task_id stringlengths 8 10 | docker_image stringlengths 17 19 | basedir stringclasses 157
values | target_functions listlengths 1 3 | crash_type stringclasses 85
values | project_name stringclasses 157
values | sanitizer stringclasses 3
values | sanitizer_output stringlengths 1.13k 6.5M | language stringclasses 2
values | vuln_commit stringlengths 40 40 | fix stringlengths 69 110 | vulnerability_description stringlengths 38 824 ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
arvo:44503 | n132/arvo:44503-vul | /src/libcoap | [
{
"end_line": 23,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 6,
"target_file": "/src/libcoap/tests/oss-fuzz/pdu_parse_target.c"
}
] | Heap-buffer-overflow READ 1 | libcoap | asan | Reading 260 bytes from /tmp/poc
Apr 10 12:17:04.374 DEBG coap_pdu_parse: UDP version not supported
=================================================================
==11469==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x612000000146 at pc 0x0000004ecdc4 bp 0x7fffa50b0da0 sp 0x7fffa50b0d98
READ of size 1 at... | c | a2e0046c802fece506df2edf05df4969613ab133 | https://github.com/obgm/libcoap/commit/ba585f848ff527f2181f8f2bfd40520563e9e68d | A vulnerability exists in pdu_parse_target.c where the result of coap_pdu_parse() is not checked. If coap_pdu_parse() returns 0, the contents of pdu are undefined and must not be processed, leading to potential undefined behavior when the contents are used without verifying successful parsing. |
arvo:4451 | n132/arvo:4451-vul | /src/librawspeed | [
{
"end_line": 145,
"function_name": "LJpegDecompressor::decodeN",
"start_line": 97,
"target_file": "/src/librawspeed/src/librawspeed/decompressors/LJpegDecompressor.cpp"
}
] | Use-after-poison WRITE 2 | librawspeed | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/LJpegDecompressorFuzzer < INPUT_FILE
or
/out/LJpegDecompressorFuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags... | cpp | 0b5389f22c17082864de100a6efedbaa4b0d894f | https://github.com/darktable-org/rawspeed/commit/580add2219c696e425087bc61b952f4ccb295f09 | A vulnerability exists in LJpegDecompressor::decodeN() due to improper clipping of the current slice width. |
arvo:44574 | n132/arvo:44574-vul | /src/libplist | [
{
"end_line": 541,
"function_name": "parse_primitive",
"start_line": 469,
"target_file": "/src/libplist/src/jplist.c"
}
] | Heap-buffer-overflow READ 1 | libplist | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3695576432
INFO: Loaded 1 modules (2744 inline 8-bit counters): 2744 [0x5f7450, 0x5f7f08),
INFO: Loaded 1 PC tables (2744 PCs): 2744 [0x5f7f08,0x602a88),
/out/jplist_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=======================... | cpp | c035c6bcea282fb31c08eddae73b16fb8e5543f0 | https://github.com/libimobiledevice/libplist/commit/7d2cdc6f378f1d6d5631b7739398dd50bea62663 | An out-of-bounds read occurs in the jplist module due to an incorrect bounds check. |
arvo:44610 | n132/arvo:44610-vul | /src/ghostpdl | [
{
"end_line": 408,
"function_name": "pdfi_process_xref_stream",
"start_line": 146,
"target_file": "/src/ghostpdl/pdf/pdf_xref.c"
}
] | Heap-buffer-overflow WRITE 8 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4011093845
INFO: Loaded 3 modules (183035 inline 8-bit counters): 13708 [0x7fb5fd4d89e0, 0x7fb5fd4dbf6c), 959 [0x7fb5fd539a40, 0x7fb5fd539dff), 168368 [0x2da5030, 0x2dce1e0),
INFO: Loaded 3 PC tables (183035 PCs): 13708 [0x7fb5fd4dbf70,0x7fb5fd51183... | cpp | e83a349bf7a7dee1dd31a1c35b0d6f52ddd23c16 | https://github.com/ArtifexSoftware/ghostpdl/commit/30770fce40f0b47c4da1c41e187b45f9f59edc63 | A vulnerability exists where Xref streams with a declared /Size of 0 are still processed, even though they have no entries, instead of stopping as expected. |
arvo:44659 | n132/arvo:44659-vul | /src/unicorn | [
{
"end_line": 171,
"function_name": "x86_reg_reset",
"start_line": 68,
"target_file": "/src/unicorn/qemu/target/i386/unicorn.c"
}
] | UNKNOWN READ | unicorn | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 349156410
INFO: Loaded 1 modules (444711 inline 8-bit counters): 444711 [0x3dc0970, 0x3e2d297),
INFO: Loaded 1 PC tables (444711 PCs): 444711 [0x3e2d298,0x44f6508),
/out/fuzz_emu_x86_32: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSan... | cpp | a91319908d67644cc4cc9befc8bdb1eb04ed083e | https://github.com/unicorn-engine/unicorn/commit/14404ef04b55662f605c00b31a479e50caff72ab | The vulnerability is that cpuid results are hardcoded in the code, rather than being set by the selected CPU. This can lead to incorrect or insecure behavior if the cpuid values do not match the actual CPU configuration. |
arvo:44683 | n132/arvo:44683-vul | /src/wolfmqtt | [
{
"end_line": 1240,
"function_name": "MqttClient_WaitType",
"start_line": 830,
"target_file": "/src/wolfmqtt/src/mqtt_client.c"
}
] | Segv on unknown address | wolfmqtt | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2895515573
INFO: Loaded 1 modules (21597 inline 8-bit counters): 21597 [0x91cde0, 0x92223d),
INFO: Loaded 1 PC tables (21597 PCs): 21597 [0x861d98,0x8b6368),
/out/wolfmqtt-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:D... | cpp | eeecd182b2a5ee4d84955f36c24a307d641e5191 | https://github.com/wolfSSL/wolfMQTT/commit/ddb274170da451ff15bc4dcdab0c9bfbaab19468 | null |
arvo:44695 | n132/arvo:44695-vul | /src/libplist | [
{
"end_line": 541,
"function_name": "parse_primitive",
"start_line": 469,
"target_file": "/src/libplist/src/jplist.c"
}
] | Heap-buffer-overflow READ 1 | libplist | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1095530267
INFO: Loaded 1 modules (2744 inline 8-bit counters): 2744 [0x5f5450, 0x5f5f08),
INFO: Loaded 1 PC tables (2744 PCs): 2744 [0x5f5f08,0x600a88),
/out/jplist_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=======================... | cpp | 38759317cbda07288f48268cf0c1bebaf54ef869 | https://github.com/libimobiledevice/libplist/commit/106c4ee7f53ef800a82fce9638f29756e8b78640 | An out-of-bounds read occurs in the jplist module due to an incorrect bounds check. |
arvo:44791 | n132/arvo:44791-vul | /src/fmt | [
{
"end_line": 2147,
"function_name": "do_write_float",
"start_line": 2042,
"target_file": "/src/fmt/include/fmt/format.h"
}
] | Heap-buffer-overflow WRITE 1 | fmt | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1472619042
INFO: Loaded 1 modules (73387 inline 8-bit counters): 73387 [0xe7dd18, 0xe8fbc3),
INFO: Loaded 1 PC tables (73387 PCs): 73387 [0xc958a8,0xdb4358),
/out/chrono-duration-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==========... | cpp | 0742606f199d9839123d36c5cb65c548f5f46f6e | https://github.com/fmtlib/fmt/commit/86477f7ecc1606e15abae1ff784e6b0c55d99619 | null |
arvo:44846 | n132/arvo:44846-vul | /src/aom | [
{
"end_line": 1401,
"function_name": "decode_partition",
"start_line": 1253,
"target_file": "/src/aom/av1/decoder/decodeframe.c"
}
] | UNKNOWN READ | aom | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1343573519
INFO: Loaded 1 modules (58184 inline 8-bit counters): 58184 [0x953a50, 0x961d98),
INFO: Loaded 1 PC tables (58184 PCs): 58184 [0x961d98,0xa45218),
/out/av1_dec_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorS... | cpp | 493cf67c62441838a56c5ea6f8dfbf6777e3cee7 | https://aomedia.googlesource.com/aom/+/ee9dbcb018f20f16348b22bc413dec1c9d901183%5E%21/ | null |
arvo:44855 | n132/arvo:44855-vul | /src/ghostpdl | [
{
"end_line": 922,
"function_name": "load_glyph",
"start_line": 547,
"target_file": "/src/ghostpdl/base/fapi_ft.c"
}
] | UNKNOWN READ | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 340911018
INFO: Loaded 3 modules (183131 inline 8-bit counters): 13708 [0x7fd8b1ec89e0, 0x7fd8b1ecbf6c), 959 [0x7fd8b1f29a40, 0x7fd8b1f29dff), 168464 [0x3130030, 0x3159240),
INFO: Loaded 3 PC tables (183131 PCs): 13708 [0x7fd8b1ecbf70,0x7fd8b1f01830... | cpp | 55204831fe58540c6e573e9fa63f1a30a0fb83cb | https://github.com/ArtifexSoftware/ghostpdl/commit/c8051ae666672cb7ca39531e28ec85636e1ce6d5 | A vulnerability exists where, in an "in extremis" fallback case, the return code from Freetype is not acted upon, leaving a partially initialised glyph bitmap in memory. This bitmap is subsequently used, which results in a crash. |
arvo:44862 | n132/arvo:44862-vul | /src/aom | [
{
"end_line": 1401,
"function_name": "decode_partition",
"start_line": 1253,
"target_file": "/src/aom/av1/decoder/decodeframe.c"
}
] | Heap-buffer-overflow WRITE 4 | aom | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/av1_dec_fuzzer
=================================================================
==3206==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x615000000554 at pc 0x000000522ea1 bp 0x7ffe29b94600 sp 0x7ffe29b945f8
WRITE of size 4 at 0x6... | cpp | 493cf67c62441838a56c5ea6f8dfbf6777e3cee7 | https://aomedia.googlesource.com/aom/+/ee9dbcb018f20f16348b22bc413dec1c9d901183%5E%21/ | null |
arvo:44983 | n132/arvo:44983-vul | /src/ghostpdl | [
{
"end_line": 1445,
"function_name": "pdfi_initialise_Decryption",
"start_line": 1358,
"target_file": "/src/ghostpdl/pdf/pdf_sec.c"
}
] | Stack-buffer-overflow READ {*} | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 914153380
INFO: Loaded 3 modules (183097 inline 8-bit counters): 13708 [0x7f2e06ccf9e0, 0x7f2e06cd2f6c), 959 [0x7f2e06d30a40, 0x7f2e06d30dff), 168430 [0x312f030, 0x315821e),
INFO: Loaded 3 PC tables (183097 PCs): 13708 [0x7f2e06cd2f70,0x7f2e06d08830... | cpp | 91c77c64d4b478f4bd0cf540523c1591bc49b9ee | https://github.com/ArtifexSoftware/ghostpdl/commit/4a79f807fd13bd0e53bd1aad6f26066be8bf0b15 | A vulnerability exists where the /Length value from the Encrypt dictionary is used for decryption, even for encryption types where this is not valid. The KeyLen value is incorrectly handled for encryption types where it should not be variable, and there is a lack of checks for minimum/maximum values and multiples of 8 ... |
arvo:4511 | n132/arvo:4511-vul | /src/librawspeed | [
{
"end_line": 53,
"function_name": "PanasonicDecompressor::PanasonicDecompressor",
"start_line": 33,
"target_file": "/src/librawspeed/src/librawspeed/decompressors/PanasonicDecompressor.cpp"
}
] | Heap-buffer-overflow WRITE {*} | librawspeed | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/PanasonicDecompressorFuzzer < INPUT_FILE
or
/out/PanasonicDecompressorFuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [a... | cpp | 40bf207f78cdee81de330511ea73d447226e82a6 | https://github.com/darktable-org/rawspeed/commit/b08b150e21a096e49f56dc044537295991986fa4 | A vulnerability exists in PanasonicDecompressor where load_flags is not properly sanitized. |
arvo:45192 | n132/arvo:45192-vul | /src/mruby | [
{
"end_line": 428,
"function_name": "unpack_BER",
"start_line": 410,
"target_file": "/src/mruby/mrbgems/mruby-pack/src/pack.c"
}
] | Index-out-of-bounds | mruby | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 56701416
INFO: Loaded 1 modules (24497 inline 8-bit counters): 24497 [0x6efc50, 0x6f5c01),
INFO: Loaded 1 PC tables (24497 PCs): 24497 [0x60fb40,0x66f650),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
/src/mruby/src/string.... | c | 31d4bbcfea0e216aa2e3b856c0e177802ad84a2d | https://github.com/mruby/mruby/commit/bc9476e7caa75e0a258682f4dc3247a00fed5581 | The function unpack_BER() in unpack.c assumes that the string length is not zero. |
arvo:45222 | n132/arvo:45222-vul | /src/ghostpdl | [
{
"end_line": 1990,
"function_name": "pdfi_read_cff",
"start_line": 1602,
"target_file": "/src/ghostpdl/pdf/pdf_font1C.c"
}
] | UNKNOWN READ | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2260267291
INFO: Loaded 3 modules (183187 inline 8-bit counters): 13708 [0x7f6891edb9e0, 0x7f6891edef6c), 959 [0x7f6891f3ca40, 0x7f6891f3cdff), 168520 [0x3132eb0, 0x315c0f8),
INFO: Loaded 3 PC tables (183187 PCs): 13708 [0x7f6891edef70,0x7f6891f1483... | cpp | ed4ea44d3a6e0f705fa055a81beef964a1b1cfea | https://github.com/ArtifexSoftware/ghostpdl/commit/edb02250825f20203c137886c5253a908b536985 | A missing bounds check in the fdselect proc selection offset allows out-of-bounds access. |
arvo:45302 | n132/arvo:45302-vul | /src/exiv2 | [
{
"end_line": 207,
"function_name": "Photoshop::setIptcIrb",
"start_line": 141,
"target_file": "/src/exiv2/src/jpgimage.cpp"
}
] | Container-overflow READ 4 | exiv2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 391655050
INFO: Loaded 1 modules (55209 inline 8-bit counters): 55209 [0xeb94d0, 0xec6c79),
INFO: Loaded 1 PC tables (55209 PCs): 55209 [0xec6c80,0xf9e710),
/out/fuzz-read-print-write: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
============... | cpp | 6e9eca445aa6fffa308e30fcf0168cb28c106a70 | https://github.com/Exiv2/exiv2/commit/e715243aa51fa38a89d35ea377d267600217e192 | null |
arvo:45347 | n132/arvo:45347-vul | /src/ghostpdl | [
{
"end_line": 666,
"function_name": "pdfi_get_image_info",
"start_line": 438,
"target_file": "/src/ghostpdl/pdf/pdf_image.c"
}
] | UNKNOWN READ | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2370486385
INFO: Loaded 3 modules (183188 inline 8-bit counters): 13708 [0x7f04148169e0, 0x7f0414819f6c), 959 [0x7f0414877a40, 0x7f0414877dff), 168521 [0x3130eb0, 0x315a0f9),
INFO: Loaded 3 PC tables (183188 PCs): 13708 [0x7f0414819f70,0x7f041484f83... | cpp | 648937e3ee1a05a475be57ed590b4913e4eedce9 | https://github.com/ArtifexSoftware/ghostpdl/commit/a9c7640b90bc583e04be7b1eebccd5c07e79c063 | A vulnerability exists where the interpreter processes inline images with a /H (height) parameter set to a negative value (e.g., -19). The interpreter passes this negative value to the image rendering code, which does nothing but reports that it has consumed a negative number of rows. When the interpreter then attempts... |
arvo:45430 | n132/arvo:45430-vul | /src/opensc | [
{
"end_line": 1367,
"function_name": "do_fileid",
"start_line": 1324,
"target_file": "/src/opensc/src/pkcs15init/profile.c"
}
] | Heap-buffer-overflow WRITE 2 | opensc | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2161381824
INFO: Loaded 1 modules (40924 inline 8-bit counters): 40924 [0xf01b30, 0xf0bb0c),
INFO: Loaded 1 PC tables (40924 PCs): 40924 [0xd35790,0xdd5550),
/out/fuzz_pkcs15init: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================... | c | 1e6558ad6fb4cb508bd6a9d115e0899eaf6d3926 | https://github.com/OpenSC/OpenSC/commit/8697a01850d5e02a3099acd5160d0a0ee2d31077 | null |
arvo:45455 | n132/arvo:45455-vul | /src/libxml2 | [
{
"end_line": 7489,
"function_name": "xmlParseReference",
"start_line": 7067,
"target_file": "/src/libxml2/parser.c"
}
] | Invalid-free | libxml2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4134474854
INFO: Loaded 1 modules (54247 inline 8-bit counters): 54247 [0x8764de0, 0x87721c7),
INFO: Loaded 1 PC tables (54247 PCs): 54247 [0x8654dbc,0x86becf4),
/out/schema: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
======================... | c | 83d5a87e372c9688d6dbacade2a4959ead8d38c8 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/968495442964f3ea72499dfbdba9e2fa9d77f9b7 | null |
arvo:45459 | n132/arvo:45459-vul | /src/opensc | [
{
"end_line": 187,
"function_name": "do_store_data_object",
"start_line": 168,
"target_file": "/src/opensc/src/tests/fuzzing/fuzz_pkcs15init.c"
}
] | Stack-buffer-overflow READ {*} | opensc | asan | Reading 101 bytes from /tmp/poc
=================================================================
==42893==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ff3b70acf20 at pc 0x000000452523 bp 0x7ffc0a460fd0 sp 0x7ffc0a460788
READ of size 17 at 0x7ff3b70acf20 thread T0
SCARINESS: 41 (multi-byte-read-stack-bu... | c | 2c9dddc7386dbb57844cf17688859e735a783fd8 | https://github.com/OpenSC/OpenSC/commit/4d7368fd3519a4778765b8eb818af0941a8d4f25 | null |
arvo:45473 | n132/arvo:45473-vul | /src/libxml2 | [
{
"end_line": 7489,
"function_name": "xmlParseReference",
"start_line": 7067,
"target_file": "/src/libxml2/parser.c"
}
] | Use-of-uninitialized-value | libxml2 | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 420417644
INFO: Loaded 1 modules (54107 inline 8-bit counters): 54107 [0xd2f4a4, 0xd3c7ff),
INFO: Loaded 1 PC tables (54107 PCs): 54107 [0xbed950,0xcc0f00),
/out/schema: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==9132==WARNING: MemorySani... | c | 83d5a87e372c9688d6dbacade2a4959ead8d38c8 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/968495442964f3ea72499dfbdba9e2fa9d77f9b7 | null |
arvo:45493 | n132/arvo:45493-vul | /src/selinux | [
{
"end_line": 529,
"function_name": "cond_init_bool_indexes",
"start_line": 520,
"target_file": "/src/selinux/libsepol/src/conditional.c"
}
] | Use-of-uninitialized-value | selinux | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1660423461
INFO: Loaded 1 modules (10582 inline 8-bit counters): 10582 [0x6f6e5b, 0x6f97b1),
INFO: Loaded 1 PC tables (10582 PCs): 10582 [0x6f97b8,0x722d18),
/out/binpolicy-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==559==WARNING: ... | c | 5456002f1afb99cb8fdbf14a3496eccdbb289147 | https://github.com/SELinuxProject/selinux/commit/dfc652f01ea22e367c39d132873735473608f8fa | The bool_val_to_struct array in libsepol is allocated using mallocarray(), which does not initialize the memory to zero. This can lead to the use of uninitialized memory when validating malformed binary policies. |
arvo:45534 | n132/arvo:45534-vul | /src/libxml2 | [
{
"end_line": 7489,
"function_name": "xmlParseReference",
"start_line": 7067,
"target_file": "/src/libxml2/parser.c"
}
] | Use-of-uninitialized-value | libxml2 | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3579070522
INFO: Loaded 1 modules (54107 inline 8-bit counters): 54107 [0xd2f4a4, 0xd3c7ff),
INFO: Loaded 1 PC tables (54107 PCs): 54107 [0xbed950,0xcc0f00),
/out/schema: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialized bytes in Mem... | c | 83d5a87e372c9688d6dbacade2a4959ead8d38c8 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/968495442964f3ea72499dfbdba9e2fa9d77f9b7 | null |
arvo:45555 | n132/arvo:45555-vul | /src/libxml2 | [
{
"end_line": 7489,
"function_name": "xmlParseReference",
"start_line": 7067,
"target_file": "/src/libxml2/parser.c"
}
] | Use-of-uninitialized-value | libxml2 | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3089934650
INFO: Loaded 1 modules (54107 inline 8-bit counters): 54107 [0xd2f4a4, 0xd3c7ff),
INFO: Loaded 1 PC tables (54107 PCs): 54107 [0xbed950,0xcc0f00),
/out/schema: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==9130==WARNING: MemorySan... | c | 83d5a87e372c9688d6dbacade2a4959ead8d38c8 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/968495442964f3ea72499dfbdba9e2fa9d77f9b7 | null |
arvo:45603 | n132/arvo:45603-vul | /src/freeradius-server | [
{
"end_line": 726,
"function_name": "fr_dhcpv4_decode_option",
"start_line": 620,
"target_file": "/src/freeradius-server/src/protocols/dhcpv4/decode.c"
}
] | Heap-buffer-overflow READ 1 | freeradius-server | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 317882529
INFO: Loaded 3 modules (18937 inline 8-bit counters): 17570 [0x7f48934d4558, 0x7f48934d89fa), 1318 [0x7f4892ea6b38, 0x7f4892ea705e), 49 [0x5c2648, 0x5c2679),
INFO: Loaded 3 PC tables (18937 PCs): 17570 [0x7f48934d8a00,0x7f489351d420), 1318... | c | 715997169adb1d7b850c5e0930003293ef401872 | https://github.com/FreeRADIUS/freeradius-server/commit/622489f07fd4fd4eaefdb24fa1381aab3bed3ed3 | A vulnerability exists where the code does not check if there is room for the header, potentially leading to buffer overflows or memory corruption. |
arvo:4561 | n132/arvo:4561-vul | /src/open62541 | [
{
"end_line": 795,
"function_name": "writeArrayDimensionsAttribute",
"start_line": 734,
"target_file": "/src/open62541/src/server/ua_services_attribute.c"
}
] | UNKNOWN READ | open62541 | ubsan | INFO: Seed: 2961018086
INFO: Loaded 1 modules (5148 inline 8-bit counters): 5148 [0x7c83f0, 0x7c980c),
INFO: Loaded 1 PC tables (5148 PCs): 5148 [0x7c9810,0x7dd9d0),
/out/fuzz_binary_message: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSanitizer:DEADLYSIGNAL
==875==ERROR: UndefinedBehaviorSa... | cpp | de11543f218d89ce99d8b102189882ac50789a00 | https://github.com/open62541/open62541/commit/334e25a86d977e389fabe3006be3ff1a40c16ddb | null |
arvo:4569 | n132/arvo:4569-vul | /src/open62541 | [
{
"end_line": 795,
"function_name": "writeArrayDimensionsAttribute",
"start_line": 734,
"target_file": "/src/open62541/src/server/ua_services_attribute.c"
}
] | UNKNOWN WRITE | open62541 | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_binary_message < INPUT_FILE
or
/out/fuzz_binary_message INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/f... | cpp | de11543f218d89ce99d8b102189882ac50789a00 | https://github.com/open62541/open62541/commit/334e25a86d977e389fabe3006be3ff1a40c16ddb | null |
arvo:45822 | n132/arvo:45822-vul | /src/libjxl | [
{
"end_line": 153,
"function_name": "ProcessRow",
"start_line": 104,
"target_file": "/src/libjxl/lib/jxl/render_pipeline/stage_blending.cc"
}
] | Heap-buffer-overflow READ 4 | libjxl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4264898620
INFO: Loaded 1 modules (238447 inline 8-bit counters): 238447 [0x3e14b90, 0x3e4eeff),
INFO: Loaded 1 PC tables (238447 PCs): 238447 [0x3e4ef00,0x41f25f0),
/out/smartcrop_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
========... | cpp | 448e84d10bfec798c71338af044151e315f538e9 | https://github.com/libjxl/libjxl/commit/d3ccd9060bf52848970d331c4025f64fe93a3490 | A vulnerability exists where it is assumed that the RP has the same number of channels as the image. Noise can cause the RP to have 3 additional channels, leading to potential issues. |
arvo:45880 | n132/arvo:45880-vul | /src/opensc | [
{
"end_line": 1367,
"function_name": "do_fileid",
"start_line": 1324,
"target_file": "/src/opensc/src/pkcs15init/profile.c"
}
] | Stack-use-after-return READ 1 | opensc | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 253670925
INFO: Loaded 1 modules (40924 inline 8-bit counters): 40924 [0xf01b30, 0xf0bb0c),
INFO: Loaded 1 PC tables (40924 PCs): 40924 [0xd35790,0xdd5550),
/out/fuzz_pkcs15init: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==================... | c | 1e6558ad6fb4cb508bd6a9d115e0899eaf6d3926 | https://github.com/OpenSC/OpenSC/commit/8697a01850d5e02a3099acd5160d0a0ee2d31077 | null |
arvo:45886 | n132/arvo:45886-vul | /src/ghostpdl | [
{
"end_line": 987,
"function_name": "pdfi_set_gray_transfer",
"start_line": 952,
"target_file": "/src/ghostpdl/pdf/pdf_gstate.c"
}
] | Stack-buffer-overflow WRITE 4 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2412804013
INFO: Loaded 3 modules (183225 inline 8-bit counters): 13708 [0x7f61140299e0, 0x7f611402cf6c), 959 [0x7f611408aa40, 0x7f611408adff), 168558 [0x3133ef0, 0x315d15e),
INFO: Loaded 3 PC tables (183225 PCs): 13708 [0x7f611402cf70,0x7f611406283... | cpp | 351ac4c05da840d52fb703e5f0a2f582989ef8a0 | https://github.com/ArtifexSoftware/ghostpdl/commit/9f6772c1292022dee6576b2f3d0c258e523af834 | null |
arvo:45892 | n132/arvo:45892-vul | /src/ghostpdl | [
{
"end_line": 777,
"function_name": "pdfi_trans_setup",
"start_line": 697,
"target_file": "/src/ghostpdl/pdf/pdf_trans.c"
}
] | UNKNOWN READ | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 363822396
INFO: Loaded 3 modules (183232 inline 8-bit counters): 13708 [0x7fde3be929e0, 0x7fde3be95f6c), 959 [0x7fde3bef3a40, 0x7fde3bef3dff), 168565 [0x3133ef0, 0x315d165),
INFO: Loaded 3 PC tables (183232 PCs): 13708 [0x7fde3be95f70,0x7fde3becb830... | cpp | eee28843b33ac5dbf0e03c289e1d9f7d035dc316 | https://github.com/ArtifexSoftware/ghostpdl/commit/dc67c64d6d61f5fa9b065c03cabd237d67158802 | null |
arvo:45969 | n132/arvo:45969-vul | /src/opensc | [
{
"end_line": 1367,
"function_name": "do_fileid",
"start_line": 1324,
"target_file": "/src/opensc/src/pkcs15init/profile.c"
}
] | Segv on unknown address | opensc | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2762987176
INFO: Loaded 1 modules (40924 inline 8-bit counters): 40924 [0xf01b30, 0xf0bb0c),
INFO: Loaded 1 PC tables (40924 PCs): 40924 [0xd35790,0xdd5550),
/out/fuzz_pkcs15init: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:... | c | 1e6558ad6fb4cb508bd6a9d115e0899eaf6d3926 | https://github.com/OpenSC/OpenSC/commit/8697a01850d5e02a3099acd5160d0a0ee2d31077 | null |
arvo:45993 | n132/arvo:45993-vul | /src/exiv2 | [
{
"end_line": 31,
"function_name": "isValidBoxFileType",
"start_line": 12,
"target_file": "/src/exiv2/src/jp2image_int.cpp"
}
] | Heap-buffer-overflow READ 1 | exiv2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 209186682
INFO: Loaded 1 modules (55139 inline 8-bit counters): 55139 [0xeba510, 0xec7c73),
INFO: Loaded 1 PC tables (55139 PCs): 55139 [0xec7c78,0xf9f2a8),
/out/fuzz-read-print-write: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
============... | cpp | 3b9fcb4b3d497e733d55de923388dccc61750970 | https://github.com/Exiv2/exiv2/commit/d16ca65b01188d28afbe5a52b1495ac0270dd95a | An out of bounds read occurs in the isValidBoxFileType() function. |
arvo:46002 | n132/arvo:46002-vul | /src/opensc | [
{
"end_line": 397,
"function_name": "cosm_new_file",
"start_line": 306,
"target_file": "/src/opensc/src/pkcs15init/pkcs15-epass2003.c"
}
] | Heap-buffer-overflow WRITE 1 | opensc | asan | Reading 14971 bytes from /tmp/poc
=================================================================
==42893==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61500000237f at pc 0x000000b74b51 bp 0x7fffa1c02010 sp 0x7fffa1c02008
WRITE of size 1 at 0x61500000237f thread T0
SCARINESS: 31 (1-byte-write-heap-buffe... | c | dd4876d262be4c1ec089c7a64edf3b524c8ebe0e | https://github.com/OpenSC/OpenSC/commit/089cedc7520fbb9e0e4a912c4c3866a1aa429de6 | null |
arvo:46006 | n132/arvo:46006-vul | /src/opensc | [
{
"end_line": 1315,
"function_name": "epass2003_hook_path",
"start_line": 1287,
"target_file": "/src/opensc/src/libopensc/card-epass2003.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | Reading 103 bytes from /tmp/poc
=================================================================
==42895==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6150000011fe at pc 0x0000007b9577 bp 0x7ffe53800c60 sp 0x7ffe53800c58
READ of size 1 at 0x6150000011fe thread T0
SCARINESS: 12 (1-byte-read-heap-buffer-ov... | c | 089cedc7520fbb9e0e4a912c4c3866a1aa429de6 | https://github.com/OpenSC/OpenSC/commit/da37a0d5ece632080351c529ac87f00495eddbfa | null |
arvo:46243 | n132/arvo:46243-vul | /src/libjxl | [
{
"end_line": 789,
"function_name": "LowMemoryRenderPipeline::ProcessBuffers",
"start_line": 708,
"target_file": "/src/libjxl/lib/jxl/render_pipeline/low_memory_render_pipeline.cc"
}
] | Negative-size-param | libjxl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 845164582
INFO: Loaded 1 modules (25656 inline 8-bit counters): 25656 [0x561a655d2418, 0x561a655d8850),
INFO: Loaded 1 PC tables (25656 PCs): 25656 [0x561a655d8850,0x561a6563cbd0),
/out/djxl_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/po... | cpp | ca1aa63eb1df8d7f51641bf4c61e94f6a3367823 | https://github.com/libjxl/libjxl/commit/6140e82cbbf79a360adf8a75e11e8d76847dbcca | null |
arvo:46309 | n132/arvo:46309-vul | /src/openexr | [
{
"end_line": 1565,
"function_name": "memstream_read",
"start_line": 1544,
"target_file": "/src/openexr/src/lib/OpenEXRUtil/ImfCheckFile.cpp"
}
] | Heap-buffer-overflow READ {*} | openexr | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3253208089
INFO: Loaded 1 modules (37446 inline 8-bit counters): 37446 [0xd397e8, 0xd42a2e),
INFO: Loaded 1 PC tables (37446 PCs): 37446 [0xd42a30,0xdd4e90),
/out/openexr_exrcheck_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=========... | cpp | f09788d9dbc3f1a7a79d669c2d51e5679c492c70 | https://github.com/AcademySoftwareFoundation/openexr/commit/36af3db60e2c4dff4c3efe51cd83a28add116871 | A potential overflow occurs in the CheckFile core reading function due to improper handling of file size calculations. |
arvo:46323 | n132/arvo:46323-vul | /src/libxml2 | [
{
"end_line": 4403,
"function_name": "xmlStaticCopyNode",
"start_line": 4207,
"target_file": "/src/libxml2/tree.c"
}
] | Heap-use-after-free READ 8 | libxml2 | asan | Running LLVMFuzzerInitialize ...
continue...
=================================================================
==10835==ERROR: AddressSanitizer: heap-use-after-free on address 0x60c000000dd8 at pc 0x00000056bdcd bp 0x7ffd3089b9b0 sp 0x7ffd3089b9a8
READ of size 8 at 0x60c000000dd8 thread T0
SCARINESS: 51 (8-byte-read-he... | c | a5724a3b4aba00a7ceebe8cefe3f589568cf50f2 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/41afa89fc94a6b1cef0d0cb19263875ecf08adb6 | A regression in xmlStaticCopyNode occurs because it does not account for coalesced text nodes. This issue can be triggered if other code fails to coalesce text nodes properly, as seen in xinclude.c. |
arvo:46541 | n132/arvo:46541-vul | /src/mupdf | [
{
"end_line": 585,
"function_name": "pdf_load_embedded_font",
"start_line": 550,
"target_file": "/src/mupdf/source/pdf/pdf-font.c"
}
] | Use-of-uninitialized-value | mupdf | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2712649312
INFO: Loaded 1 modules (150792 inline 8-bit counters): 150792 [0x404ab2d, 0x406f835),
INFO: Loaded 1 PC tables (150792 PCs): 150792 [0x1d52320,0x1f9f3a0),
/out/pdf_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
error: cannot ... | cpp | 27e2d170cbb5b5f93a619267c97100a1ee0dec73 | https://github.com/ArtifexSoftware/mupdf/commit/7153308d4a9bb08c481991ea974a3daeb77bde2c | A vulnerability exists where a buffer is not marked with fz_var(), which can lead to the use of a freed pointer. |
arvo:46543 | n132/arvo:46543-vul | /src/gstreamer | [
{
"end_line": 207,
"function_name": "gst_sub_parse_data_format_autodetect",
"start_line": 96,
"target_file": "/src/gstreamer/subprojects/gst-plugins-base/gst/subparse/gstsubparseelement.c"
}
] | Heap-buffer-overflow READ 1 | gstreamer | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/typefind
0:00:00.029101411 [33m33260[00m 0x619000008860 [31;01mERROR [00m [00;01;36m GST_PLUGIN_LOADING gstpluginloader.c:442:gst_plugin_loader_try_helper:[00m Spawning gst-plugin-scanner helper failed: Failed to execute child proce... | c | aa121fd12053ba14dc30631ec4778965134bd68d | https://gitlab.freedesktop.org/gstreamer/gstreamer.gitc2ac57f6c970ab6129507bb04bcea47a693ab17f | A vulnerability exists in subparse where, if the length of the string is 0, the code attempts to access str[len - 1], which resolves to str[-1]. This results in an invalid string index. |
arvo:46615 | n132/arvo:46615-vul | /src/libraw | [
{
"end_line": 523,
"function_name": "LibRaw::phase_one_correct",
"start_line": 198,
"target_file": "/src/libraw/src/decoders/load_mfbacks.cpp"
}
] | Use-of-uninitialized-value | libraw | msan | INFO: Seed: 2555088338
INFO: Loaded 1 modules (19249 inline 8-bit counters): 19249 [0xbd7310, 0xbdbe41),
INFO: Loaded 1 PC tables (19249 PCs): 19249 [0x8e4d78,0x930088),
/out/libraw_cr2_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
unknown file: data corrupted at 32924
==54051==WARNING: MemorySanitizer... | cpp | b979a78cb8f3c7dbcebd51532881ac368c79ecce | https://github.com/libraw/libraw/commit/ce2250c6645897d1ff6a44c8167dde76730a0372 | A use-of-uninitialized-value vulnerability exists in the function LibRaw::phase_one_flat_field. When LibRaw::read_shorts fails to read from the stream because it is already at EOF, it does not initialize the output pixel buffer. The uninitialized buffer is then used, for example, in the following code:
```cpp
ushor... |
arvo:46653 | n132/arvo:46653-vul | /src/opensc | [
{
"end_line": 645,
"function_name": "sc_pkcs15init_delete_by_path",
"start_line": 570,
"target_file": "/src/opensc/src/pkcs15init/pkcs15-lib.c"
}
] | Heap-buffer-overflow READ 1 | opensc | asan | Reading 130885 bytes from /tmp/poc
=================================================================
==41409==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6150000020fe at pc 0x0000004e453c bp 0x7fff48522270 sp 0x7fff48522268
READ of size 1 at 0x6150000020fe thread T0
SCARINESS: 12 (1-byte-read-heap-buffer... | c | 9035200bb931ef11a422854435079824fb9ae580 | https://github.com/OpenSC/OpenSC/commit/1e6558ad6fb4cb508bd6a9d115e0899eaf6d3926 | A heap-buffer-overflow vulnerability exists in the function sc_pkcs15init_delete_by_path due to insufficient input checking, which allows out-of-bounds memory reads. |
arvo:46734 | n132/arvo:46734-vul | /src/ghostpdl | [
{
"end_line": 1326,
"function_name": "chunk_free_object",
"start_line": 1073,
"target_file": "/src/ghostpdl/base/gsmchunk.c"
}
] | Segv on unknown address | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3667824308
INFO: Loaded 3 modules (183400 inline 8-bit counters): 13708 [0x7f31755249e0, 0x7f3175527f6c), 959 [0x7f3175585a40, 0x7f3175585dff), 168733 [0x3139510, 0x316282d),
INFO: Loaded 3 PC tables (183400 PCs): 13708 [0x7f3175527f70,0x7f317555d83... | cpp | 7286646aff85378100d2000d25cfdc0cc034016f | https://github.com/ArtifexSoftware/ghostpdl/commit/479649281467ca84a220873d51c7a461b5a78104 | A vulnerability exists due to inconsistency between the chunk allocating and freeing code in identifying single object chunks, where the allocating code uses the "padded" size and the freeing code also uses the "padded" size. This mismatch causes confusion with other areas in the code, leading to potential segmentation... |
arvo:46779 | n132/arvo:46779-vul | /src/sleuthkit | [
{
"end_line": 3360,
"function_name": "ntfs_load_bmap",
"start_line": 3239,
"target_file": "/src/sleuthkit/tsk/fs/ntfs.c"
}
] | Heap-buffer-overflow READ 1 | sleuthkit | asan | =================================================================
==19641==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000003bc0 at pc 0x00000057694a bp 0x7ffc6f8bad60 sp 0x7ffc6f8bad58
READ of size 1 at 0x619000003bc0 thread T0
SCARINESS: 22 (1-byte-read-heap-buffer-overflow-far-from-bounds)
#0 0... | cpp | 3bb323fbd6d56ec5d78e3c512bbb12c61e767530 | https://github.com/sleuthkit/sleuthkit/commit/803484dc3e71379d1cc3e3a2f0c56e3891b1c7bd | A heap-buffer-overflow READ occurs in the ntfs_make_data_run function. |
arvo:46852 | n132/arvo:46852-vul | /src/opensc | [
{
"end_line": 665,
"function_name": "sc_pkcs15_decode_pubkey_ec",
"start_line": 635,
"target_file": "/src/opensc/src/libopensc/pkcs15-pubkey.c"
}
] | UNKNOWN READ | opensc | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2695718671
INFO: Loaded 1 modules (40863 inline 8-bit counters): 40863 [0xefd950, 0xf078ef),
INFO: Loaded 1 PC tables (40863 PCs): 40863 [0xd314d0,0xdd0ec0),
/out/fuzz_pkcs15_decode: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitiz... | c | 64be6695cee03655e489ffc11a9fd97f2b534285 | https://github.com/OpenSC/OpenSC/commit/0ed4b62ae9cd7104706b779fd50bb65385443310 | The vulnerability allows accessing the data length before accessing the buffer in the function sc_pkcs15_decode_pubkey_ec, which can lead to an unknown read. |
arvo:46983 | n132/arvo:46983-vul | /src/libredwg | [
{
"end_line": 906,
"function_name": "decode_preR13",
"start_line": 611,
"target_file": "/src/libredwg/src/decode_r11.c"
}
] | Heap-buffer-overflow WRITE 4 | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2125862456
INFO: Loaded 1 modules (554152 inline 8-bit counters): 554152 [0x4926a80, 0x49adf28),
INFO: Loaded 1 PC tables (554152 PCs): 554152 [0x3e27228,0x469bca8),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | c | 713feac0b0171591692078d4836275853ff57839 | https://github.com/LibreDWG/libredwg/commit/580e8bbebf18579b97e2c20b032368b9079624ca | null |
arvo:47143 | n132/arvo:47143-vul | /src/opensc | [
{
"end_line": 1894,
"function_name": "change_pin",
"start_line": 1800,
"target_file": "/src/opensc/src/tools/pkcs15-tool.c"
}
] | Invalid-free | opensc | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 396409140
INFO: Loaded 1 modules (42029 inline 8-bit counters): 42029 [0xf59af0, 0xf63f1d),
INFO: Loaded 1 PC tables (42029 PCs): 42029 [0xd71770,0xe15a40),
/out/fuzz_pkcs15_tool: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================... | c | 3ac2fa475c6576f11a4f8305ae78300d5012410e | https://github.com/OpenSC/OpenSC/commit/3d261b9a7f4b056b5b342c8b6ca1a5b1d91ee01e | A vulnerability exists in pkcs15-tool where the code attempts to free the PIN without checking if it was allocated, potentially leading to undefined behavior or a crash. |
arvo:47157 | n132/arvo:47157-vul | /src/ghostpdl | [
{
"end_line": 408,
"function_name": "pdfi_t1_decode_pfb",
"start_line": 365,
"target_file": "/src/ghostpdl/pdf/pdf_font1.c"
}
] | Heap-buffer-overflow READ 1 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2777534463
INFO: Loaded 3 modules (183519 inline 8-bit counters): 13708 [0x7f4c24b349e0, 0x7f4c24b37f6c), 959 [0x7f4c24b95a40, 0x7f4c24b95dff), 168852 [0x313e870, 0x3167c04),
INFO: Loaded 3 PC tables (183519 PCs): 13708 [0x7f4c24b37f70,0x7f4c24b6d83... | cpp | a8a209fcedc2b716484b2205b7203c9836f4aa28 | https://github.com/ArtifexSoftware/ghostpdl/commit/12532548a94c94821da0238b84c04b918659eb4a | A buffer limit is not properly enforced when decoding pfb font streams, potentially allowing out-of-bounds access. |
arvo:47213 | n132/arvo:47213-vul | /src/mruby | [
{
"end_line": 579,
"function_name": "mrb_funcall_with_block",
"start_line": 495,
"target_file": "/src/mruby/src/vm.c"
}
] | Heap-use-after-free READ 8 | mruby | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/mruby_proto_fuzzer
=================================================================
==2141==ERROR: AddressSanitizer: heap-use-after-free on address 0x619000002250 at pc 0x00000049f3f1 bp 0x7fffbdb30c30 sp 0x7fffbdb303f8
READ of size 8 at 0... | cpp | 49b8cef31f01c0d88d874e17714dff1fa5b85df0 | https://github.com/mruby/mruby/commit/c32cac6e59a899497c603025b74fcfd316282f36 | A vulnerability exists where the pointer on the VM stack is not adjusted after calling `mrb_stack_extend()` if necessary, potentially leading to incorrect stack behavior. |
arvo:47342 | n132/arvo:47342-vul | /src/opencv | [
{
"end_line": 1150,
"function_name": "opj_jp2_apply_pclr",
"start_line": 1036,
"target_file": "/src/opencv/3rdparty/openjpeg/openjp2/jp2.c"
}
] | Heap-buffer-overflow READ 4 | opencv | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/imdecode_fuzzer < INPUT_FILE
or
/out/imdecode_fuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/imdecode_... | cpp | 206a3fcea8c036cc0d100878c420c50072b7edbb | https://github.com/opencv/opencv/commit/6dfa647f05cc3041b10325b9f3285df60dab1ecc | null |
arvo:47443 | n132/arvo:47443-vul | /src/moddable | [
{
"end_line": 1408,
"function_name": "fxGetNextTokenAux",
"start_line": 861,
"target_file": "/src/moddable/xs/sources/xsLexical.c"
}
] | Heap-buffer-overflow WRITE 1 | moddable | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1976250651
INFO: Loaded 1 modules (34435 inline 8-bit counters): 34435 [0xb05aa0, 0xb0e123),
INFO: Loaded 1 PC tables (34435 PCs): 34435 [0x9ea4f0,0xa70d20),
/out/xst: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=============================... | c | d0a8137a34a33b5fee83191454aedb9ee27f6b36 | https://github.com/Moddable-OpenSource/moddable/commit/05f55eeb219ff43373eebe904819c55276b3e393 | null |
arvo:47483 | n132/arvo:47483-vul | /src/openexr | [
{
"end_line": 695,
"function_name": "compute_chunk_unpack_size",
"start_line": 668,
"target_file": "/src/openexr/src/lib/OpenEXRCore/chunk.c"
}
] | Heap-buffer-overflow READ 4 | openexr | asan | =================================================================
==1176==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000117 at pc 0x000000888e69 bp 0x7ffdecef89c0 sp 0x7ffdecef89b8
READ of size 4 at 0x603000000117 thread T0
SCARINESS: 17 (4-byte-read-heap-buffer-overflow)
#0 0x888e68 in unalig... | cpp | c5763cfdf59ef4880dacdb11664782822a0976cd | https://github.com/AcademySoftwareFoundation/openexr/commit/7629dad94ac310a285099f488618cbebc5eb9a85 | null |
arvo:47499 | n132/arvo:47499-vul | /src/ghostpdl | [
{
"end_line": 765,
"function_name": "read_xref_section",
"start_line": 636,
"target_file": "/src/ghostpdl/pdf/pdf_xref.c"
}
] | UNKNOWN READ | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3331504040
INFO: Loaded 3 modules (185810 inline 8-bit counters): 13708 [0x7f29af50a9e0, 0x7f29af50df6c), 959 [0x7f29af56ba40, 0x7f29af56bdff), 171143 [0x3159ba0, 0x3183827),
INFO: Loaded 3 PC tables (185810 PCs): 13708 [0x7f29af50df70,0x7f29af54383... | cpp | 3722c050513e66c7aeaa63981e4e9f03ee0a3491 | https://github.com/ArtifexSoftware/ghostpdl/commit/7ab96e83d85165801894e887816db6042ea2f9be | null |
arvo:47501 | n132/arvo:47501-vul | /src/ghostpdl | [
{
"end_line": 765,
"function_name": "read_xref_section",
"start_line": 636,
"target_file": "/src/ghostpdl/pdf/pdf_xref.c"
}
] | Heap-buffer-overflow READ 8 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2657265462
INFO: Loaded 3 modules (185810 inline 8-bit counters): 13708 [0x7f6cf695e9e0, 0x7f6cf6961f6c), 959 [0x7f6cf69bfa40, 0x7f6cf69bfdff), 171143 [0x3159ba0, 0x3183827),
INFO: Loaded 3 PC tables (185810 PCs): 13708 [0x7f6cf6961f70,0x7f6cf699783... | cpp | 3722c050513e66c7aeaa63981e4e9f03ee0a3491 | https://github.com/ArtifexSoftware/ghostpdl/commit/7ab96e83d85165801894e887816db6042ea2f9be | null |
arvo:47512 | n132/arvo:47512-vul | /src/opensc | [
{
"end_line": 107,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 29,
"target_file": "/src/opensc/src/tests/fuzzing/fuzz_card.c"
}
] | Stack-buffer-overflow READ 1 | opensc | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3679070911
INFO: Loaded 1 modules (40997 inline 8-bit counters): 40997 [0xf05130, 0xf0f155),
INFO: Loaded 1 PC tables (40997 PCs): 40997 [0xd37bb0,0xdd7e00),
/out/fuzz_card: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=======================... | c | 26a7dceb7b2adb8162a3a8cd888d3ef16b24c76b | https://github.com/OpenSC/OpenSC/commit/74a8f296e0f195916d28e1c928f457e04aa22892 | The vulnerability allows fuzzing input to be used as the output buffer in fuzz_card, potentially leading to unintended behavior or security issues. |
arvo:47521 | n132/arvo:47521-vul | /src/opensc | [
{
"end_line": 236,
"function_name": "test_init_pin",
"start_line": 211,
"target_file": "/src/opensc/src/tests/fuzzing/fuzz_pkcs11.c"
}
] | Heap-buffer-overflow READ 4 | opensc | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1184833423
INFO: Loaded 1 modules (45689 inline 8-bit counters): 45689 [0x100cd90, 0x1018009),
INFO: Loaded 1 PC tables (45689 PCs): 45689 [0xe0cb10,0xebf2a0),
/out/fuzz_pkcs11: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===================... | c | 0863f2a2e70c5462e099f8a930b587f0d0526221 | https://github.com/OpenSC/OpenSC/commit/27e3db8b142522d7367cc446283fb07d855443d7 | null |
arvo:4764 | n132/arvo:4764-vul | /src/open62541 | [
{
"end_line": 669,
"function_name": "UA_MessageContext_abort",
"start_line": 665,
"target_file": "/src/open62541/src/ua_securechannel.c"
}
] | Heap-use-after-free WRITE 4 | open62541 | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_binary_message < INPUT_FILE
or
/out/fuzz_binary_message INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/f... | cpp | 334e25a86d977e389fabe3006be3ff1a40c16ddb | https://github.com/open62541/open62541/commit/6f689994e1e530142d01988659ac1b1d7dbd7237 | null |
arvo:47769 | n132/arvo:47769-vul | /src/opensc | [
{
"end_line": 438,
"function_name": "myeid_new_file",
"start_line": 371,
"target_file": "/src/opensc/src/pkcs15init/pkcs15-myeid.c"
}
] | Heap-buffer-overflow WRITE {*} | opensc | asan | Reading 172 bytes from /tmp/poc
=================================================================
==41686==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6140000001f8 at pc 0x0000004a091a bp 0x7ffeb615f990 sp 0x7ffeb615f158
WRITE of size 190 at 0x6140000001f8 thread T0
SCARINESS: 45 (multi-byte-write-heap-b... | c | 3065bb803e10af08352f4eb7c2056f6a5a21efa8 | https://github.com/OpenSC/OpenSC/commit/367c3ad2ef2c10cb29602f72163e7fb23c3f5827 | null |
arvo:4790 | n132/arvo:4790-vul | /src/wpantund | [
{
"end_line": 3374,
"function_name": "SpinelNCPInstance::handle_ncp_spinel_callback",
"start_line": 3283,
"target_file": "/src/wpantund/src/ncp-spinel/SpinelNCPInstance.cpp"
}
] | UNKNOWN READ | wpantund | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/wpantund-fuzz < INPUT_FILE
or
/out/wpantund-fuzz INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/wpantund-fuzz... | cpp | 2f5c217710ab0038d0d0fe838d47b7f88d0acf36 | https://github.com/openthread/wpantund/commit/7838e0c00a8599cc964cdd19c972ebaeb17bfcbe | A use-of-uninitialized-memory issue exists, where uninitialized memory is accessed during execution. |
arvo:47961 | n132/arvo:47961-vul | /src/file | [
{
"end_line": 213,
"function_name": "json_parse_array",
"start_line": 178,
"target_file": "/src/file/src/is_json.c"
}
] | Heap-buffer-overflow READ 1 | file | asan | Running LLVMFuzzerInitialize ...
continue...
=================================================================
==9832==ERROR: AddressSanitizer: use-after-poison on address 0x7ff0b579a802 at pc 0x00000052a995 bp 0x7ffe53523030 sp 0x7ffe53523028
READ of size 1 at 0x7ff0b579a802 thread T0
SCARINESS: 22 (1-byte-read-use-af... | cpp | 87060b287acdc06297bb73e668445e57023f3a75 | https://github.com/file/file/commit/46976e05f97e4b2bc77476a16f7107ff0be12df1 | null |
arvo:47986 | n132/arvo:47986-vul | /src/libical | [
{
"end_line": 424,
"function_name": "simple_str_to_doublestr",
"start_line": 365,
"target_file": "/src/libical/src/libical/icalvalue.c"
}
] | Stack-buffer-overflow WRITE 1 | libical | asan | =================================================================
==2649==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f76fa0eb860 at pc 0x00000054865c bp 0x7ffdad497430 sp 0x7ffdad497428
WRITE of size 1 at 0x7f76fa0eb860 thread T0
SCARINESS: 46 (1-byte-write-stack-buffer-overflow)
#0 0x54865b in si... | cpp | a8ef3de84cc5740978a49dcf7b8eeb2cd5fc6cb8 | https://github.com/libical/libical/commit/d86a86dbcddba0414f0dea13c3357f1c38826cb2 | A stack-buffer-overflow occurs in the function simple_str_to_doublestr. |
arvo:48000 | n132/arvo:48000-vul | /src/opensc | [
{
"end_line": 438,
"function_name": "myeid_new_file",
"start_line": 371,
"target_file": "/src/opensc/src/pkcs15init/pkcs15-myeid.c"
}
] | Index-out-of-bounds | opensc | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3310810178
INFO: Loaded 1 modules (107558 inline 8-bit counters): 107558 [0x112e300, 0x1148726),
INFO: Loaded 1 PC tables (107558 PCs): 107558 [0xcfed18,0xea2f78),
/out/fuzz_pkcs15init: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
pkcs15-myei... | c | 3065bb803e10af08352f4eb7c2056f6a5a21efa8 | https://github.com/OpenSC/OpenSC/commit/367c3ad2ef2c10cb29602f72163e7fb23c3f5827 | null |
arvo:48029 | n132/arvo:48029-vul | /src/libjxl | [
{
"end_line": 1702,
"function_name": "ParseBoxHeader",
"start_line": 1674,
"target_file": "/src/libjxl/lib/jxl/decode.cc"
}
] | Heap-buffer-overflow READ {*} | libjxl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3086352812
INFO: Loaded 1 modules (27141 inline 8-bit counters): 27141 [0x55b5495fcd98, 0x55b54960379d),
INFO: Loaded 1 PC tables (27141 PCs): 27141 [0x55b5496037a0,0x55b54966d7f0),
/out/djxl_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/p... | cpp | ca8e276aacf63a752346a6a44ba673b0af993237 | https://github.com/libjxl/libjxl/commit/746d1f5e8498f501238894899c301e70ea57e2aa | null |
arvo:48069 | n132/arvo:48069-vul | /src/freeradius-server | [
{
"end_line": 138,
"function_name": "fr_size_from_str",
"start_line": 40,
"target_file": "/src/freeradius-server/src/lib/util/size.c"
}
] | Heap-buffer-overflow READ 1 | freeradius-server | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3615774117
INFO: Loaded 2 modules (18103 inline 8-bit counters): 18054 [0x7f9df3051f18, 0x7f9df305659e), 49 [0x5c0658, 0x5c0689),
INFO: Loaded 2 PC tables (18103 PCs): 18054 [0x7f9df30565a0,0x7f9df309ce00), 49 [0x5c0690,0x5c09a0),
/out/fuzzer_util:... | c | 9f12c1ae7787707acad0e5bf4bcba8cd3ee44109 | https://github.com/FreeRADIUS/freeradius-server/commit/ddfd3a99268136d4c321fa9e2fc38c2d2b8e329d | null |
arvo:4812 | n132/arvo:4812-vul | /src/librawspeed | [
{
"end_line": 64,
"function_name": "FujiDecompressor::FujiDecompressor",
"start_line": 38,
"target_file": "/src/librawspeed/src/librawspeed/decompressors/FujiDecompressor.cpp"
}
] | Use-after-poison WRITE 2 | librawspeed | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/FujiDecompressorFuzzer < INPUT_FILE
or
/out/FujiDecompressorFuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] ... | cpp | f6a608b1a9ee4001c62515539629f18e6c7a9332 | https://github.com/darktable-org/rawspeed/commit/2d8507d1909829e9151fac73ffc0d20f691f558c | The FujiDecompressor fails to sanitize the cpp and bpp values. |
arvo:48123 | n132/arvo:48123-vul | /src/libjxl | [
{
"end_line": 1702,
"function_name": "ParseBoxHeader",
"start_line": 1674,
"target_file": "/src/libjxl/lib/jxl/decode.cc"
}
] | Heap-buffer-overflow READ 8 | libjxl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1596570437
INFO: Loaded 1 modules (27141 inline 8-bit counters): 27141 [0x5631a4043d98, 0x5631a404a79d),
INFO: Loaded 1 PC tables (27141 PCs): 27141 [0x5631a404a7a0,0x5631a40b47f0),
/out/djxl_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/p... | cpp | ca8e276aacf63a752346a6a44ba673b0af993237 | https://github.com/libjxl/libjxl/commit/746d1f5e8498f501238894899c301e70ea57e2aa | null |
arvo:4822 | n132/arvo:4822-vul | /src/librawspeed | [
{
"end_line": 74,
"function_name": "FujiDecompressor::FujiDecompressor",
"start_line": 38,
"target_file": "/src/librawspeed/src/librawspeed/decompressors/FujiDecompressor.cpp"
}
] | Unknown-crash READ 8 | librawspeed | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/FujiDecompressorFuzzer < INPUT_FILE
or
/out/FujiDecompressorFuzzer INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] ... | cpp | bcd1c6fa54908199b1fba6d0dd38f9bf6c51a4ce | https://github.com/darktable-org/rawspeed/commit/404b736883726778fd8d99776d0c28652394711d | The FujiDecompressor does not properly check which CFA colors are present. |
arvo:48305 | n132/arvo:48305-vul | /src/ghostpdl | [
{
"end_line": 897,
"function_name": "default_subclass_finalize",
"start_line": 867,
"target_file": "/src/ghostpdl/base/gdevsclass.c"
}
] | Heap-use-after-free READ 8 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2680786906
INFO: Loaded 3 modules (184478 inline 8-bit counters): 13708 [0x7f5f63b6b9e0, 0x7f5f63b6ef6c), 959 [0x7f5f63bcca40, 0x7f5f63bccdff), 169811 [0x312d9e0, 0x3157133),
INFO: Loaded 3 PC tables (184478 PCs): 13708 [0x7f5f63b6ef70,0x7f5f63ba483... | cpp | 6f4326ab21ae055610c72222da4ab2ac26007589 | https://github.com/ArtifexSoftware/ghostpdl/commit/b609c25f7f881bea4b10c8e1b9b950b635437320 | The .currentoutputdevice (custom) operator allows the PostScript VM to retain a reference to the "child" of a subclassed device. During error conditions, this reference may persist beyond the unsubclass operation, resulting in the "child" device being freed while an active reference still exists. This can lead to use-a... |
arvo:48329 | n132/arvo:48329-vul | /src/yara | [
{
"end_line": 617,
"function_name": "read_blob_signed",
"start_line": 550,
"target_file": "/src/yara/libyara/modules/dotnet/dotnet.c"
}
] | Heap-buffer-overflow READ 4 | yara | asan | Running LLVMFuzzerInitialize ...
continue...
=================================================================
==25008==ERROR: AddressSanitizer: use-after-poison on address 0x7f06ae2eddb1 at pc 0x00000057d8f5 bp 0x7ffead703b10 sp 0x7ffead703b08
READ of size 4 at 0x7f06ae2eddb1 thread T0
SCARINESS: 27 (4-byte-read-use-a... | cpp | fd8921c2cd50cd21aa229c65e5f72697a80a4ba0 | https://github.com/VirusTotal/yara/commit/86b0e3f7c7fc2c689db88972221b5d4da1c7214f | null |
arvo:48589 | n132/arvo:48589-vul | /src/espeak-ng | [
{
"end_line": 987,
"function_name": "ReadClause",
"start_line": 467,
"target_file": "/src/espeak-ng/src/libespeak-ng/readclause.c"
}
] | Heap-buffer-overflow READ 1 | espeak-ng | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3869416498
INFO: Loaded 1 modules (10294 inline 8-bit counters): 10294 [0x8bf560, 0x8c1d96),
INFO: Loaded 1 PC tables (10294 PCs): 10294 [0x8c1d98,0x8ea0f8),
/out/ssml-fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=====================... | c | 0fa9737a002cc9c99330f32b650e8804241e7436 | https://github.com/espeak-ng/espeak-ng/commit/482ee1da05189252c3dee49514506e1d2271a2c0 | null |
arvo:48736 | n132/arvo:48736-vul | /src/file | [
{
"end_line": 340,
"function_name": "json_parse_const",
"start_line": 322,
"target_file": "/src/file/src/is_json.c"
}
] | Heap-buffer-overflow READ 1 | file | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2834810799
INFO: Loaded 1 modules (5200 inline 8-bit counters): 5200 [0x665930, 0x666d80),
INFO: Loaded 1 PC tables (5200 PCs): 5200 [0x666d80,0x67b280),
/out/magic_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
========================... | cpp | 441ac2b15508909e82ad467960df4ac0adf9644c | https://github.com/file/file/commit/16756ff9286df9a43b4b6e21824975a1c6809835 | A vulnerability exists where the pointer *ucp can move past ue, potentially leading to out-of-bounds access. |
arvo:48745 | n132/arvo:48745-vul | /src/ghostpdl | [
{
"end_line": 1448,
"function_name": "gs_fapi_ft_get_scaled_font",
"start_line": 1126,
"target_file": "/src/ghostpdl/base/fapi_ft.c"
}
] | Heap-use-after-free READ 1 | ghostpdl | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/gs_device_pxlmono_fuzzer
=================================================================
==22130==ERROR: AddressSanitizer: heap-use-after-free on address 0x633000000850 at pc 0x000000a86916 bp 0x7ffe4db7f910 sp 0x7ffe4db7f908
READ of size... | cpp | 93f5cf520bf1b1f85029e0df20932a651887098b | https://github.com/ArtifexSoftware/ghostpdl/commit/6fd0c14775db5d10563f8b0401ee9f3f6bd29310 | null |
arvo:48746 | n132/arvo:48746-vul | /src/ghostpdl | [
{
"end_line": 1448,
"function_name": "gs_fapi_ft_get_scaled_font",
"start_line": 1126,
"target_file": "/src/ghostpdl/base/fapi_ft.c"
}
] | Segv on unknown address | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 748211
INFO: Loaded 3 modules (202826 inline 8-bit counters): 13708 [0x7f2a042c29e0, 0x7f2a042c5f6c), 959 [0x7f2a04323a40, 0x7f2a04323dff), 188159 [0x344bf90, 0x3479e8f),
INFO: Loaded 3 PC tables (202826 PCs): 13708 [0x7f2a042c5f70,0x7f2a042fb830), ... | cpp | 93f5cf520bf1b1f85029e0df20932a651887098b | https://github.com/ArtifexSoftware/ghostpdl/commit/6fd0c14775db5d10563f8b0401ee9f3f6bd29310 | null |
arvo:48749 | n132/arvo:48749-vul | /src/ghostpdl | [
{
"end_line": 1448,
"function_name": "gs_fapi_ft_get_scaled_font",
"start_line": 1126,
"target_file": "/src/ghostpdl/base/fapi_ft.c"
}
] | Memcpy-param-overlap | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1956776526
INFO: Loaded 3 modules (202817 inline 8-bit counters): 13708 [0x7f5fa56679e0, 0x7f5fa566af6c), 959 [0x7f5fa56c8a40, 0x7f5fa56c8dff), 188150 [0x344bfd0, 0x3479ec6),
INFO: Loaded 3 PC tables (202817 PCs): 13708 [0x7f5fa566af70,0x7f5fa56a083... | cpp | 93f5cf520bf1b1f85029e0df20932a651887098b | https://github.com/ArtifexSoftware/ghostpdl/commit/6fd0c14775db5d10563f8b0401ee9f3f6bd29310 | null |
arvo:48866 | n132/arvo:48866-vul | /src/mruby | [
{
"end_line": 517,
"function_name": "udiv",
"start_line": 409,
"target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c"
}
] | UNKNOWN WRITE | mruby | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3420901223
INFO: Loaded 1 modules (25901 inline 8-bit counters): 25901 [0x7067c0, 0x70cced),
INFO: Loaded 1 PC tables (25901 PCs): 25901 [0x61d100,0x6823d0),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSan... | c | a64d2bfbe67ce0520cdd9bb72ac8b9194269927a | https://github.com/mruby/mruby/commit/a40842eb73164254f465ce5bac74045200e5acb0 | null |
arvo:48873 | n132/arvo:48873-vul | /src/mruby | [
{
"end_line": 691,
"function_name": "mpz_init_set_str",
"start_line": 643,
"target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c"
}
] | Heap-use-after-free READ 1 | mruby | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/mruby_fuzzer
AddressSanitizer:DEADLYSIGNAL
=================================================================
==2132==ERROR: AddressSanitizer: SEGV on unknown address 0x60cfffffffc1 (pc 0x000000559358 bp 0x7ffed6b479b0 sp 0x7ffed6b47840 T0)
... | c | a64d2bfbe67ce0520cdd9bb72ac8b9194269927a | https://github.com/mruby/mruby/commit/a40842eb73164254f465ce5bac74045200e5acb0 | null |
arvo:48877 | n132/arvo:48877-vul | /src/mruby | [
{
"end_line": 1848,
"function_name": "cmpnum",
"start_line": 1800,
"target_file": "/src/mruby/src/numeric.c"
}
] | UNKNOWN READ | mruby | asan | INFO: found LLVMFuzzerCustomMutator (0x55fbb0). Disabling -len_control by default.
INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2605134212
INFO: Loaded 1 modules (27054 inline 8-bit counters): 27054 [0xb561f8, 0xb5cba6),
INFO: Loaded 1 PC tables (27054 PCs): 27054 [0x9c2c48,0xa2c728),
/out/mr... | cpp | 872020bb3d85ba4066ec19cfcad375e51fdf024b | https://github.com/mruby/mruby/commit/960021e51989881c06c7c87b2661440c1fb2a784 | A vulnerability exists in numeric.c within the cmpnum function, where mrb_bigint_cmp() is incorrectly called if v2 is bigint instead of v1. |
arvo:48884 | n132/arvo:48884-vul | /src/lz4 | [
{
"end_line": 116,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 15,
"target_file": "/src/lz4/ossfuzz/round_trip_fuzzer.c"
}
] | Invalid-free | lz4 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3405088394
INFO: Loaded 1 modules (7444 inline 8-bit counters): 7444 [0x677070, 0x678d84),
INFO: Loaded 1 PC tables (7444 PCs): 7444 [0x6135d0,0x630710),
/out/round_trip_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===================... | c | 9d20cd519ae62c8864ab237068e4c11490cbd0a9 | https://github.com/lz4/lz4/commit/910ec80d2856cfa825e2230ff2de8347a4fa4522 | null |
arvo:48904 | n132/arvo:48904-vul | /src/mruby | [
{
"end_line": 517,
"function_name": "udiv",
"start_line": 409,
"target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c"
}
] | UNKNOWN WRITE | mruby | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3137584556
INFO: Loaded 1 modules (25901 inline 8-bit counters): 25901 [0x7067c0, 0x70cced),
INFO: Loaded 1 PC tables (25901 PCs): 25901 [0x61d100,0x6823d0),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
UndefinedBehaviorSan... | c | a64d2bfbe67ce0520cdd9bb72ac8b9194269927a | https://github.com/mruby/mruby/commit/a40842eb73164254f465ce5bac74045200e5acb0 | null |
arvo:48940 | n132/arvo:48940-vul | /src/opensc | [
{
"end_line": 236,
"function_name": "test_init_pin",
"start_line": 211,
"target_file": "/src/opensc/src/tests/fuzzing/fuzz_pkcs11.c"
}
] | Heap-buffer-overflow READ 4 | opensc | asan | =================================================================
==41686==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000032 at pc 0x00000049f7d1 bp 0x7fff7525f9d0 sp 0x7fff7525f198
READ of size 4 at 0x602000000032 thread T0
SCARINESS: 17 (4-byte-read-heap-buffer-overflow)
#0 0x49f7d0 in __asa... | c | 0863f2a2e70c5462e099f8a930b587f0d0526221 | https://github.com/OpenSC/OpenSC/commit/27e3db8b142522d7367cc446283fb07d855443d7 | null |
arvo:49045 | n132/arvo:49045-vul | /src/mruby | [
{
"end_line": 1809,
"function_name": "int_to_s",
"start_line": 1802,
"target_file": "/src/mruby/src/numeric.c"
}
] | Heap-buffer-overflow WRITE 1 | mruby | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2099472400
INFO: Loaded 1 modules (23005 inline 8-bit counters): 23005 [0x92e6d0, 0x9340ad),
INFO: Loaded 1 PC tables (23005 PCs): 23005 [0x80aa38,0x864808),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
====================... | c | bae11ef68971ce08bf32ab6bd930615ad3dd7fbd | https://github.com/mruby/mruby/commit/37c2f080f09390105956edb2565627f29281e24e | A vulnerability in numeric.c within the int_to_s function allows bypassing the base range check. |
arvo:49049 | n132/arvo:49049-vul | /src/libjxl | [
{
"end_line": 789,
"function_name": "LowMemoryRenderPipeline::ProcessBuffers",
"start_line": 708,
"target_file": "/src/libjxl/lib/jxl/render_pipeline/low_memory_render_pipeline.cc"
}
] | Heap-buffer-overflow WRITE {*} | libjxl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2046772934
INFO: Loaded 1 modules (25656 inline 8-bit counters): 25656 [0x56131d23e418, 0x56131d244850),
INFO: Loaded 1 PC tables (25656 PCs): 25656 [0x56131d244850,0x56131d2a8bd0),
/out/djxl_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/p... | cpp | ca1aa63eb1df8d7f51641bf4c61e94f6a3367823 | https://github.com/libjxl/libjxl/commit/6140e82cbbf79a360adf8a75e11e8d76847dbcca | null |
arvo:49248 | n132/arvo:49248-vul | /src/opensc | [
{
"end_line": 563,
"function_name": "cardos_list_files",
"start_line": 495,
"target_file": "/src/opensc/src/libopensc/card-cardos.c"
}
] | Stack-buffer-overflow READ 1 | opensc | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2534427911
INFO: Loaded 1 modules (41328 inline 8-bit counters): 41328 [0xf180f0, 0xf22260),
INFO: Loaded 1 PC tables (41328 PCs): 41328 [0xd48010,0xde9710),
/out/fuzz_card: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=======================... | c | 516dc1836ff4dfba72c8227c4e403b5a9dc46a5c | https://github.com/OpenSC/OpenSC/commit/cbe8bbefea36e8980d5a65bc350b317bc0244bb9 | A vulnerability exists where the buffer pointer is not set before parsing ASN1, which can lead to incorrect memory access during ASN1 parsing. |
arvo:49255 | n132/arvo:49255-vul | /src/mruby | [
{
"end_line": 762,
"function_name": "mpz_get_int",
"start_line": 741,
"target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c"
}
] | Heap-buffer-overflow READ 8 | mruby | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/mruby_fuzzer
=================================================================
==2218==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000003938 at pc 0x00000056c3e0 bp 0x7ffc253dad50 sp 0x7ffc253dad48
READ of size 8 at 0x6020... | c | a99d0036222ad4c3a300243113f7afff2618aff9 | https://github.com/mruby/mruby/commit/b84bca666fdc4fe94286b49b6f6b9a64e4c3a534 | null |
arvo:49259 | n132/arvo:49259-vul | /src/mruby | [
{
"end_line": 1987,
"function_name": "gen_assignment",
"start_line": 1808,
"target_file": "/src/mruby/mrbgems/mruby-compiler/core/codegen.c"
}
] | Heap-buffer-overflow WRITE 8 | mruby | asan | =================================================================
==2171==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000000480 at pc 0x0000006423d5 bp 0x7ffe5f2aef50 sp 0x7ffe5f2aef48
WRITE of size 8 at 0x619000000480 thread T0
SCARINESS: 42 (8-byte-write-heap-buffer-overflow)
#0 0x6423d4 in mrb_... | c | b84bca666fdc4fe94286b49b6f6b9a64e4c3a534 | https://github.com/mruby/mruby/commit/2b074893723ebb335e6469c34caa2d8eac05d6ed | A vulnerability exists in codegen.c where stack space for block arguments is not properly maintained. |
arvo:49268 | n132/arvo:49268-vul | /src/mruby | [
{
"end_line": 762,
"function_name": "mpz_get_int",
"start_line": 741,
"target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c"
}
] | Use-of-uninitialized-value | mruby | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1904092509
INFO: Loaded 1 modules (23204 inline 8-bit counters): 23204 [0x99c0d9, 0x9a1b7d),
INFO: Loaded 1 PC tables (23204 PCs): 23204 [0x8de1a8,0x938be8),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==2196==WARNING: Mem... | c | a99d0036222ad4c3a300243113f7afff2618aff9 | https://github.com/mruby/mruby/commit/b84bca666fdc4fe94286b49b6f6b9a64e4c3a534 | null |
arvo:49269 | n132/arvo:49269-vul | /src/mruby | [
{
"end_line": 98,
"function_name": "digits",
"start_line": 89,
"target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c"
}
] | Segv on unknown address | mruby | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2892757898
INFO: Loaded 1 modules (23285 inline 8-bit counters): 23285 [0x932250, 0x937d45),
INFO: Loaded 1 PC tables (23285 PCs): 23285 [0x80bf78,0x866ec8),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEA... | c | 2b074893723ebb335e6469c34caa2d8eac05d6ed | https://github.com/mruby/mruby/commit/cfea0c28a045790388aedf53f1c9a5c43a683dd2 | A security vulnerability exists in bigint.c within the digits function, where zero length bigints are not properly checked. |
arvo:49282 | n132/arvo:49282-vul | /src/mruby | [
{
"end_line": 762,
"function_name": "mpz_get_int",
"start_line": 741,
"target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c"
}
] | Heap-buffer-overflow READ 8 | mruby | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3940527635
INFO: Loaded 1 modules (23204 inline 8-bit counters): 23204 [0x930250, 0x935cf4),
INFO: Loaded 1 PC tables (23204 PCs): 23204 [0x80af78,0x8659b8),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
====================... | c | a99d0036222ad4c3a300243113f7afff2618aff9 | https://github.com/mruby/mruby/commit/b84bca666fdc4fe94286b49b6f6b9a64e4c3a534 | null |
arvo:49291 | n132/arvo:49291-vul | /src/mruby | [
{
"end_line": 762,
"function_name": "mpz_get_int",
"start_line": 741,
"target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c"
}
] | Heap-buffer-overflow READ 8 | mruby | asan | =================================================================
==2174==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000003298 at pc 0x00000058600b bp 0x7ffc369d3230 sp 0x7ffc369d3228
READ of size 8 at 0x602000003298 thread T0
SCARINESS: 23 (8-byte-read-heap-buffer-overflow)
#0 0x58600a in mpz_ge... | c | a99d0036222ad4c3a300243113f7afff2618aff9 | https://github.com/mruby/mruby/commit/b84bca666fdc4fe94286b49b6f6b9a64e4c3a534 | null |
arvo:49357 | n132/arvo:49357-vul | /src/moddable | [
{
"end_line": 1701,
"function_name": "fxGetNextEntity",
"start_line": 1657,
"target_file": "/src/moddable/xs/sources/xsLexical.c"
}
] | Heap-buffer-overflow WRITE 1 | moddable | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2941025888
INFO: Loaded 1 modules (34460 inline 8-bit counters): 34460 [0xb07b20, 0xb101bc),
INFO: Loaded 1 PC tables (34460 PCs): 34460 [0x9eb590,0xa71f50),
/out/xst: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=============================... | c | 2511eda9781bf4cb750a88282bced0a1d4f12fcc | https://github.com/Moddable-OpenSource/moddable/commit/99e56395fb17b9c8c60e2eceae3b484f842a2b20 | null |
arvo:49425 | n132/arvo:49425-vul | /src/mruby | [
{
"end_line": 474,
"function_name": "udiv",
"start_line": 413,
"target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c"
}
] | Heap-buffer-overflow READ 4 | mruby | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 622623107
INFO: Loaded 1 modules (23115 inline 8-bit counters): 23115 [0x92f390, 0x934ddb),
INFO: Loaded 1 PC tables (23115 PCs): 23115 [0x80a0d8,0x864588),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=====================... | c | 657263446ec68d61279dbf029fe2055bd39880b3 | https://github.com/mruby/mruby/commit/7d5475916cdcf4c54952f7c695363f3d3c682ee9 | null |
arvo:49428 | n132/arvo:49428-vul | /src/mruby | [
{
"end_line": 474,
"function_name": "udiv",
"start_line": 413,
"target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c"
}
] | Use-of-uninitialized-value | mruby | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 370393237
INFO: Loaded 1 modules (23115 inline 8-bit counters): 23115 [0x9950e9, 0x99ab34),
INFO: Loaded 1 PC tables (23115 PCs): 23115 [0x8d81e8,0x932698),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==2217==WARNING: Memo... | c | 657263446ec68d61279dbf029fe2055bd39880b3 | https://github.com/mruby/mruby/commit/7d5475916cdcf4c54952f7c695363f3d3c682ee9 | null |
arvo:49453 | n132/arvo:49453-vul | /src/mruby | [
{
"end_line": 198,
"function_name": "ucmp",
"start_line": 184,
"target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c"
}
] | Segv on unknown address | mruby | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2539039750
INFO: Loaded 1 modules (23267 inline 8-bit counters): 23267 [0x932390, 0x937e73),
INFO: Loaded 1 PC tables (23267 PCs): 23267 [0x80c0d8,0x866f08),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEA... | c | e8ce82bf31ab83e3aa4b26dc571704593e2a4ebd | https://github.com/mruby/mruby/commit/26ce85bd5de515906e01fdeeac774316628ad599 | null |
arvo:49455 | n132/arvo:49455-vul | /src/lcms | [
{
"end_line": 479,
"function_name": "CubeSize",
"start_line": 460,
"target_file": "/src/lcms/src/cmslut.c"
}
] | Heap-buffer-overflow READ 2 | lcms | asan | =================================================================
==12997==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000002d6 at pc 0x00000057af4d bp 0x7ffcb213dd80 sp 0x7ffcb213dd78
READ of size 2 at 0x6020000002d6 thread T0
SCARINESS: 14 (2-byte-read-heap-buffer-overflow)
#0 0x57af4c in Tetra... | c | b7e119beadd56e5d6aefcf4a3edee33dc78c92c6 | https://github.com/mm2/Little-CMS/commit/67736fea34fdccab2ac19391d2955d6d6808fe81 | A division by zero is possible due to an incorrect bound check. |
arvo:49461 | n132/arvo:49461-vul | /src/lcms | [
{
"end_line": 2088,
"function_name": "Write16bitTables",
"start_line": 2065,
"target_file": "/src/lcms/src/cmstypes.c"
}
] | Heap-buffer-overflow READ 2 | lcms | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 704089328
INFO: Loaded 1 modules (7676 inline 8-bit counters): 7676 [0x6a3010, 0x6a4e0c),
INFO: Loaded 1 PC tables (7676 PCs): 7676 [0x62fd40,0x64dd00),
/out/cms_profile_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===================... | c | a6ef58ec3716bad934d0cacc063ef1a419f4668f | https://github.com/mm2/Little-CMS/commit/959064542d2ea82f97bb409dda4df471efc53feb | A vulnerability exists when writing profiles if tables have different node count values in the code. Each table may have a different node count number, which can lead to errors during profile writing. |
arvo:49470 | n132/arvo:49470-vul | /src/mruby | [
{
"end_line": 198,
"function_name": "ucmp",
"start_line": 184,
"target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c"
}
] | Segv on unknown address | mruby | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3518357814
INFO: Loaded 1 modules (23267 inline 8-bit counters): 23267 [0x932390, 0x937e73),
INFO: Loaded 1 PC tables (23267 PCs): 23267 [0x80c0d8,0x866f08),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEA... | c | e8ce82bf31ab83e3aa4b26dc571704593e2a4ebd | https://github.com/mruby/mruby/commit/26ce85bd5de515906e01fdeeac774316628ad599 | null |
arvo:49493 | n132/arvo:49493-vul | /src/mruby | [
{
"end_line": 198,
"function_name": "ucmp",
"start_line": 184,
"target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c"
}
] | Segv on unknown address | mruby | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 886142967
INFO: Loaded 1 modules (23267 inline 8-bit counters): 23267 [0x932390, 0x937e73),
INFO: Loaded 1 PC tables (23267 PCs): 23267 [0x80c0d8,0x866f08),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitizer:DEAD... | c | e8ce82bf31ab83e3aa4b26dc571704593e2a4ebd | https://github.com/mruby/mruby/commit/26ce85bd5de515906e01fdeeac774316628ad599 | null |
arvo:49495 | n132/arvo:49495-vul | /src/lcms | [
{
"end_line": 416,
"function_name": "ComputeConversion",
"start_line": 352,
"target_file": "/src/lcms/src/cmscnvrt.c"
}
] | Use-of-uninitialized-value | lcms | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1961875113
INFO: Loaded 1 modules (7671 inline 8-bit counters): 7671 [0x6dcc79, 0x6dea70),
INFO: Loaded 1 PC tables (7671 PCs): 7671 [0x66af70,0x688ee0),
/out/cms_transform_all_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==12983==WAR... | c | 77758b7f815f4ced91e088ce855b31c90ad0a406 | https://github.com/mm2/Little-CMS/commit/b7e119beadd56e5d6aefcf4a3edee33dc78c92c6 | A vulnerability exists where duplicated tags are not checked, allowing profiles with duplicate tags to be processed instead of being discarded. |
arvo:49542 | n132/arvo:49542-vul | /src/mruby | [
{
"end_line": 482,
"function_name": "udiv",
"start_line": 420,
"target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c"
}
] | Use-of-uninitialized-value | mruby | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2094835510
INFO: Loaded 1 modules (23289 inline 8-bit counters): 23289 [0x99b0e9, 0x9a0be2),
INFO: Loaded 1 PC tables (23289 PCs): 23289 [0x8dd1e8,0x938178),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==2123==WARNING: Mem... | c | 9592b7e4ece7b5c7c3e244cbdae59e5afeb52ed7 | https://github.com/mruby/mruby/commit/de2ea3c389e4f5a4b0910fbf203b93d8cf409957 | An integer underflow occurs in the udiv function in bigint.c. |
arvo:49546 | n132/arvo:49546-vul | /src/lcms | [
{
"end_line": 884,
"function_name": "_cmsReadHeader",
"start_line": 764,
"target_file": "/src/lcms/src/cmsio0.c"
}
] | Heap-use-after-free READ 4 | lcms | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2295413016
INFO: Loaded 1 modules (7683 inline 8-bit counters): 7683 [0x831c5d0, 0x831e3d3),
INFO: Loaded 1 PC tables (7683 PCs): 7683 [0x829e63c,0x82ad654),
/out/cms_transform_all_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
========... | c | 89b5f465e5e47d43209b09e4b577b6f09d597cc1 | https://github.com/mm2/Little-CMS/commit/f3f6b7bceb629bc4b6f1dea3e45b44dc3f8674af | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.