/opensc
[ { "end_line": 665, "function_name": "sc_pkcs15_decode_pubkey_ec", "start_line": 635, "target_file": "/src/opensc/src/libopensc/pkcs15-pubkey.c" } ]
UNKNOWN READ
opensc
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2695718671 INFO: Loaded 1 modules (40863 inline 8-bit counters): 40863 [0xefd950, 0xf078ef), INFO: Loaded 1 PC tables (40863 PCs): 40863 [0xd314d0,0xdd0ec0), /out/fuzz_pkcs15_decode: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitiz...
c
64be6695cee03655e489ffc11a9fd97f2b534285
https://github.com/OpenSC/OpenSC/commit/0ed4b62ae9cd7104706b779fd50bb65385443310
The vulnerability allows accessing the data length before accessing the buffer in the function sc_pkcs15_decode_pubkey_ec, which can lead to an unknown read.
arvo:46983
n132/arvo:46983-vul
/src/libredwg
[ { "end_line": 906, "function_name": "decode_preR13", "start_line": 611, "target_file": "/src/libredwg/src/decode_r11.c" } ]
Heap-buffer-overflow WRITE 4
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2125862456 INFO: Loaded 1 modules (554152 inline 8-bit counters): 554152 [0x4926a80, 0x49adf28), INFO: Loaded 1 PC tables (554152 PCs): 554152 [0x3e27228,0x469bca8), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
c
713feac0b0171591692078d4836275853ff57839
https://github.com/LibreDWG/libredwg/commit/580e8bbebf18579b97e2c20b032368b9079624ca
null
arvo:47143
n132/arvo:47143-vul
/src/opensc
[ { "end_line": 1894, "function_name": "change_pin", "start_line": 1800, "target_file": "/src/opensc/src/tools/pkcs15-tool.c" } ]
Invalid-free
opensc
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 396409140 INFO: Loaded 1 modules (42029 inline 8-bit counters): 42029 [0xf59af0, 0xf63f1d), INFO: Loaded 1 PC tables (42029 PCs): 42029 [0xd71770,0xe15a40), /out/fuzz_pkcs15_tool: Running 1 inputs 1 time(s) each. Running: /tmp/poc =================...
c
3ac2fa475c6576f11a4f8305ae78300d5012410e
https://github.com/OpenSC/OpenSC/commit/3d261b9a7f4b056b5b342c8b6ca1a5b1d91ee01e
A vulnerability exists in pkcs15-tool where the code attempts to free the PIN without checking if it was allocated, potentially leading to undefined behavior or a crash.
arvo:47157
n132/arvo:47157-vul
/src/ghostpdl
[ { "end_line": 408, "function_name": "pdfi_t1_decode_pfb", "start_line": 365, "target_file": "/src/ghostpdl/pdf/pdf_font1.c" } ]
Heap-buffer-overflow READ 1
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2777534463 INFO: Loaded 3 modules (183519 inline 8-bit counters): 13708 [0x7f4c24b349e0, 0x7f4c24b37f6c), 959 [0x7f4c24b95a40, 0x7f4c24b95dff), 168852 [0x313e870, 0x3167c04), INFO: Loaded 3 PC tables (183519 PCs): 13708 [0x7f4c24b37f70,0x7f4c24b6d83...
cpp
a8a209fcedc2b716484b2205b7203c9836f4aa28
https://github.com/ArtifexSoftware/ghostpdl/commit/12532548a94c94821da0238b84c04b918659eb4a
A buffer limit is not properly enforced when decoding pfb font streams, potentially allowing out-of-bounds access.
arvo:47213
n132/arvo:47213-vul
/src/mruby
[ { "end_line": 579, "function_name": "mrb_funcall_with_block", "start_line": 495, "target_file": "/src/mruby/src/vm.c" } ]
Heap-use-after-free READ 8
mruby
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/mruby_proto_fuzzer ================================================================= ==2141==ERROR: AddressSanitizer: heap-use-after-free on address 0x619000002250 at pc 0x00000049f3f1 bp 0x7fffbdb30c30 sp 0x7fffbdb303f8 READ of size 8 at 0...
cpp
49b8cef31f01c0d88d874e17714dff1fa5b85df0
https://github.com/mruby/mruby/commit/c32cac6e59a899497c603025b74fcfd316282f36
A vulnerability exists where the pointer on the VM stack is not adjusted after calling `mrb_stack_extend()` if necessary, potentially leading to incorrect stack behavior.
arvo:47342
n132/arvo:47342-vul
/src/opencv
[ { "end_line": 1150, "function_name": "opj_jp2_apply_pclr", "start_line": 1036, "target_file": "/src/opencv/3rdparty/openjpeg/openjp2/jp2.c" } ]
Heap-buffer-overflow READ 4
opencv
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/imdecode_fuzzer < INPUT_FILE or /out/imdecode_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/imdecode_...
cpp
206a3fcea8c036cc0d100878c420c50072b7edbb
https://github.com/opencv/opencv/commit/6dfa647f05cc3041b10325b9f3285df60dab1ecc
null
arvo:47443
n132/arvo:47443-vul
/src/moddable
[ { "end_line": 1408, "function_name": "fxGetNextTokenAux", "start_line": 861, "target_file": "/src/moddable/xs/sources/xsLexical.c" } ]
Heap-buffer-overflow WRITE 1
moddable
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1976250651 INFO: Loaded 1 modules (34435 inline 8-bit counters): 34435 [0xb05aa0, 0xb0e123), INFO: Loaded 1 PC tables (34435 PCs): 34435 [0x9ea4f0,0xa70d20), /out/xst: Running 1 inputs 1 time(s) each. Running: /tmp/poc =============================...
c
d0a8137a34a33b5fee83191454aedb9ee27f6b36
https://github.com/Moddable-OpenSource/moddable/commit/05f55eeb219ff43373eebe904819c55276b3e393
null
arvo:47483
n132/arvo:47483-vul
/src/openexr
[ { "end_line": 695, "function_name": "compute_chunk_unpack_size", "start_line": 668, "target_file": "/src/openexr/src/lib/OpenEXRCore/chunk.c" } ]
Heap-buffer-overflow READ 4
openexr
asan
================================================================= ==1176==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000117 at pc 0x000000888e69 bp 0x7ffdecef89c0 sp 0x7ffdecef89b8 READ of size 4 at 0x603000000117 thread T0 SCARINESS: 17 (4-byte-read-heap-buffer-overflow) #0 0x888e68 in unalig...
cpp
c5763cfdf59ef4880dacdb11664782822a0976cd
https://github.com/AcademySoftwareFoundation/openexr/commit/7629dad94ac310a285099f488618cbebc5eb9a85
null
arvo:47499
n132/arvo:47499-vul
/src/ghostpdl
[ { "end_line": 765, "function_name": "read_xref_section", "start_line": 636, "target_file": "/src/ghostpdl/pdf/pdf_xref.c" } ]
UNKNOWN READ
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3331504040 INFO: Loaded 3 modules (185810 inline 8-bit counters): 13708 [0x7f29af50a9e0, 0x7f29af50df6c), 959 [0x7f29af56ba40, 0x7f29af56bdff), 171143 [0x3159ba0, 0x3183827), INFO: Loaded 3 PC tables (185810 PCs): 13708 [0x7f29af50df70,0x7f29af54383...
cpp
3722c050513e66c7aeaa63981e4e9f03ee0a3491
https://github.com/ArtifexSoftware/ghostpdl/commit/7ab96e83d85165801894e887816db6042ea2f9be
null
arvo:47501
n132/arvo:47501-vul
/src/ghostpdl
[ { "end_line": 765, "function_name": "read_xref_section", "start_line": 636, "target_file": "/src/ghostpdl/pdf/pdf_xref.c" } ]
Heap-buffer-overflow READ 8
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2657265462 INFO: Loaded 3 modules (185810 inline 8-bit counters): 13708 [0x7f6cf695e9e0, 0x7f6cf6961f6c), 959 [0x7f6cf69bfa40, 0x7f6cf69bfdff), 171143 [0x3159ba0, 0x3183827), INFO: Loaded 3 PC tables (185810 PCs): 13708 [0x7f6cf6961f70,0x7f6cf699783...
cpp
3722c050513e66c7aeaa63981e4e9f03ee0a3491
https://github.com/ArtifexSoftware/ghostpdl/commit/7ab96e83d85165801894e887816db6042ea2f9be
null
arvo:47512
n132/arvo:47512-vul
/src/opensc
[ { "end_line": 107, "function_name": "LLVMFuzzerTestOneInput", "start_line": 29, "target_file": "/src/opensc/src/tests/fuzzing/fuzz_card.c" } ]
Stack-buffer-overflow READ 1
opensc
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3679070911 INFO: Loaded 1 modules (40997 inline 8-bit counters): 40997 [0xf05130, 0xf0f155), INFO: Loaded 1 PC tables (40997 PCs): 40997 [0xd37bb0,0xdd7e00), /out/fuzz_card: Running 1 inputs 1 time(s) each. Running: /tmp/poc =======================...
c
26a7dceb7b2adb8162a3a8cd888d3ef16b24c76b
https://github.com/OpenSC/OpenSC/commit/74a8f296e0f195916d28e1c928f457e04aa22892
The vulnerability allows fuzzing input to be used as the output buffer in fuzz_card, potentially leading to unintended behavior or security issues.
arvo:47521
n132/arvo:47521-vul
/src/opensc
[ { "end_line": 236, "function_name": "test_init_pin", "start_line": 211, "target_file": "/src/opensc/src/tests/fuzzing/fuzz_pkcs11.c" } ]
Heap-buffer-overflow READ 4
opensc
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1184833423 INFO: Loaded 1 modules (45689 inline 8-bit counters): 45689 [0x100cd90, 0x1018009), INFO: Loaded 1 PC tables (45689 PCs): 45689 [0xe0cb10,0xebf2a0), /out/fuzz_pkcs11: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===================...
c
0863f2a2e70c5462e099f8a930b587f0d0526221
https://github.com/OpenSC/OpenSC/commit/27e3db8b142522d7367cc446283fb07d855443d7
null
arvo:4764
n132/arvo:4764-vul
/src/open62541
[ { "end_line": 669, "function_name": "UA_MessageContext_abort", "start_line": 665, "target_file": "/src/open62541/src/ua_securechannel.c" } ]
Heap-use-after-free WRITE 4
open62541
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_binary_message < INPUT_FILE or /out/fuzz_binary_message INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/f...
cpp
334e25a86d977e389fabe3006be3ff1a40c16ddb
https://github.com/open62541/open62541/commit/6f689994e1e530142d01988659ac1b1d7dbd7237
null
arvo:47769
n132/arvo:47769-vul
/src/opensc
[ { "end_line": 438, "function_name": "myeid_new_file", "start_line": 371, "target_file": "/src/opensc/src/pkcs15init/pkcs15-myeid.c" } ]
Heap-buffer-overflow WRITE {*}
opensc
asan
Reading 172 bytes from /tmp/poc ================================================================= ==41686==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6140000001f8 at pc 0x0000004a091a bp 0x7ffeb615f990 sp 0x7ffeb615f158 WRITE of size 190 at 0x6140000001f8 thread T0 SCARINESS: 45 (multi-byte-write-heap-b...
c
3065bb803e10af08352f4eb7c2056f6a5a21efa8
https://github.com/OpenSC/OpenSC/commit/367c3ad2ef2c10cb29602f72163e7fb23c3f5827
null
arvo:4790
n132/arvo:4790-vul
/src/wpantund
[ { "end_line": 3374, "function_name": "SpinelNCPInstance::handle_ncp_spinel_callback", "start_line": 3283, "target_file": "/src/wpantund/src/ncp-spinel/SpinelNCPInstance.cpp" } ]
UNKNOWN READ
wpantund
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/wpantund-fuzz < INPUT_FILE or /out/wpantund-fuzz INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/wpantund-fuzz...
cpp
2f5c217710ab0038d0d0fe838d47b7f88d0acf36
https://github.com/openthread/wpantund/commit/7838e0c00a8599cc964cdd19c972ebaeb17bfcbe
A use-of-uninitialized-memory issue exists, where uninitialized memory is accessed during execution.
arvo:47961
n132/arvo:47961-vul
/src/file
[ { "end_line": 213, "function_name": "json_parse_array", "start_line": 178, "target_file": "/src/file/src/is_json.c" } ]
Heap-buffer-overflow READ 1
file
asan
Running LLVMFuzzerInitialize ... continue... ================================================================= ==9832==ERROR: AddressSanitizer: use-after-poison on address 0x7ff0b579a802 at pc 0x00000052a995 bp 0x7ffe53523030 sp 0x7ffe53523028 READ of size 1 at 0x7ff0b579a802 thread T0 SCARINESS: 22 (1-byte-read-use-af...
cpp
87060b287acdc06297bb73e668445e57023f3a75
https://github.com/file/file/commit/46976e05f97e4b2bc77476a16f7107ff0be12df1
null
arvo:47986
n132/arvo:47986-vul
/src/libical
[ { "end_line": 424, "function_name": "simple_str_to_doublestr", "start_line": 365, "target_file": "/src/libical/src/libical/icalvalue.c" } ]
Stack-buffer-overflow WRITE 1
libical
asan
================================================================= ==2649==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f76fa0eb860 at pc 0x00000054865c bp 0x7ffdad497430 sp 0x7ffdad497428 WRITE of size 1 at 0x7f76fa0eb860 thread T0 SCARINESS: 46 (1-byte-write-stack-buffer-overflow) #0 0x54865b in si...
cpp
a8ef3de84cc5740978a49dcf7b8eeb2cd5fc6cb8
https://github.com/libical/libical/commit/d86a86dbcddba0414f0dea13c3357f1c38826cb2
A stack-buffer-overflow occurs in the function simple_str_to_doublestr.
arvo:48000
n132/arvo:48000-vul
/src/opensc
[ { "end_line": 438, "function_name": "myeid_new_file", "start_line": 371, "target_file": "/src/opensc/src/pkcs15init/pkcs15-myeid.c" } ]
Index-out-of-bounds
opensc
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3310810178 INFO: Loaded 1 modules (107558 inline 8-bit counters): 107558 [0x112e300, 0x1148726), INFO: Loaded 1 PC tables (107558 PCs): 107558 [0xcfed18,0xea2f78), /out/fuzz_pkcs15init: Running 1 inputs 1 time(s) each. Running: /tmp/poc pkcs15-myei...
c
3065bb803e10af08352f4eb7c2056f6a5a21efa8
https://github.com/OpenSC/OpenSC/commit/367c3ad2ef2c10cb29602f72163e7fb23c3f5827
null
arvo:48029
n132/arvo:48029-vul
/src/libjxl
[ { "end_line": 1702, "function_name": "ParseBoxHeader", "start_line": 1674, "target_file": "/src/libjxl/lib/jxl/decode.cc" } ]
Heap-buffer-overflow READ {*}
libjxl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3086352812 INFO: Loaded 1 modules (27141 inline 8-bit counters): 27141 [0x55b5495fcd98, 0x55b54960379d), INFO: Loaded 1 PC tables (27141 PCs): 27141 [0x55b5496037a0,0x55b54966d7f0), /out/djxl_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/p...
cpp
ca8e276aacf63a752346a6a44ba673b0af993237
https://github.com/libjxl/libjxl/commit/746d1f5e8498f501238894899c301e70ea57e2aa
null
arvo:48069
n132/arvo:48069-vul
/src/freeradius-server
[ { "end_line": 138, "function_name": "fr_size_from_str", "start_line": 40, "target_file": "/src/freeradius-server/src/lib/util/size.c" } ]
Heap-buffer-overflow READ 1
freeradius-server
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3615774117 INFO: Loaded 2 modules (18103 inline 8-bit counters): 18054 [0x7f9df3051f18, 0x7f9df305659e), 49 [0x5c0658, 0x5c0689), INFO: Loaded 2 PC tables (18103 PCs): 18054 [0x7f9df30565a0,0x7f9df309ce00), 49 [0x5c0690,0x5c09a0), /out/fuzzer_util:...
c
9f12c1ae7787707acad0e5bf4bcba8cd3ee44109
https://github.com/FreeRADIUS/freeradius-server/commit/ddfd3a99268136d4c321fa9e2fc38c2d2b8e329d
null
arvo:4812
n132/arvo:4812-vul
/src/librawspeed
[ { "end_line": 64, "function_name": "FujiDecompressor::FujiDecompressor", "start_line": 38, "target_file": "/src/librawspeed/src/librawspeed/decompressors/FujiDecompressor.cpp" } ]
Use-after-poison WRITE 2
librawspeed
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/FujiDecompressorFuzzer < INPUT_FILE or /out/FujiDecompressorFuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] ...
cpp
f6a608b1a9ee4001c62515539629f18e6c7a9332
https://github.com/darktable-org/rawspeed/commit/2d8507d1909829e9151fac73ffc0d20f691f558c
The FujiDecompressor fails to sanitize the cpp and bpp values.
arvo:48123
n132/arvo:48123-vul
/src/libjxl
[ { "end_line": 1702, "function_name": "ParseBoxHeader", "start_line": 1674, "target_file": "/src/libjxl/lib/jxl/decode.cc" } ]
Heap-buffer-overflow READ 8
libjxl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1596570437 INFO: Loaded 1 modules (27141 inline 8-bit counters): 27141 [0x5631a4043d98, 0x5631a404a79d), INFO: Loaded 1 PC tables (27141 PCs): 27141 [0x5631a404a7a0,0x5631a40b47f0), /out/djxl_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/p...
cpp
ca8e276aacf63a752346a6a44ba673b0af993237
https://github.com/libjxl/libjxl/commit/746d1f5e8498f501238894899c301e70ea57e2aa
null
arvo:4822
n132/arvo:4822-vul
/src/librawspeed
[ { "end_line": 74, "function_name": "FujiDecompressor::FujiDecompressor", "start_line": 38, "target_file": "/src/librawspeed/src/librawspeed/decompressors/FujiDecompressor.cpp" } ]
Unknown-crash READ 8
librawspeed
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/FujiDecompressorFuzzer < INPUT_FILE or /out/FujiDecompressorFuzzer INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] ...
cpp
bcd1c6fa54908199b1fba6d0dd38f9bf6c51a4ce
https://github.com/darktable-org/rawspeed/commit/404b736883726778fd8d99776d0c28652394711d
The FujiDecompressor does not properly check which CFA colors are present.
arvo:48305
n132/arvo:48305-vul
/src/ghostpdl
[ { "end_line": 897, "function_name": "default_subclass_finalize", "start_line": 867, "target_file": "/src/ghostpdl/base/gdevsclass.c" } ]
Heap-use-after-free READ 8
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2680786906 INFO: Loaded 3 modules (184478 inline 8-bit counters): 13708 [0x7f5f63b6b9e0, 0x7f5f63b6ef6c), 959 [0x7f5f63bcca40, 0x7f5f63bccdff), 169811 [0x312d9e0, 0x3157133), INFO: Loaded 3 PC tables (184478 PCs): 13708 [0x7f5f63b6ef70,0x7f5f63ba483...
cpp
6f4326ab21ae055610c72222da4ab2ac26007589
https://github.com/ArtifexSoftware/ghostpdl/commit/b609c25f7f881bea4b10c8e1b9b950b635437320
The .currentoutputdevice (custom) operator allows the PostScript VM to retain a reference to the "child" of a subclassed device. During error conditions, this reference may persist beyond the unsubclass operation, resulting in the "child" device being freed while an active reference still exists. This can lead to use-a...
arvo:48329
n132/arvo:48329-vul
/src/yara
[ { "end_line": 617, "function_name": "read_blob_signed", "start_line": 550, "target_file": "/src/yara/libyara/modules/dotnet/dotnet.c" } ]
Heap-buffer-overflow READ 4
yara
asan
Running LLVMFuzzerInitialize ... continue... ================================================================= ==25008==ERROR: AddressSanitizer: use-after-poison on address 0x7f06ae2eddb1 at pc 0x00000057d8f5 bp 0x7ffead703b10 sp 0x7ffead703b08 READ of size 4 at 0x7f06ae2eddb1 thread T0 SCARINESS: 27 (4-byte-read-use-a...
cpp
fd8921c2cd50cd21aa229c65e5f72697a80a4ba0
https://github.com/VirusTotal/yara/commit/86b0e3f7c7fc2c689db88972221b5d4da1c7214f
null
arvo:48589
n132/arvo:48589-vul
/src/espeak-ng
[ { "end_line": 987, "function_name": "ReadClause", "start_line": 467, "target_file": "/src/espeak-ng/src/libespeak-ng/readclause.c" } ]
Heap-buffer-overflow READ 1
espeak-ng
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3869416498 INFO: Loaded 1 modules (10294 inline 8-bit counters): 10294 [0x8bf560, 0x8c1d96), INFO: Loaded 1 PC tables (10294 PCs): 10294 [0x8c1d98,0x8ea0f8), /out/ssml-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =====================...
c
0fa9737a002cc9c99330f32b650e8804241e7436
https://github.com/espeak-ng/espeak-ng/commit/482ee1da05189252c3dee49514506e1d2271a2c0
null
arvo:48736
n132/arvo:48736-vul
/src/file
[ { "end_line": 340, "function_name": "json_parse_const", "start_line": 322, "target_file": "/src/file/src/is_json.c" } ]
Heap-buffer-overflow READ 1
file
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2834810799 INFO: Loaded 1 modules (5200 inline 8-bit counters): 5200 [0x665930, 0x666d80), INFO: Loaded 1 PC tables (5200 PCs): 5200 [0x666d80,0x67b280), /out/magic_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ========================...
cpp
441ac2b15508909e82ad467960df4ac0adf9644c
https://github.com/file/file/commit/16756ff9286df9a43b4b6e21824975a1c6809835
A vulnerability exists where the pointer *ucp can move past ue, potentially leading to out-of-bounds access.
arvo:48745
n132/arvo:48745-vul
/src/ghostpdl
[ { "end_line": 1448, "function_name": "gs_fapi_ft_get_scaled_font", "start_line": 1126, "target_file": "/src/ghostpdl/base/fapi_ft.c" } ]
Heap-use-after-free READ 1
ghostpdl
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/gs_device_pxlmono_fuzzer ================================================================= ==22130==ERROR: AddressSanitizer: heap-use-after-free on address 0x633000000850 at pc 0x000000a86916 bp 0x7ffe4db7f910 sp 0x7ffe4db7f908 READ of size...
cpp
93f5cf520bf1b1f85029e0df20932a651887098b
https://github.com/ArtifexSoftware/ghostpdl/commit/6fd0c14775db5d10563f8b0401ee9f3f6bd29310
null
arvo:48746
n132/arvo:48746-vul
/src/ghostpdl
[ { "end_line": 1448, "function_name": "gs_fapi_ft_get_scaled_font", "start_line": 1126, "target_file": "/src/ghostpdl/base/fapi_ft.c" } ]
Segv on unknown address
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 748211 INFO: Loaded 3 modules (202826 inline 8-bit counters): 13708 [0x7f2a042c29e0, 0x7f2a042c5f6c), 959 [0x7f2a04323a40, 0x7f2a04323dff), 188159 [0x344bf90, 0x3479e8f), INFO: Loaded 3 PC tables (202826 PCs): 13708 [0x7f2a042c5f70,0x7f2a042fb830), ...
cpp
93f5cf520bf1b1f85029e0df20932a651887098b
https://github.com/ArtifexSoftware/ghostpdl/commit/6fd0c14775db5d10563f8b0401ee9f3f6bd29310
null
arvo:48749
n132/arvo:48749-vul
/src/ghostpdl
[ { "end_line": 1448, "function_name": "gs_fapi_ft_get_scaled_font", "start_line": 1126, "target_file": "/src/ghostpdl/base/fapi_ft.c" } ]
Memcpy-param-overlap
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1956776526 INFO: Loaded 3 modules (202817 inline 8-bit counters): 13708 [0x7f5fa56679e0, 0x7f5fa566af6c), 959 [0x7f5fa56c8a40, 0x7f5fa56c8dff), 188150 [0x344bfd0, 0x3479ec6), INFO: Loaded 3 PC tables (202817 PCs): 13708 [0x7f5fa566af70,0x7f5fa56a083...
cpp
93f5cf520bf1b1f85029e0df20932a651887098b
https://github.com/ArtifexSoftware/ghostpdl/commit/6fd0c14775db5d10563f8b0401ee9f3f6bd29310
null
arvo:48866
n132/arvo:48866-vul
/src/mruby
[ { "end_line": 517, "function_name": "udiv", "start_line": 409, "target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c" } ]
UNKNOWN WRITE
mruby
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3420901223 INFO: Loaded 1 modules (25901 inline 8-bit counters): 25901 [0x7067c0, 0x70cced), INFO: Loaded 1 PC tables (25901 PCs): 25901 [0x61d100,0x6823d0), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSan...
c
a64d2bfbe67ce0520cdd9bb72ac8b9194269927a
https://github.com/mruby/mruby/commit/a40842eb73164254f465ce5bac74045200e5acb0
null
arvo:48873
n132/arvo:48873-vul
/src/mruby
[ { "end_line": 691, "function_name": "mpz_init_set_str", "start_line": 643, "target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c" } ]
Heap-use-after-free READ 1
mruby
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/mruby_fuzzer AddressSanitizer:DEADLYSIGNAL ================================================================= ==2132==ERROR: AddressSanitizer: SEGV on unknown address 0x60cfffffffc1 (pc 0x000000559358 bp 0x7ffed6b479b0 sp 0x7ffed6b47840 T0) ...
c
a64d2bfbe67ce0520cdd9bb72ac8b9194269927a
https://github.com/mruby/mruby/commit/a40842eb73164254f465ce5bac74045200e5acb0
null
arvo:48877
n132/arvo:48877-vul
/src/mruby
[ { "end_line": 1848, "function_name": "cmpnum", "start_line": 1800, "target_file": "/src/mruby/src/numeric.c" } ]
UNKNOWN READ
mruby
asan
INFO: found LLVMFuzzerCustomMutator (0x55fbb0). Disabling -len_control by default. INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2605134212 INFO: Loaded 1 modules (27054 inline 8-bit counters): 27054 [0xb561f8, 0xb5cba6), INFO: Loaded 1 PC tables (27054 PCs): 27054 [0x9c2c48,0xa2c728), /out/mr...
cpp
872020bb3d85ba4066ec19cfcad375e51fdf024b
https://github.com/mruby/mruby/commit/960021e51989881c06c7c87b2661440c1fb2a784
A vulnerability exists in numeric.c within the cmpnum function, where mrb_bigint_cmp() is incorrectly called if v2 is bigint instead of v1.
arvo:48884
n132/arvo:48884-vul
/src/lz4
[ { "end_line": 116, "function_name": "LLVMFuzzerTestOneInput", "start_line": 15, "target_file": "/src/lz4/ossfuzz/round_trip_fuzzer.c" } ]
Invalid-free
lz4
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3405088394 INFO: Loaded 1 modules (7444 inline 8-bit counters): 7444 [0x677070, 0x678d84), INFO: Loaded 1 PC tables (7444 PCs): 7444 [0x6135d0,0x630710), /out/round_trip_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===================...
c
9d20cd519ae62c8864ab237068e4c11490cbd0a9
https://github.com/lz4/lz4/commit/910ec80d2856cfa825e2230ff2de8347a4fa4522
null
arvo:48904
n132/arvo:48904-vul
/src/mruby
[ { "end_line": 517, "function_name": "udiv", "start_line": 409, "target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c" } ]
UNKNOWN WRITE
mruby
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3137584556 INFO: Loaded 1 modules (25901 inline 8-bit counters): 25901 [0x7067c0, 0x70cced), INFO: Loaded 1 PC tables (25901 PCs): 25901 [0x61d100,0x6823d0), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSan...
c
a64d2bfbe67ce0520cdd9bb72ac8b9194269927a
https://github.com/mruby/mruby/commit/a40842eb73164254f465ce5bac74045200e5acb0
null
arvo:48940
n132/arvo:48940-vul
/src/opensc
[ { "end_line": 236, "function_name": "test_init_pin", "start_line": 211, "target_file": "/src/opensc/src/tests/fuzzing/fuzz_pkcs11.c" } ]
Heap-buffer-overflow READ 4
opensc
asan
================================================================= ==41686==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000032 at pc 0x00000049f7d1 bp 0x7fff7525f9d0 sp 0x7fff7525f198 READ of size 4 at 0x602000000032 thread T0 SCARINESS: 17 (4-byte-read-heap-buffer-overflow) #0 0x49f7d0 in __asa...
c
0863f2a2e70c5462e099f8a930b587f0d0526221
https://github.com/OpenSC/OpenSC/commit/27e3db8b142522d7367cc446283fb07d855443d7
null
arvo:49045
n132/arvo:49045-vul
/src/mruby
[ { "end_line": 1809, "function_name": "int_to_s", "start_line": 1802, "target_file": "/src/mruby/src/numeric.c" } ]
Heap-buffer-overflow WRITE 1
mruby
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2099472400 INFO: Loaded 1 modules (23005 inline 8-bit counters): 23005 [0x92e6d0, 0x9340ad), INFO: Loaded 1 PC tables (23005 PCs): 23005 [0x80aa38,0x864808), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ====================...
c
bae11ef68971ce08bf32ab6bd930615ad3dd7fbd
https://github.com/mruby/mruby/commit/37c2f080f09390105956edb2565627f29281e24e
A vulnerability in numeric.c within the int_to_s function allows bypassing the base range check.
arvo:49049
n132/arvo:49049-vul
/src/libjxl
[ { "end_line": 789, "function_name": "LowMemoryRenderPipeline::ProcessBuffers", "start_line": 708, "target_file": "/src/libjxl/lib/jxl/render_pipeline/low_memory_render_pipeline.cc" } ]
Heap-buffer-overflow WRITE {*}
libjxl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2046772934 INFO: Loaded 1 modules (25656 inline 8-bit counters): 25656 [0x56131d23e418, 0x56131d244850), INFO: Loaded 1 PC tables (25656 PCs): 25656 [0x56131d244850,0x56131d2a8bd0), /out/djxl_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/p...
cpp
ca1aa63eb1df8d7f51641bf4c61e94f6a3367823
https://github.com/libjxl/libjxl/commit/6140e82cbbf79a360adf8a75e11e8d76847dbcca
null
arvo:49248
n132/arvo:49248-vul
/src/opensc
[ { "end_line": 563, "function_name": "cardos_list_files", "start_line": 495, "target_file": "/src/opensc/src/libopensc/card-cardos.c" } ]
Stack-buffer-overflow READ 1
opensc
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2534427911 INFO: Loaded 1 modules (41328 inline 8-bit counters): 41328 [0xf180f0, 0xf22260), INFO: Loaded 1 PC tables (41328 PCs): 41328 [0xd48010,0xde9710), /out/fuzz_card: Running 1 inputs 1 time(s) each. Running: /tmp/poc =======================...
c
516dc1836ff4dfba72c8227c4e403b5a9dc46a5c
https://github.com/OpenSC/OpenSC/commit/cbe8bbefea36e8980d5a65bc350b317bc0244bb9
A vulnerability exists where the buffer pointer is not set before parsing ASN1, which can lead to incorrect memory access during ASN1 parsing.
arvo:49255
n132/arvo:49255-vul
/src/mruby
[ { "end_line": 762, "function_name": "mpz_get_int", "start_line": 741, "target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c" } ]
Heap-buffer-overflow READ 8
mruby
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/mruby_fuzzer ================================================================= ==2218==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000003938 at pc 0x00000056c3e0 bp 0x7ffc253dad50 sp 0x7ffc253dad48 READ of size 8 at 0x6020...
c
a99d0036222ad4c3a300243113f7afff2618aff9
https://github.com/mruby/mruby/commit/b84bca666fdc4fe94286b49b6f6b9a64e4c3a534
null
arvo:49259
n132/arvo:49259-vul
/src/mruby
[ { "end_line": 1987, "function_name": "gen_assignment", "start_line": 1808, "target_file": "/src/mruby/mrbgems/mruby-compiler/core/codegen.c" } ]
Heap-buffer-overflow WRITE 8
mruby
asan
================================================================= ==2171==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000000480 at pc 0x0000006423d5 bp 0x7ffe5f2aef50 sp 0x7ffe5f2aef48 WRITE of size 8 at 0x619000000480 thread T0 SCARINESS: 42 (8-byte-write-heap-buffer-overflow) #0 0x6423d4 in mrb_...
c
b84bca666fdc4fe94286b49b6f6b9a64e4c3a534
https://github.com/mruby/mruby/commit/2b074893723ebb335e6469c34caa2d8eac05d6ed
A vulnerability exists in codegen.c where stack space for block arguments is not properly maintained.
arvo:49268
n132/arvo:49268-vul
/src/mruby
[ { "end_line": 762, "function_name": "mpz_get_int", "start_line": 741, "target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c" } ]
Use-of-uninitialized-value
mruby
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1904092509 INFO: Loaded 1 modules (23204 inline 8-bit counters): 23204 [0x99c0d9, 0x9a1b7d), INFO: Loaded 1 PC tables (23204 PCs): 23204 [0x8de1a8,0x938be8), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==2196==WARNING: Mem...
c
a99d0036222ad4c3a300243113f7afff2618aff9
https://github.com/mruby/mruby/commit/b84bca666fdc4fe94286b49b6f6b9a64e4c3a534
null
arvo:49269
n132/arvo:49269-vul
/src/mruby
[ { "end_line": 98, "function_name": "digits", "start_line": 89, "target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c" } ]
Segv on unknown address
mruby
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2892757898 INFO: Loaded 1 modules (23285 inline 8-bit counters): 23285 [0x932250, 0x937d45), INFO: Loaded 1 PC tables (23285 PCs): 23285 [0x80bf78,0x866ec8), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:DEA...
c
2b074893723ebb335e6469c34caa2d8eac05d6ed
https://github.com/mruby/mruby/commit/cfea0c28a045790388aedf53f1c9a5c43a683dd2
A security vulnerability exists in bigint.c within the digits function, where zero length bigints are not properly checked.
arvo:49282
n132/arvo:49282-vul
/src/mruby
[ { "end_line": 762, "function_name": "mpz_get_int", "start_line": 741, "target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c" } ]
Heap-buffer-overflow READ 8
mruby
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3940527635 INFO: Loaded 1 modules (23204 inline 8-bit counters): 23204 [0x930250, 0x935cf4), INFO: Loaded 1 PC tables (23204 PCs): 23204 [0x80af78,0x8659b8), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ====================...
c
a99d0036222ad4c3a300243113f7afff2618aff9
https://github.com/mruby/mruby/commit/b84bca666fdc4fe94286b49b6f6b9a64e4c3a534
null
arvo:49291
n132/arvo:49291-vul
/src/mruby
[ { "end_line": 762, "function_name": "mpz_get_int", "start_line": 741, "target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c" } ]
Heap-buffer-overflow READ 8
mruby
asan
================================================================= ==2174==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000003298 at pc 0x00000058600b bp 0x7ffc369d3230 sp 0x7ffc369d3228 READ of size 8 at 0x602000003298 thread T0 SCARINESS: 23 (8-byte-read-heap-buffer-overflow) #0 0x58600a in mpz_ge...
c
a99d0036222ad4c3a300243113f7afff2618aff9
https://github.com/mruby/mruby/commit/b84bca666fdc4fe94286b49b6f6b9a64e4c3a534
null
arvo:49357
n132/arvo:49357-vul
/src/moddable
[ { "end_line": 1701, "function_name": "fxGetNextEntity", "start_line": 1657, "target_file": "/src/moddable/xs/sources/xsLexical.c" } ]
Heap-buffer-overflow WRITE 1
moddable
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2941025888 INFO: Loaded 1 modules (34460 inline 8-bit counters): 34460 [0xb07b20, 0xb101bc), INFO: Loaded 1 PC tables (34460 PCs): 34460 [0x9eb590,0xa71f50), /out/xst: Running 1 inputs 1 time(s) each. Running: /tmp/poc =============================...
c
2511eda9781bf4cb750a88282bced0a1d4f12fcc
https://github.com/Moddable-OpenSource/moddable/commit/99e56395fb17b9c8c60e2eceae3b484f842a2b20
null
arvo:49425
n132/arvo:49425-vul
/src/mruby
[ { "end_line": 474, "function_name": "udiv", "start_line": 413, "target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c" } ]
Heap-buffer-overflow READ 4
mruby
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 622623107 INFO: Loaded 1 modules (23115 inline 8-bit counters): 23115 [0x92f390, 0x934ddb), INFO: Loaded 1 PC tables (23115 PCs): 23115 [0x80a0d8,0x864588), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =====================...
c
657263446ec68d61279dbf029fe2055bd39880b3
https://github.com/mruby/mruby/commit/7d5475916cdcf4c54952f7c695363f3d3c682ee9
null
arvo:49428
n132/arvo:49428-vul
/src/mruby
[ { "end_line": 474, "function_name": "udiv", "start_line": 413, "target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c" } ]
Use-of-uninitialized-value
mruby
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 370393237 INFO: Loaded 1 modules (23115 inline 8-bit counters): 23115 [0x9950e9, 0x99ab34), INFO: Loaded 1 PC tables (23115 PCs): 23115 [0x8d81e8,0x932698), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==2217==WARNING: Memo...
c
657263446ec68d61279dbf029fe2055bd39880b3
https://github.com/mruby/mruby/commit/7d5475916cdcf4c54952f7c695363f3d3c682ee9
null
arvo:49453
n132/arvo:49453-vul
/src/mruby
[ { "end_line": 198, "function_name": "ucmp", "start_line": 184, "target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c" } ]
Segv on unknown address
mruby
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2539039750 INFO: Loaded 1 modules (23267 inline 8-bit counters): 23267 [0x932390, 0x937e73), INFO: Loaded 1 PC tables (23267 PCs): 23267 [0x80c0d8,0x866f08), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:DEA...
c
e8ce82bf31ab83e3aa4b26dc571704593e2a4ebd
https://github.com/mruby/mruby/commit/26ce85bd5de515906e01fdeeac774316628ad599
null
arvo:49455
n132/arvo:49455-vul
/src/lcms
[ { "end_line": 479, "function_name": "CubeSize", "start_line": 460, "target_file": "/src/lcms/src/cmslut.c" } ]
Heap-buffer-overflow READ 2
lcms
asan
================================================================= ==12997==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000002d6 at pc 0x00000057af4d bp 0x7ffcb213dd80 sp 0x7ffcb213dd78 READ of size 2 at 0x6020000002d6 thread T0 SCARINESS: 14 (2-byte-read-heap-buffer-overflow) #0 0x57af4c in Tetra...
c
b7e119beadd56e5d6aefcf4a3edee33dc78c92c6
https://github.com/mm2/Little-CMS/commit/67736fea34fdccab2ac19391d2955d6d6808fe81
A division by zero is possible due to an incorrect bound check.
arvo:49461
n132/arvo:49461-vul
/src/lcms
[ { "end_line": 2088, "function_name": "Write16bitTables", "start_line": 2065, "target_file": "/src/lcms/src/cmstypes.c" } ]
Heap-buffer-overflow READ 2
lcms
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 704089328 INFO: Loaded 1 modules (7676 inline 8-bit counters): 7676 [0x6a3010, 0x6a4e0c), INFO: Loaded 1 PC tables (7676 PCs): 7676 [0x62fd40,0x64dd00), /out/cms_profile_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===================...
c
a6ef58ec3716bad934d0cacc063ef1a419f4668f
https://github.com/mm2/Little-CMS/commit/959064542d2ea82f97bb409dda4df471efc53feb
A vulnerability exists when writing profiles if tables have different node count values in the code. Each table may have a different node count number, which can lead to errors during profile writing.
arvo:49470
n132/arvo:49470-vul
/src/mruby
[ { "end_line": 198, "function_name": "ucmp", "start_line": 184, "target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c" } ]
Segv on unknown address
mruby
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3518357814 INFO: Loaded 1 modules (23267 inline 8-bit counters): 23267 [0x932390, 0x937e73), INFO: Loaded 1 PC tables (23267 PCs): 23267 [0x80c0d8,0x866f08), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:DEA...
c
e8ce82bf31ab83e3aa4b26dc571704593e2a4ebd
https://github.com/mruby/mruby/commit/26ce85bd5de515906e01fdeeac774316628ad599
null
arvo:49493
n132/arvo:49493-vul
/src/mruby
[ { "end_line": 198, "function_name": "ucmp", "start_line": 184, "target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c" } ]
Segv on unknown address
mruby
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 886142967 INFO: Loaded 1 modules (23267 inline 8-bit counters): 23267 [0x932390, 0x937e73), INFO: Loaded 1 PC tables (23267 PCs): 23267 [0x80c0d8,0x866f08), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:DEAD...
c
e8ce82bf31ab83e3aa4b26dc571704593e2a4ebd
https://github.com/mruby/mruby/commit/26ce85bd5de515906e01fdeeac774316628ad599
null
arvo:49495
n132/arvo:49495-vul
/src/lcms
[ { "end_line": 416, "function_name": "ComputeConversion", "start_line": 352, "target_file": "/src/lcms/src/cmscnvrt.c" } ]
Use-of-uninitialized-value
lcms
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1961875113 INFO: Loaded 1 modules (7671 inline 8-bit counters): 7671 [0x6dcc79, 0x6dea70), INFO: Loaded 1 PC tables (7671 PCs): 7671 [0x66af70,0x688ee0), /out/cms_transform_all_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==12983==WAR...
c
77758b7f815f4ced91e088ce855b31c90ad0a406
https://github.com/mm2/Little-CMS/commit/b7e119beadd56e5d6aefcf4a3edee33dc78c92c6
A vulnerability exists where duplicated tags are not checked, allowing profiles with duplicate tags to be processed instead of being discarded.
arvo:49542
n132/arvo:49542-vul
/src/mruby
[ { "end_line": 482, "function_name": "udiv", "start_line": 420, "target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c" } ]
Use-of-uninitialized-value
mruby
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2094835510 INFO: Loaded 1 modules (23289 inline 8-bit counters): 23289 [0x99b0e9, 0x9a0be2), INFO: Loaded 1 PC tables (23289 PCs): 23289 [0x8dd1e8,0x938178), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==2123==WARNING: Mem...
c
9592b7e4ece7b5c7c3e244cbdae59e5afeb52ed7
https://github.com/mruby/mruby/commit/de2ea3c389e4f5a4b0910fbf203b93d8cf409957
An integer underflow occurs in the udiv function in bigint.c.
arvo:49546
n132/arvo:49546-vul
/src/lcms
[ { "end_line": 884, "function_name": "_cmsReadHeader", "start_line": 764, "target_file": "/src/lcms/src/cmsio0.c" } ]
Heap-use-after-free READ 4
lcms
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2295413016 INFO: Loaded 1 modules (7683 inline 8-bit counters): 7683 [0x831c5d0, 0x831e3d3), INFO: Loaded 1 PC tables (7683 PCs): 7683 [0x829e63c,0x82ad654), /out/cms_transform_all_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ========...
c
89b5f465e5e47d43209b09e4b577b6f09d597cc1
https://github.com/mm2/Little-CMS/commit/f3f6b7bceb629bc4b6f1dea3e45b44dc3f8674af
null