task_id stringlengths 8 10 | docker_image stringlengths 17 19 | basedir stringclasses 157
values | target_functions listlengths 1 3 | crash_type stringclasses 85
values | project_name stringclasses 157
values | sanitizer stringclasses 3
values | sanitizer_output stringlengths 1.13k 6.5M | language stringclasses 2
values | vuln_commit stringlengths 40 40 | fix stringlengths 69 110 | vulnerability_description stringlengths 38 824 ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
arvo:49549 | n132/arvo:49549-vul | /src/lcms | [
{
"end_line": 884,
"function_name": "_cmsReadHeader",
"start_line": 764,
"target_file": "/src/lcms/src/cmsio0.c"
}
] | Use-of-uninitialized-value | lcms | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4111556026
INFO: Loaded 1 modules (7688 inline 8-bit counters): 7688 [0x6ddc79, 0x6dfa81),
INFO: Loaded 1 PC tables (7688 PCs): 7688 [0x66bfd0,0x68a050),
/out/cms_transform_all_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==12982==WAR... | cpp | 89b5f465e5e47d43209b09e4b577b6f09d597cc1 | https://github.com/mm2/Little-CMS/commit/f3f6b7bceb629bc4b6f1dea3e45b44dc3f8674af | null |
arvo:49550 | n132/arvo:49550-vul | /src/mruby | [
{
"end_line": 2442,
"function_name": "mrb_vm_exec",
"start_line": 1287,
"target_file": "/src/mruby/src/vm.c"
}
] | UNKNOWN READ | mruby | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 468667285
INFO: Loaded 1 modules (23289 inline 8-bit counters): 23289 [0x99b0e9, 0x9a0be2),
INFO: Loaded 1 PC tables (23289 PCs): 23289 [0x8dd1e8,0x938178),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
MemorySanitizer:DEADL... | c | de2ea3c389e4f5a4b0910fbf203b93d8cf409957 | https://github.com/mruby/mruby/commit/d0780c0525830b51162fd04e5f618181cec8620b | In vm.c, failing to cast bigint length to unsigned causes lengths greater than 127 to be interpreted as negative. |
arvo:49582 | n132/arvo:49582-vul | /src/lcms | [
{
"end_line": 884,
"function_name": "_cmsReadHeader",
"start_line": 764,
"target_file": "/src/lcms/src/cmsio0.c"
}
] | Use-of-uninitialized-value | lcms | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1588127420
INFO: Loaded 1 modules (7688 inline 8-bit counters): 7688 [0x6ddc79, 0x6dfa81),
INFO: Loaded 1 PC tables (7688 PCs): 7688 [0x66bfd0,0x68a050),
/out/cms_transform_all_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==12981==WAR... | cpp | 89b5f465e5e47d43209b09e4b577b6f09d597cc1 | https://github.com/mm2/Little-CMS/commit/f3f6b7bceb629bc4b6f1dea3e45b44dc3f8674af | null |
arvo:49606 | n132/arvo:49606-vul | /src/ghostpdl | [
{
"end_line": 82,
"function_name": "pdfi_repair_add_object",
"start_line": 28,
"target_file": "/src/ghostpdl/pdf/pdf_repair.c"
}
] | UNKNOWN WRITE | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1824331617
INFO: Loaded 3 modules (222176 inline 8-bit counters): 13708 [0x7fb4647969e0, 0x7fb464799f6c), 959 [0x7fb4647f7a40, 0x7fb4647f7dff), 207509 [0x378f530, 0x37c1fc5),
INFO: Loaded 3 PC tables (222176 PCs): 13708 [0x7fb464799f70,0x7fb4647cf83... | cpp | af3fa99aece39bfb83583d28e817c630c269bfea | https://github.com/ArtifexSoftware/ghostpdl/commit/dd907d6d9e772f91a9b652c3e765439f38e7147d | A vulnerability exists where, if an addition to the xref table in the relevant file is rejected because the object number exceeds a 32-bit signed integer, is less than 0, the generation number is less than 0, or the file offset is less than 0, no error is returned. When decoding an object stream, the absence of an erro... |
arvo:49654 | n132/arvo:49654-vul | /src/ghostpdl | [
{
"end_line": 381,
"function_name": "pdfi_open_CIDFont_substitute_file",
"start_line": 180,
"target_file": "/src/ghostpdl/pdf/pdf_font.c"
}
] | Heap-use-after-free READ 1 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 392153004
INFO: Loaded 3 modules (222179 inline 8-bit counters): 13708 [0x7f400b6469e0, 0x7f400b649f6c), 959 [0x7f400b6a7a40, 0x7f400b6a7dff), 207512 [0x378f570, 0x37c2008),
INFO: Loaded 3 PC tables (222179 PCs): 13708 [0x7f400b649f70,0x7f400b67f830... | cpp | 00b46feb7034a46b2933bfadecfdc9bc1091fb99 | https://github.com/ArtifexSoftware/ghostpdl/commit/8958762daf5c75ebd7f076f5140376acd09652b4 | null |
arvo:49662 | n132/arvo:49662-vul | /src/ghostpdl | [
{
"end_line": 381,
"function_name": "pdfi_open_CIDFont_substitute_file",
"start_line": 180,
"target_file": "/src/ghostpdl/pdf/pdf_font.c"
}
] | UNKNOWN READ | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 958780079
INFO: Loaded 3 modules (222179 inline 8-bit counters): 13708 [0x7f85716059e0, 0x7f8571608f6c), 959 [0x7f8571666a40, 0x7f8571666dff), 207512 [0x378f530, 0x37c1fc8),
INFO: Loaded 3 PC tables (222179 PCs): 13708 [0x7f8571608f70,0x7f857163e830... | cpp | 00b46feb7034a46b2933bfadecfdc9bc1091fb99 | https://github.com/ArtifexSoftware/ghostpdl/commit/8958762daf5c75ebd7f076f5140376acd09652b4 | null |
arvo:49698 | n132/arvo:49698-vul | /src/openexr | [
{
"end_line": 1826,
"function_name": "internal_huf_decompress",
"start_line": 1745,
"target_file": "/src/openexr/src/lib/OpenEXRCore/internal_huf.c"
}
] | Heap-buffer-overflow READ 8 | openexr | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 355281388
INFO: Loaded 1 modules (37591 inline 8-bit counters): 37591 [0xd3eb88, 0xd47e5f),
INFO: Loaded 1 PC tables (37591 PCs): 37591 [0xd47e60,0xddabd0),
/out/openexr_exrcorecheck_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
======... | cpp | d59452aa382d620ed9a903b3a9b9a920f35d9c32 | https://github.com/AcademySoftwareFoundation/openexr/commit/043a50807eb19af844dd34281900b2ad8571325f | null |
arvo:49763 | n132/arvo:49763-vul | /src/mruby | [
{
"end_line": 499,
"function_name": "udiv",
"start_line": 431,
"target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c"
}
] | Heap-buffer-overflow WRITE 4 | mruby | asan | INFO: found LLVMFuzzerCustomMutator (0x55fc00). Disabling -len_control by default.
INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 400639784
INFO: Loaded 1 modules (27693 inline 8-bit counters): 27693 [0xb68918, 0xb6f545),
INFO: Loaded 1 PC tables (27693 PCs): 27693 [0x9cb968,0xa37c38),
/out/mru... | cpp | 02f44d76fcf86ee50d5e3604312da963bbcb2c74 | https://github.com/mruby/mruby/commit/5ccca7e45b802051e00e3398ecf036f86ba92843 | null |
arvo:49797 | n132/arvo:49797-vul | /src/assimp | [
{
"end_line": 331,
"function_name": "OFFImporter::InternReadFile",
"start_line": 108,
"target_file": "/src/assimp/code/AssetLib/OFF/OFFLoader.cpp"
}
] | Heap-buffer-overflow READ 4 | assimp | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2250769320
INFO: Loaded 1 modules (206139 inline 8-bit counters): 206139 [0x1c72ba0, 0x1ca50db),
INFO: Loaded 1 PC tables (206139 PCs): 206139 [0x1ca50e0,0x1fca490),
/out/assimp_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Info, T0: ... | cpp | 0fdae2879d78864693ee730610dcf8ee10707875 | https://github.com/assimp/assimp/commit/ee02c389ca2106cc70f5cea2d7e5d43b96510f27 | A heap-buffer-overflow occurs during a READ operation of 4 bytes in the function Assimp::ScenePreprocessor::ProcssMesh. |
arvo:49819 | n132/arvo:49819-vul | /src/S2OPC | [
{
"end_line": 1420,
"function_name": "Decode_Message_V1",
"start_line": 1225,
"target_file": "/src/S2OPC/src/PubSub/network/sopc_network_layer.c"
}
] | Use-of-uninitialized-value | S2OPC | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3142684030
INFO: Loaded 1 modules (16372 inline 8-bit counters): 16372 [0x847cb3, 0x84bca7),
INFO: Loaded 1 PC tables (16372 PCs): 16372 [0x84bca8,0x88bbe8),
/out/sub_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==10733==WARNING: Memo... | c | 8cb6dd6c1f3460dda05a4ec28bdfd35371dc35d3 | https://gitlab.com/systerel/S2OPC/-/commit/040cd827d395f46a8515a7d2a7c7ab101f7f1de1 | null |
arvo:49845 | n132/arvo:49845-vul | /src/mruby | [
{
"end_line": 499,
"function_name": "udiv",
"start_line": 431,
"target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c"
}
] | Heap-buffer-overflow WRITE 4 | mruby | asan | INFO: found LLVMFuzzerCustomMutator (0x55fc00). Disabling -len_control by default.
INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3277569687
INFO: Loaded 1 modules (27693 inline 8-bit counters): 27693 [0xb68918, 0xb6f545),
INFO: Loaded 1 PC tables (27693 PCs): 27693 [0x9cb968,0xa37c38),
/out/mr... | cpp | 02f44d76fcf86ee50d5e3604312da963bbcb2c74 | https://github.com/mruby/mruby/commit/5ccca7e45b802051e00e3398ecf036f86ba92843 | null |
arvo:50099 | n132/arvo:50099-vul | /src/ghostpdl | [
{
"end_line": 1985,
"function_name": "pdfi_read_cff",
"start_line": 1608,
"target_file": "/src/ghostpdl/pdf/pdf_font1C.c"
}
] | Heap-buffer-overflow READ 1 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1896875745
INFO: Loaded 3 modules (213008 inline 8-bit counters): 13708 [0x7fca21dfb9e0, 0x7fca21dfef6c), 959 [0x7fca21e5ca40, 0x7fca21e5cdff), 198341 [0x3615650, 0x3645d15),
INFO: Loaded 3 PC tables (213008 PCs): 13708 [0x7fca21dfef70,0x7fca21e3483... | cpp | be2dd780341922ea945ad6abc7cfeed3400c2afe | https://github.com/ArtifexSoftware/ghostpdl/commit/2b3b754fe12591dc26309fc92fcefac12ca5a6af | A mistake in setting the CFF data buffer limit for fdarray subfonts in the code allows for a security vulnerability. |
arvo:50115 | n132/arvo:50115-vul | /src/lcms | [
{
"end_line": 884,
"function_name": "_cmsReadHeader",
"start_line": 764,
"target_file": "/src/lcms/src/cmsio0.c"
}
] | Heap-buffer-overflow READ 8 | lcms | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 729637037
INFO: Loaded 1 modules (7683 inline 8-bit counters): 7683 [0x831c5d0, 0x831e3d3),
INFO: Loaded 1 PC tables (7683 PCs): 7683 [0x829e63c,0x82ad654),
/out/cms_transform_all_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=========... | c | 89b5f465e5e47d43209b09e4b577b6f09d597cc1 | https://github.com/mm2/Little-CMS/commit/f3f6b7bceb629bc4b6f1dea3e45b44dc3f8674af | null |
arvo:5018 | n132/arvo:5018-vul | /src/open62541 | [
{
"end_line": 940,
"function_name": "writeValueAttributeWithRange",
"start_line": 903,
"target_file": "/src/open62541/src/server/ua_services_attribute.c"
}
] | Heap-buffer-overflow READ 4 | open62541 | asan | INFO: Seed: 2646230007
INFO: Loaded 1 modules (5136 inline 8-bit counters): 5136 [0xa26030, 0xa27440),
INFO: Loaded 1 PC tables (5136 PCs): 5136 [0xa27440,0xa3b540),
/out/fuzz_binary_message: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================================================================
==875==... | cpp | b4a72aad61762e4f3aa84702ef415454ab3c958e | https://github.com/open62541/open62541/commit/68bdf5e9a9bfc1c50b0bae131ef34b7c12f2b9ba | null |
arvo:50306 | n132/arvo:50306-vul | /src/ghostpdl | [
{
"end_line": 912,
"function_name": "gs_type2_interpret",
"start_line": 121,
"target_file": "/src/ghostpdl/base/gstype2.c"
}
] | Stack-buffer-underflow READ 4 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1914675536
INFO: Loaded 3 modules (203613 inline 8-bit counters): 13708 [0x7fcfaec279e0, 0x7fcfaec2af6c), 959 [0x7fcfaec88a40, 0x7fcfaec88dff), 188946 [0x345cc90, 0x348aea2),
INFO: Loaded 3 PC tables (203613 PCs): 13708 [0x7fcfaec2af70,0x7fcfaec6083... | cpp | 9f8ad8cff4ca7d6ce8b772b109b8aa77a84ba97a | https://github.com/ArtifexSoftware/ghostpdl/commit/05efb77627aa0e05ab59ec1d6cb6988e1eb9710e | The Type 2 charstring interpreter in the code lacks a stack bounds check, which can lead to a security vulnerability. |
arvo:50326 | n132/arvo:50326-vul | /src/ghostpdl | [
{
"end_line": 573,
"function_name": "gs_type1_piece_codes",
"start_line": 348,
"target_file": "/src/ghostpdl/base/gxtype1.c"
}
] | Stack-buffer-overflow WRITE 8 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4233075121
INFO: Loaded 3 modules (203622 inline 8-bit counters): 13708 [0x7fc1cee8d9e0, 0x7fc1cee90f6c), 959 [0x7fc1ceeeea40, 0x7fc1ceeeedff), 188955 [0x345cd50, 0x348af6b),
INFO: Loaded 3 PC tables (203622 PCs): 13708 [0x7fc1cee90f70,0x7fc1ceec683... | cpp | 71484d8977bf79411dca9ebc6c9c1fcc36723ea7 | https://github.com/ArtifexSoftware/ghostpdl/commit/eba3379360caec1d881d96c5d51ed4282278cd1f | A vulnerability exists in the Type 1/2 charstring execution state stack due to an incorrect bounds checking macro, which is not used in the minimal CharString interpreter found in pdfwrite and related components. |
arvo:50406 | n132/arvo:50406-vul | /src/ghostpdl | [
{
"end_line": 3727,
"function_name": "pdfi_annot_draw_Widget",
"start_line": 3632,
"target_file": "/src/ghostpdl/pdf/pdf_annot.c"
}
] | UNKNOWN WRITE | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1616728514
INFO: Loaded 3 modules (222767 inline 8-bit counters): 13708 [0x7f095a5199e0, 0x7f095a51cf6c), 959 [0x7f095a57aa40, 0x7f095a57adff), 208100 [0x37e06b0, 0x3813394),
INFO: Loaded 3 PC tables (222767 PCs): 13708 [0x7f095a51cf70,0x7f095a55283... | cpp | f31bb9804bd1bc3bc744fad90320279691979154 | https://github.com/ArtifexSoftware/ghostpdl/commit/1d8d9605e251d1b51281efe5ef8db07640e49203 | null |
arvo:50414 | n132/arvo:50414-vul | /src/lcms | [
{
"end_line": 2326,
"function_name": "Type_LUT16_Write",
"start_line": 2191,
"target_file": "/src/lcms/src/cmstypes.c"
}
] | Heap-buffer-overflow READ 2 | lcms | asan | =================================================================
==13019==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x610000000100 at pc 0x0000004e92ea bp 0x7ffdafccfb90 sp 0x7ffdafccfb88
READ of size 2 at 0x610000000100 thread T0
SCARINESS: 14 (2-byte-read-heap-buffer-overflow)
#0 0x4e92e9 in _cmsW... | c | 7600d91699256c0b2929023700c41772e8b61a99 | https://github.com/mm2/Little-CMS/commit/54390818348493a88c43b0dadbad77bdc9750699 | lcms reads crafted profiles with bogus data due to its tolerant reading behavior, but does not write them because it is strict when writing. This situation may result in memory corruption. |
arvo:50433 | n132/arvo:50433-vul | /src/c-blosc2 | [
{
"end_line": 2287,
"function_name": "write_compression_header",
"start_line": 2212,
"target_file": "/src/c-blosc2/blosc/blosc2.c"
}
] | Heap-buffer-overflow WRITE 4 | c-blosc2 | asan | =================================================================
==7250==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6040000000b0 at pc 0x0000004e2aee bp 0x7ffc207e2bf0 sp 0x7ffc207e2be8
WRITE of size 4 at 0x6040000000b0 thread T0
SCARINESS: 36 (4-byte-write-heap-buffer-overflow)
#0 0x4e2aed in _sw3... | cpp | 3c630983297df56c3db4a490bd2175fb22691089 | https://github.com/Blosc/c-blosc2/commit/55e9b06c6191af68938dc3301b7ed4153cf86f7a | null |
arvo:50436 | n132/arvo:50436-vul | /src/ghostpdl | [
{
"end_line": 3727,
"function_name": "pdfi_annot_draw_Widget",
"start_line": 3632,
"target_file": "/src/ghostpdl/pdf/pdf_annot.c"
}
] | Global-buffer-overflow READ 8 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3692411194
INFO: Loaded 3 modules (222767 inline 8-bit counters): 13708 [0x7f40b74509e0, 0x7f40b7453f6c), 959 [0x7f40b74b1a40, 0x7f40b74b1dff), 208100 [0x37e06b0, 0x3813394),
INFO: Loaded 3 PC tables (222767 PCs): 13708 [0x7f40b7453f70,0x7f40b748983... | cpp | f31bb9804bd1bc3bc744fad90320279691979154 | https://github.com/ArtifexSoftware/ghostpdl/commit/1d8d9605e251d1b51281efe5ef8db07640e49203 | null |
arvo:50589 | n132/arvo:50589-vul | /src/assimp | [
{
"end_line": 331,
"function_name": "IOStreamBuffer<T>::getNextLine",
"start_line": 288,
"target_file": "/src/assimp/include/assimp/IOStreamBuffer.h"
}
] | UNKNOWN READ | assimp | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1200122727
INFO: Loaded 1 modules (222573 inline 8-bit counters): 222573 [0x1619db0, 0x165031d),
INFO: Loaded 1 PC tables (222573 PCs): 222573 [0x1650320,0x19b59f0),
/out/assimp_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Info, T0: ... | cpp | 8c6b3fe69aecb8d92af8b151faf847f9bc11eb3b | https://github.com/assimp/assimp/commit/db72c6ee38e5a87f4aaf255197eb49da2b1fa651 | A vulnerability exists where, if "getNextBlock" is called after "getNextLine", the pointer may still be positioned on the newline character. When a line ends with \r\n, the pointer may not advance sufficiently, causing it to point at \n, which is still part of the newline. As a result, "getNextBlock" may process 1 byte... |
arvo:50610 | n132/arvo:50610-vul | /src/h2o | [
{
"end_line": 939,
"function_name": "h2o_socket_sendvec",
"start_line": 896,
"target_file": "/src/h2o/lib/common/socket.c"
}
] | Non-positive-vla-bound-value | h2o | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3447951186
INFO: Loaded 1 modules (31983 inline 8-bit counters): 31983 [0xa77ef8, 0xa7fbe7),
INFO: Loaded 1 PC tables (31983 PCs): 31983 [0x8d0e88,0x94dd78),
/out/h2o-fuzzer-http1: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
/src/h2o/lib/com... | cpp | 36a23af525d2b4a2249d7a36191b6de74c71c6be | https://github.com/h2o/h2o/commit/f995000834a6bbee1c2a53114e0e41b596c33431 | null |
arvo:50656 | n132/arvo:50656-vul | /src/ghostpdl | [
{
"end_line": 2341,
"function_name": "Ins_NPUSHB",
"start_line": 2322,
"target_file": "/src/ghostpdl/base/ttinterp.c"
}
] | Heap-buffer-overflow READ 1 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 702513896
INFO: Loaded 3 modules (203721 inline 8-bit counters): 13708 [0x7f748148a9e0, 0x7f748148df6c), 959 [0x7f74814eba40, 0x7f74814ebdff), 189054 [0x345ddf0, 0x348c06e),
INFO: Loaded 3 PC tables (203721 PCs): 13708 [0x7f748148df70,0x7f74814c3830... | cpp | 0381294369ea5bacd10b4167b336bf1cb6d8d4ef | https://github.com/ArtifexSoftware/ghostpdl/commit/ed51807f5c7d5208c703de3ab60cff49adf96328 | A vulnerability exists in Ins_NPUSHB() due to a missing bounds check on the instruction buffer. |
arvo:50725 | n132/arvo:50725-vul | /src/lcms | [
{
"end_line": 1221,
"function_name": "cmsCreateExtendedTransform",
"start_line": 1074,
"target_file": "/src/lcms/src/cmsxform.c"
}
] | Heap-buffer-overflow READ 8 | lcms | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1607711012
INFO: Loaded 1 modules (7699 inline 8-bit counters): 7699 [0x6a4030, 0x6a5e43),
INFO: Loaded 1 PC tables (7699 PCs): 7699 [0x630d60,0x64ee90),
/out/cms_transform_all_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
============... | c | 682d84ccdc6d6f33b73557d8c2e2e73fc4c31025 | https://github.com/mm2/Little-CMS/commit/e515daaa2259657319eb9f07181d02af24b4e7fe | null |
arvo:50731 | n132/arvo:50731-vul | /src/ghostpdl | [
{
"end_line": 670,
"function_name": "pdfi_get_image_info",
"start_line": 438,
"target_file": "/src/ghostpdl/pdf/pdf_image.c"
}
] | Global-buffer-overflow READ 8 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2131070297
INFO: Loaded 3 modules (221388 inline 8-bit counters): 13672 [0x7f491754b9e0, 0x7f491754ef48), 959 [0x7f49175aca40, 0x7f49175acdff), 206757 [0x37e0390, 0x3812b35),
INFO: Loaded 3 PC tables (221388 PCs): 13672 [0x7f491754ef48,0x7f49175845c... | cpp | a8168fcba7cf6ebb82d3ec334c25cfa57062fc83 | https://github.com/ArtifexSoftware/ghostpdl/commit/593cc12df5834bf0734b4196d7447e02414f5ba3 | null |
arvo:50773 | n132/arvo:50773-vul | /src/php-src | [
{
"end_line": 2412,
"function_name": "php_date_initialize",
"start_line": 2301,
"target_file": "/src/php-src/ext/date/php_date.c"
}
] | Heap-use-after-free READ 4 | php-src | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/php-fuzz-execute
=================================================================
==132860==ERROR: AddressSanitizer: heap-use-after-free on address 0x60300001aff0 at pc 0x0000006d2d8b bp 0x7fffd069bf50 sp 0x7fffd069bf48
READ of size 4 at 0... | cpp | 6af3f5d514f8223f7557ed1930847259d3896436 | https://github.com/php/php-src/commit/8cdfffb7537084e3f8a691fc13428425f559566c | null |
arvo:50783 | n132/arvo:50783-vul | /src/lcms | [
{
"end_line": 1221,
"function_name": "cmsCreateExtendedTransform",
"start_line": 1074,
"target_file": "/src/lcms/src/cmsxform.c"
}
] | Use-of-uninitialized-value | lcms | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2337873479
INFO: Loaded 1 modules (7699 inline 8-bit counters): 7699 [0x6ddcc9, 0x6dfadc),
INFO: Loaded 1 PC tables (7699 PCs): 7699 [0x66c010,0x68a140),
/out/cms_transform_all_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==12985==WAR... | cpp | 682d84ccdc6d6f33b73557d8c2e2e73fc4c31025 | https://github.com/mm2/Little-CMS/commit/e515daaa2259657319eb9f07181d02af24b4e7fe | null |
arvo:50832 | n132/arvo:50832-vul | /src/lcms | [
{
"end_line": 1221,
"function_name": "cmsCreateExtendedTransform",
"start_line": 1074,
"target_file": "/src/lcms/src/cmsxform.c"
}
] | Negative-size-param | lcms | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 920785964
INFO: Loaded 1 modules (7658 inline 8-bit counters): 7658 [0x834c670, 0x834e45a),
INFO: Loaded 1 PC tables (7658 PCs): 7658 [0x82cb2d8,0x82da228),
/out/cms_universal_transform_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===... | c | 682d84ccdc6d6f33b73557d8c2e2e73fc4c31025 | https://github.com/mm2/Little-CMS/commit/e515daaa2259657319eb9f07181d02af24b4e7fe | null |
arvo:50834 | n132/arvo:50834-vul | /src/ghostpdl | [
{
"end_line": 2370,
"function_name": "Ins_NPUSHW",
"start_line": 2347,
"target_file": "/src/ghostpdl/base/ttinterp.c"
}
] | Heap-buffer-overflow READ 1 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1214686358
INFO: Loaded 3 modules (203752 inline 8-bit counters): 13708 [0x7fa33fc619e0, 0x7fa33fc64f6c), 959 [0x7fa33fcc2a40, 0x7fa33fcc2dff), 189085 [0x345ee70, 0x348d10d),
INFO: Loaded 3 PC tables (203752 PCs): 13708 [0x7fa33fc64f70,0x7fa33fc9a83... | cpp | d65e1bd8a5f8183897d2fb99bf3428217370b645 | https://github.com/ArtifexSoftware/ghostpdl/commit/00897ae3a48a4f36b84fe61a1e3aa6252bf418e5 | A security vulnerability exists in the Ins_NPUSHW() function where there is no bounds check on the code buffer. For each argument pushed, the function reads two values from the code buffer, which can lead to out-of-bounds reads. |
arvo:50839 | n132/arvo:50839-vul | /src/lcms | [
{
"end_line": 1221,
"function_name": "cmsCreateExtendedTransform",
"start_line": 1074,
"target_file": "/src/lcms/src/cmsxform.c"
}
] | Null-dereference READ | lcms | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2688347976
INFO: Loaded 1 modules (7663 inline 8-bit counters): 7663 [0x6d2030, 0x6d3e1f),
INFO: Loaded 1 PC tables (7663 PCs): 7663 [0x65b988,0x679878),
/out/cms_universal_transform_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Addres... | c | 682d84ccdc6d6f33b73557d8c2e2e73fc4c31025 | https://github.com/mm2/Little-CMS/commit/e515daaa2259657319eb9f07181d02af24b4e7fe | null |
arvo:50847 | n132/arvo:50847-vul | /src/ghostpdl | [
{
"end_line": 874,
"function_name": "ttfOutliner__BuildGlyphOutlineAux",
"start_line": 485,
"target_file": "/src/ghostpdl/base/ttfmain.c"
}
] | Heap-buffer-overflow READ 4 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3676121890
INFO: Loaded 3 modules (222504 inline 8-bit counters): 13708 [0x7f6f753c79e0, 0x7f6f753caf6c), 959 [0x7f6f75428a40, 0x7f6f75428dff), 207837 [0x37956b0, 0x37c828d),
INFO: Loaded 3 PC tables (222504 PCs): 13708 [0x7f6f753caf70,0x7f6f7540083... | cpp | 00897ae3a48a4f36b84fe61a1e3aa6252bf418e5 | https://github.com/ArtifexSoftware/ghostpdl/commit/361febcf961baa853f34909cd3925ffa7f90e7ea | A vulnerability exists in ttfOutliner__BuildGlyphOutlineAux() where points indices are not bounds checked. |
arvo:509 | n132/arvo:509-vul | /src/freetype2 | [
{
"end_line": 1285,
"function_name": "tt_size_reset",
"start_line": 1208,
"target_file": "/src/freetype2/src/truetype/ttobjs.c"
}
] | Heap-buffer-overflow WRITE 1 | freetype2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4045030726
INFO: Loaded 1 modules (22423 inline 8-bit counters): 22423 [0x8c8fe8, 0x8ce77f),
INFO: Loaded 1 PC tables (22423 PCs): 22423 [0x7ff530,0x856ea0),
/out/ftfuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
========================... | cpp | dadc50a4679c74ead5a283dd48a4164bc4a27cdd | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=e6699596af5c5d6f0ae0ea06e19df87dce088df8 | A vulnerability exists in the MVAR post-action handling in src/truetype/ttobjs.c, where the function tt_size_reset does not properly handle CFF2. This affects the correct operation of tt_size_reset_iterator when called in tt_apply_mvar. |
arvo:50956 | n132/arvo:50956-vul | /src/lcms | [
{
"end_line": 1785,
"function_name": "OptimizeMatrixShaper",
"start_line": 1662,
"target_file": "/src/lcms/src/cmsopt.c"
}
] | Heap-buffer-overflow READ 8 | lcms | asan | =================================================================
==12991==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6030000001a8 at pc 0x0000005a5375 bp 0x7ffed2b69d60 sp 0x7ffed2b69d58
READ of size 8 at 0x6030000001a8 thread T0
SCARINESS: 23 (8-byte-read-heap-buffer-overflow)
#0 0x5a5374 in _cmsM... | c | caab4c07e60022a0f776b543eaa30785e2bb42ed | https://github.com/mm2/Little-CMS/commit/ba7004c8ff07bee2c9b6bccb8036611d8b0b2408 | null |
arvo:51011 | n132/arvo:51011-vul | /src/ghostpdl | [
{
"end_line": 578,
"function_name": "gs_type1_piece_codes",
"start_line": 348,
"target_file": "/src/ghostpdl/base/gxtype1.c"
}
] | Stack-buffer-underflow READ 4 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2897323115
INFO: Loaded 3 modules (203807 inline 8-bit counters): 13708 [0x7f74c03929e0, 0x7f74c0395f6c), 959 [0x7f74c03f3a40, 0x7f74c03f3dff), 189140 [0x3460ef0, 0x348f1c4),
INFO: Loaded 3 PC tables (203807 PCs): 13708 [0x7f74c0395f70,0x7f74c03cb83... | cpp | 0c3592453c20d3e61f539232422f1f57014a055c | https://github.com/ArtifexSoftware/ghostpdl/commit/21380a712bb427670db47a0193d450c35e72856a | A lack of bounds checking on the CharString opstack for the SEAC opcode in the code allows for a security vulnerability. |
arvo:51045 | n132/arvo:51045-vul | /src/ghostpdl | [
{
"end_line": 4115,
"function_name": "Ins_ISECT",
"start_line": 4045,
"target_file": "/src/ghostpdl/base/ttinterp.c"
}
] | UNKNOWN WRITE | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3747104975
INFO: Loaded 3 modules (203809 inline 8-bit counters): 13708 [0x7ff94cb869e0, 0x7ff94cb89f6c), 959 [0x7ff94cbe7a40, 0x7ff94cbe7dff), 189142 [0x3460ef0, 0x348f1c6),
INFO: Loaded 3 PC tables (203809 PCs): 13708 [0x7ff94cb89f70,0x7ff94cbbf83... | cpp | 21380a712bb427670db47a0193d450c35e72856a | https://github.com/ArtifexSoftware/ghostpdl/commit/f86dd15fb28335c36274d76fd98b5c8d49f4008a | A vulnerability exists in the Ins_ISECT() function due to a missing bounds check on available points. |
arvo:51089 | n132/arvo:51089-vul | /src/ghostpdl | [
{
"end_line": 929,
"function_name": "gs_type2_interpret",
"start_line": 122,
"target_file": "/src/ghostpdl/base/gstype2.c"
}
] | Stack-buffer-underflow READ 4 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 823789872
INFO: Loaded 3 modules (203983 inline 8-bit counters): 13708 [0x7ffafeb759e0, 0x7ffafeb78f6c), 959 [0x7ffafebd6a40, 0x7ffafebd6dff), 189316 [0x3463f50, 0x34922d4),
INFO: Loaded 3 PC tables (203983 PCs): 13708 [0x7ffafeb78f70,0x7ffafebae830... | cpp | 8126e9fdff42fb5d33d5d2bee8372a73e02f10e1 | https://github.com/ArtifexSoftware/ghostpdl/commit/92b792f6a34d2436772dd141760faf925e139c01 | A security vulnerability exists in the Type 2 charstring code due to insufficient operand stack checking, which can lead to potential stack overflows or other unintended behavior. |
arvo:51090 | n132/arvo:51090-vul | /src/wireshark | [
{
"end_line": 178,
"function_name": "dissect_form_urlencoded",
"start_line": 102,
"target_file": "/src/wireshark/epan/dissectors/packet-http-urlencoded.c"
}
] | Heap-buffer-overflow READ 1 | wireshark | asan | oss-fuzzshark: disabling: ip
oss-fuzzshark: disabling: udplite
oss-fuzzshark: disabling: ospf
oss-fuzzshark: disabling: bgp
oss-fuzzshark: disabling: dhcp
oss-fuzzshark: disabling: json
oss-fuzzshark: disabling: snort
oss-fuzzshark: configured for dissector: udp in table: ip.proto
INFO: Running with entropic power sche... | c | 2c3702776263827bc645fb3078c400cfda97704e | https://github.com/wireshark/wireshark/commit/af0b20a9692cd7cbfb58c655e82a4310f9cb6eba | null |
arvo:51102 | n132/arvo:51102-vul | /src/hunspell | [
{
"end_line": 147,
"function_name": "SuggestMgr::SuggestMgr",
"start_line": 85,
"target_file": "/src/hunspell/src/hunspell/suggestmgr.cxx"
}
] | Heap-buffer-overflow READ 2 | hunspell | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3165467470
INFO: Loaded 1 modules (17226 inline 8-bit counters): 17226 [0x84ccd8, 0x851022),
INFO: Loaded 1 PC tables (17226 PCs): 17226 [0x788788,0x7cbc28),
/out/affdicfuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
====================... | cpp | 74b08bfb8b611b7ae4bea2a6f1f74d9f73c1d0e3 | https://github.com/hunspell/hunspell/commit/5aa940a5a3b65263db809953024e9689e191868f | A vulnerability exists where utf-8 encoding failures in malformed .aff files are not properly handled. |
arvo:51134 | n132/arvo:51134-vul | /src/hunspell | [
{
"end_line": 210,
"function_name": "PfxEntry::test_condition",
"start_line": 125,
"target_file": "/src/hunspell/src/hunspell/affentry.cxx"
}
] | Stack-buffer-overflow READ 1 | hunspell | asan | =================================================================
==10339==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fabff863038 at pc 0x000000675c36 bp 0x7ffc59deb5c0 sp 0x7ffc59deb5b8
READ of size 1 at 0x7fabff863038 thread T0
SCARINESS: 27 (1-byte-read-stack-buffer-overflow)
#0 0x675c35 in Pfx... | cpp | 3809b8e9389bda86e6208560842fe145b671cc73 | https://github.com/hunspell/hunspell/commit/4631c530b0afbd57ef34ffa6260899ffa6d91eb4 | null |
arvo:51147 | n132/arvo:51147-vul | /src/hunspell | [
{
"end_line": 414,
"function_name": "HashMgr::add_word",
"start_line": 164,
"target_file": "/src/hunspell/src/hunspell/hashmgr.cxx"
}
] | Use-of-uninitialized-value | hunspell | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1399920789
INFO: Loaded 1 modules (15906 inline 8-bit counters): 15906 [0x9e9a28, 0x9ed84a),
INFO: Loaded 1 PC tables (15906 PCs): 15906 [0x91a438,0x958658),
/out/affdicfuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Uninitialized bytes ... | cpp | 32db4657fb5c3748100958ce2cf669c195af0ce2 | https://github.com/hunspell/hunspell/commit/018bf1c05542c30d954a8cfc0bd40f20e0a0ade4 | null |
arvo:51169 | n132/arvo:51169-vul | /src/php-src | [
{
"end_line": 2284,
"function_name": "update_errors_warnings",
"start_line": 2266,
"target_file": "/src/php-src/ext/date/php_date.c"
}
] | Heap-use-after-free READ 4 | php-src | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2417933116
INFO: Loaded 2 modules (176467 inline 8-bit counters): 143128 [0x1b63080, 0x1b85f98), 33339 [0x7f70b75692d0, 0x7f70b757150b),
INFO: Loaded 2 PC tables (176467 PCs): 143128 [0x1b85f98,0x1db5118), 33339 [0x7f70b7571510,0x7f70b75f38c0),
/ou... | c | 2d2a1e39ac8ab3f39f9ab0ffb981dce738da3efa | https://github.com/php/php-src/commit/49c029858b371c718da9982c524848edc88a85dc | null |
arvo:51180 | n132/arvo:51180-vul | /src/php-src | [
{
"end_line": 2284,
"function_name": "update_errors_warnings",
"start_line": 2266,
"target_file": "/src/php-src/ext/date/php_date.c"
}
] | Heap-use-after-free READ 4 | php-src | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/php-fuzz-tracing-jit
=================================================================
==132859==ERROR: AddressSanitizer: heap-use-after-free on address 0x60300001b714 at pc 0x0000007a602d bp 0x7fff0f95f380 sp 0x7fff0f95f378
READ of size 4 ... | cpp | 2d2a1e39ac8ab3f39f9ab0ffb981dce738da3efa | https://github.com/php/php-src/commit/49c029858b371c718da9982c524848edc88a85dc | null |
arvo:51208 | n132/arvo:51208-vul | /src/h3 | [
{
"end_line": 503,
"function_name": "localIjkToCell",
"start_line": 302,
"target_file": "/src/h3/src/h3lib/lib/localij.c"
}
] | Global-buffer-overflow READ 4 | h3 | asan | =================================================================
==483==ERROR: AddressSanitizer: global-buffer-overflow on address 0x0000005226f8 at pc 0x0000004e3423 bp 0x7ffeb1107c20 sp 0x7ffeb1107c18
READ of size 4 at 0x0000005226f8 thread T0
SCARINESS: 17 (4-byte-read-global-buffer-overflow)
#0 0x4e3422 in _ge... | c | cbd294ac7327ce262103bb10756ccec4edeccc90 | https://github.com/uber/h3/commit/fce1c53844ca21dcc14f3acabeaf2e12d47e5568 | A potential out-of-bounds read exists in the localIjToCell function. |
arvo:51275 | n132/arvo:51275-vul | /src/ghostpdl | [
{
"end_line": 935,
"function_name": "gs_type2_interpret",
"start_line": 122,
"target_file": "/src/ghostpdl/base/gstype2.c"
}
] | Stack-buffer-overflow READ 4 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3818123672
INFO: Loaded 3 modules (222749 inline 8-bit counters): 13708 [0x7f8cd8df69e0, 0x7f8cd8df9f6c), 959 [0x7f8cd8e57a40, 0x7f8cd8e57dff), 208082 [0x379a7d0, 0x37cd4a2),
INFO: Loaded 3 PC tables (222749 PCs): 13708 [0x7f8cd8df9f70,0x7f8cd8e2f83... | cpp | cd42596379866887dfb14e92e2ecfeab46359cf0 | https://github.com/ArtifexSoftware/ghostpdl/commit/893e67b7b7253aa147740269525b2a071c7bbe79 | The vulnerability exists in the pdfwrite component, specifically in the handling of type 2 CharString operations. In two locations, the code checks for sufficient operands on the stack for the initial part of the operation but fails to verify operand sufficiency for the subsequent part. In particular, the c2_rlinecurve... |
arvo:51292 | n132/arvo:51292-vul | /src/cyclonedds | [
{
"end_line": 731,
"function_name": "if_network_partition",
"start_line": 717,
"target_file": "/src/cyclonedds/src/core/ddsi/src/ddsi_config.c"
}
] | Segv on unknown address | cyclonedds | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 231792847
INFO: Loaded 1 modules (24246 inline 8-bit counters): 24246 [0x94c370, 0x952226),
INFO: Loaded 1 PC tables (24246 PCs): 24246 [0x844020,0x8a2b80),
/out/fuzz_config_init: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
1744242285.285973... | c | d8eff6f65296202894cf998239ee5e4f4da55d5c | https://github.com/eclipse-cyclonedds/cyclonedds/commit/9f9026899dc94f5a3e740ba5cabc2647f1e9a0bd | A vulnerability exists in network partition where the interface_names variable is not initialised. This allows a specially crafted configuration to trigger an invalid free operation. |
arvo:51418 | n132/arvo:51418-vul | /src/ghostpdl | [
{
"end_line": 2393,
"function_name": "Ins_PUSHB",
"start_line": 2376,
"target_file": "/src/ghostpdl/base/ttinterp.c"
}
] | Heap-buffer-overflow READ 1 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4258196836
INFO: Loaded 3 modules (213445 inline 8-bit counters): 13708 [0x7fc3a6d229e0, 0x7fc3a6d25f6c), 959 [0x7fc3a6d83a40, 0x7fc3a6d83dff), 198778 [0x361f850, 0x36500ca),
INFO: Loaded 3 PC tables (213445 PCs): 13708 [0x7fc3a6d25f70,0x7fc3a6d5b83... | cpp | 968a8826747e67dad5188ee79a0a98e7dc89b287 | https://github.com/ArtifexSoftware/ghostpdl/commit/e3615c77c860a20d7537f3d126c0aaa399c52787 | A vulnerability exists in the Ins_PUSHB function where values are read from the byte code buffer without performing a bounds check. |
arvo:51603 | n132/arvo:51603-vul | /src/file | [
{
"end_line": 2488,
"function_name": "parse_strength",
"start_line": 2430,
"target_file": "/src/file/src/apprentice.c"
}
] | Heap-buffer-overflow READ {*} | file | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/magic_fuzzer_loaddb
cont offset type opcode mask value desc
/tmp/generate_temporary_file.y8CVOG, 1: Warning: offset ` ' invalid
/tmp/generate_temporary_file.y8CVOG, 2: Warning: ===============================================================... | cpp | 411ec5bf0708dcd5ec99e4d0961740fca30a6bc7 | https://github.com/file/file/commit/66efe2fa6abc233011a58965d6de2bb0f91328bd | The vulnerability allows the raw svalue to be printed and permits incrementing past the end of string (EOS) in OP_NONE. |
arvo:51687 | n132/arvo:51687-vul | /src/mongoose | [
{
"end_line": 6779,
"function_name": "rx_dhcp",
"start_line": 6754,
"target_file": "/src/mongoose/mongoose.c"
}
] | Use-after-poison READ 1 | mongoose | asan | =================================================================
==127==ERROR: AddressSanitizer: use-after-poison on address 0x7fec837fd963 at pc 0x00000052f5b2 bp 0x7ffe9a98a370 sp 0x7ffe9a98a368
READ of size 1 at 0x7fec837fd963 thread T0
SCARINESS: 22 (1-byte-read-use-after-poison)
#0 0x52f5b1 in rx_dhcp(mip_if*... | c | d7fe8196990989609a0a165dd21354716b153327 | https://github.com/cesanta/mongoose/commit/1237185bb44b518c3f1c56f0e83b84782e772da1 | null |
arvo:51745 | n132/arvo:51745-vul | /src/ghostpdl | [
{
"end_line": 790,
"function_name": "pdf_write_embedded_font",
"start_line": 592,
"target_file": "/src/ghostpdl/devices/vector/gdevpdtb.c"
}
] | Heap-use-after-free READ 8 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1970762171
INFO: Loaded 3 modules (204064 inline 8-bit counters): 13708 [0x7fcac77139e0, 0x7fcac7716f6c), 959 [0x7fcac7774a40, 0x7fcac7774dff), 189397 [0x34670b0, 0x3495485),
INFO: Loaded 3 PC tables (204064 PCs): 13708 [0x7fcac7716f70,0x7fcac774c83... | cpp | 9e1a0aa79da04c1ccf6bf6e030c551d03149bb3e | https://github.com/ArtifexSoftware/ghostpdl/commit/ebfb46da46e3f2872e4d1136571224a60891f80a | null |
arvo:51845 | n132/arvo:51845-vul | /src/binutils-gdb | [
{
"end_line": 1453,
"function_name": "_bfd_stab_section_find_nearest_line",
"start_line": 930,
"target_file": "/src/binutils-gdb/bfd/syms.c"
}
] | Segv on unknown address | binutils-gdb | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1308424276
INFO: Loaded 1 modules (175944 inline 8-bit counters): 175944 [0x1b020a0, 0x1b2cfe8),
INFO: Loaded 1 PC tables (175944 PCs): 175944 [0x15fd550,0x18ac9d0),
/out/fuzz_addr2line: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
BFD: /tmp/... | cpp | 540e53422cd8916b85d43060210251132fba8548 | https://github.com/bminor/binutils-gdb/commit/8e4a500a5c4cef1aafc2c6e47cadd3dea0bfb99b | A segmentation fault occurs in syms.c within the _bfd_stab_section_find_nearest_line function when "info->strs[strsize - 1] = 0;" is executed with strsize set to zero. If strsize is zero, there are no filenames in stabs, resulting in no useful information. The vulnerability is triggered when either stabsize or strsize ... |
arvo:51988 | n132/arvo:51988-vul | /src/hunspell | [
{
"end_line": 1374,
"function_name": "AffixMgr::cpdcase_check",
"start_line": 1353,
"target_file": "/src/hunspell/src/hunspell/affixmgr.cxx"
}
] | Heap-buffer-overflow READ 1 | hunspell | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2837065145
INFO: Loaded 1 modules (17534 inline 8-bit counters): 17534 [0x85609a4, 0x8564e22),
INFO: Loaded 1 PC tables (17534 PCs): 17534 [0x8487c54,0x84aa044),
/out/affdicfuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | cpp | 52021df98d3b5d279a68d91d6f7c34fdcf011abb | https://github.com/hunspell/hunspell/commit/7357713ba5d529f3ff70c654b703429fc9cb55a4 | A vulnerability exists where processing invalid UTF-8 sequences can result in reading past the start of the sequence. |
arvo:52145 | n132/arvo:52145-vul | /src/ghostpdl | [
{
"end_line": 937,
"function_name": "gs_type2_interpret",
"start_line": 122,
"target_file": "/src/ghostpdl/base/gstype2.c"
}
] | Stack-buffer-underflow READ 4 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3446946968
INFO: Loaded 3 modules (204082 inline 8-bit counters): 13708 [0x7ff2d9e6c9e0, 0x7ff2d9e6ff6c), 959 [0x7ff2d9ecda40, 0x7ff2d9ecddff), 189415 [0x34670f0, 0x34954d7),
INFO: Loaded 3 PC tables (204082 PCs): 13708 [0x7ff2d9e6ff70,0x7ff2d9ea583... | cpp | bb338fb50c89f4d999e02b215fef350a1f1da852 | https://github.com/ArtifexSoftware/ghostpdl/commit/b7f934c26b6d139d665ab924167036c74a973360 | The CFF interpreter in the Type 2 (CFF) interpreter executes the 'dup' operation in pdfwrite and related components without verifying that data is available, which, in the case of a corrupted font, results in reading off the bottom of the buffer. |
arvo:52181 | n132/arvo:52181-vul | /src/msquic | [
{
"end_line": 41,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 23,
"target_file": "/src/msquic/src/fuzzing/fuzz.cc"
}
] | Stack-buffer-overflow READ 2 | msquic | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3370388304
INFO: Loaded 1 modules (59115 inline 8-bit counters): 59115 [0xceae60, 0xcf954b),
INFO: Loaded 1 PC tables (59115 PCs): 59115 [0xcf9550,0xde0400),
/out/fuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
============================... | cpp | 3e89ddcf94210edd2fe21b7c15310922de55142f | https://github.com/microsoft/msquic/commit/2dfbdcbceb6c17abb6a0b5ac5ba86e955db6f2f8 | null |
arvo:52258 | n132/arvo:52258-vul | /src/hunspell | [
{
"end_line": 2082,
"function_name": "SuggestMgr::leftcommonsubstring",
"start_line": 2062,
"target_file": "/src/hunspell/src/hunspell/suggestmgr.cxx"
}
] | Heap-buffer-overflow READ 1 | hunspell | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1726976058
INFO: Loaded 1 modules (17595 inline 8-bit counters): 17595 [0x8561a34, 0x8565eef),
INFO: Loaded 1 PC tables (17595 PCs): 17595 [0x8488c94,0x84ab26c),
/out/affdicfuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | cpp | 0d2ed609cd61240e7c9e444db75e9d7acd0bca35 | https://github.com/hunspell/hunspell/commit/cca31da62a61ef0fdfff47deb947c655bdb7d187 | null |
arvo:52475 | n132/arvo:52475-vul | /src/libraw | [
{
"end_line": 887,
"function_name": "LibRaw::parseAdobeRAFMakernote",
"start_line": 105,
"target_file": "/src/libraw/src/metadata/fuji.cpp"
}
] | UNKNOWN READ | libraw | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4098352552
INFO: Loaded 1 modules (19350 inline 8-bit counters): 19350 [0xad9d70, 0xade906),
INFO: Loaded 1 PC tables (19350 PCs): 19350 [0x7bec68,0x80a5c8),
/out/libraw_raf_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
AddressSanitize... | cpp | dc0c984edfc9b36089f86f6068ee7805e9cd9efc | https://github.com/libraw/libraw/commit/c00f3dd7daeba0596899b34cbade6b6abdba46b7 | The function parseAdobeRAFMakernote inappropriately fails to check for available space, which can lead to a security vulnerability. |
arvo:52694 | n132/arvo:52694-vul | /src/libraw | [
{
"end_line": 206,
"function_name": "LibRaw::raw2image",
"start_line": 53,
"target_file": "/src/libraw/src/preprocessing/raw2image.cpp"
}
] | Heap-buffer-overflow READ 2 | libraw | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2903771947
INFO: Loaded 1 modules (21887 inline 8-bit counters): 21887 [0x939cf0, 0x93f26f),
INFO: Loaded 1 PC tables (21887 PCs): 21887 [0x819f20,0x86f710),
/out/libraw_nef_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
unknown file: d... | cpp | 63794a2471b426ff4268de6982e8a6f711163e2e | https://github.com/libraw/libraw/commit/59721b08cfcec3d425d4a9ae5a53bbc8e938fedd | null |
arvo:52724 | n132/arvo:52724-vul | /src/mruby | [
{
"end_line": 1064,
"function_name": "unpack_qenc",
"start_line": 1031,
"target_file": "/src/mruby/mrbgems/mruby-pack/src/pack.c"
}
] | Index-out-of-bounds | mruby | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1139032062
INFO: Loaded 1 modules (26073 inline 8-bit counters): 26073 [0x7099c0, 0x70ff99),
INFO: Loaded 1 PC tables (26073 PCs): 26073 [0x61f150,0x684ee0),
/out/mruby_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
[0].pack("C") -> "\x... | c | a8a8e7fbd88c47a09e6b33fbb717a00d137f2b62 | https://github.com/mruby/mruby/commit/8a67a26104a70b666c5e209a5fb3b0733cfbb3d8 | A vulnerability exists in mruby-pack/pack.c within the unpack function, where the given length is not checked for positivity, potentially allowing out-of-bound array access. |
arvo:52730 | n132/arvo:52730-vul | /src/openexr | [
{
"end_line": 1416,
"function_name": "fasthuf_initialize",
"start_line": 1194,
"target_file": "/src/openexr/src/lib/OpenEXRCore/internal_huf.c"
}
] | Heap-buffer-overflow READ 1 | openexr | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 977479435
INFO: Loaded 1 modules (37588 inline 8-bit counters): 37588 [0xd3eb88, 0xd47e5c),
INFO: Loaded 1 PC tables (37588 PCs): 37588 [0xd47e60,0xddaba0),
/out/openexr_exrcorecheck_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
======... | cpp | 436fcd2829ae9a8965af1db15ac8531fdc8b96ce | https://github.com/AcademySoftwareFoundation/openexr/commit/063a881e7a5cd57156dbd0c9b6ad4d30f7023e55 | null |
arvo:52869 | n132/arvo:52869-vul | /src/libxml2 | [
{
"end_line": 2300,
"function_name": "xmlXIncludeDoProcess",
"start_line": 2225,
"target_file": "/src/libxml2/xinclude.c"
}
] | Heap-use-after-free READ 4 | libxml2 | asan | Running LLVMFuzzerInitialize ...
continue...
=================================================================
==10642==ERROR: AddressSanitizer: heap-use-after-free on address 0x60c00001a2c8 at pc 0x00000083606e bp 0x7ffdbcfde5e0 sp 0x7ffdbcfde5d8
READ of size 4 at 0x60c00001a2c8 thread T0
SCARINESS: 45 (4-byte-read-he... | c | b59ff58728d6c4380b4b23c4881058d3dce11775 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/075cee9e9f1bedb6b2ca87e73a952fb2e92da3c1 | A memory leak occurs in the xinclude module when running in fuzzing build mode. |
arvo:52901 | n132/arvo:52901-vul | /src/libraw | [
{
"end_line": 1259,
"function_name": "LibRaw::open_datastream",
"start_line": 457,
"target_file": "/src/libraw/src/utils/open.cpp"
}
] | Heap-buffer-overflow WRITE {*} | libraw | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2349912298
INFO: Loaded 1 modules (21893 inline 8-bit counters): 21893 [0x939cf0, 0x93f275),
INFO: Loaded 1 PC tables (21893 PCs): 21893 [0x819f20,0x86f770),
/out/libraw_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
===================... | cpp | 19849976cb575cb709cfc6d9c517094d1fd76876 | https://github.com/libraw/libraw/commit/a50a568b786da111a0406e4861813949c0058bf4 | null |
arvo:52944 | n132/arvo:52944-vul | /src/librawspeed | [
{
"end_line": 342,
"function_name": "applyOP",
"start_line": 327,
"target_file": "/src/librawspeed/src/librawspeed/common/DngOpcodes.cpp"
}
] | Heap-buffer-overflow READ 4 | librawspeed | asan | =================================================================
==6244==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000000e0 at pc 0x0000006030d2 bp 0x7ffde7b662b0 sp 0x7ffde7b662a8
READ of size 4 at 0x6020000000e0 thread T0
SCARINESS: 17 (4-byte-read-heap-buffer-overflow)
#0 0x6030d1 in rawspe... | cpp | 2df1d7686c1072886b14e02aa05891b5d3b27bef | https://github.com/darktable-org/rawspeed/commit/e29d15cda20e6e7c7e1122c30bff7805a2e59fbc | A vulnerability exists in DngOpcodes::PixelOpcode where the applyOP() function does not ensure that the op() function receives coordinates with step 1, regardless of the current step. This can lead to incorrect processing of pixel data. |
arvo:5296 | n132/arvo:5296-vul | /src/librawspeed | [
{
"end_line": 174,
"function_name": "calculateCurve",
"start_line": 149,
"target_file": "/src/librawspeed/src/librawspeed/common/Spline.h"
}
] | Container-overflow READ 8 | librawspeed | asan | INFO: Seed: 1909840043
INFO: Loaded 1 modules (13954 inline 8-bit counters): 13954 [0xb1f390, 0xb22a12),
INFO: Loaded 1 PC tables (13954 PCs): 13954 [0xb22a18,0xb59238),
/out/TiffDecoderFuzzer-IiqDecoder: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
TiffDecoderFuzzer-IiqDecoder: /src/librawspeed/src/librawspe... | cpp | 719c1996b08420a899045bf838fc0294c4443c4f | https://github.com/darktable-org/rawspeed/commit/3f116fa4ff59f78e1699b950e8ef348b896fc606 | The Spline::calculateCurve() function does not clamp the interpolated value to the maximum, which can lead to a security vulnerability. |
arvo:53030 | n132/arvo:53030-vul | /src/oniguruma | [
{
"end_line": 379,
"function_name": "exec",
"start_line": 317,
"target_file": "/src/oniguruma/harnesses/base.c"
}
] | Heap-buffer-overflow READ 1 | oniguruma | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2441890090
INFO: Loaded 1 modules (9906 inline 8-bit counters): 9906 [0x7500c0, 0x752772),
INFO: Loaded 1 PC tables (9906 PCs): 9906 [0x6c4110,0x6eac30),
/out/fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==============================... | c | f7ff8bc6e9535b0227e2d146e596befc920beca2 | https://github.com/kkos/oniguruma/commit/34eac8830181bc348dab845932ae3368d1bcf3ff | null |
arvo:53036 | n132/arvo:53036-vul | /src/oniguruma | [
{
"end_line": 379,
"function_name": "exec",
"start_line": 317,
"target_file": "/src/oniguruma/harnesses/base.c"
}
] | Heap-buffer-overflow READ 1 | oniguruma | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1099926333
INFO: Loaded 1 modules (9906 inline 8-bit counters): 9906 [0x7500c0, 0x752772),
INFO: Loaded 1 PC tables (9906 PCs): 9906 [0x6c4110,0x6eac30),
/out/fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==============================... | c | f7ff8bc6e9535b0227e2d146e596befc920beca2 | https://github.com/kkos/oniguruma/commit/34eac8830181bc348dab845932ae3368d1bcf3ff | null |
arvo:53041 | n132/arvo:53041-vul | /src/oniguruma | [
{
"end_line": 379,
"function_name": "exec",
"start_line": 317,
"target_file": "/src/oniguruma/harnesses/base.c"
}
] | Heap-buffer-overflow READ 1 | oniguruma | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2399685439
INFO: Loaded 1 modules (9906 inline 8-bit counters): 9906 [0x7500c0, 0x752772),
INFO: Loaded 1 PC tables (9906 PCs): 9906 [0x6c4110,0x6eac30),
/out/fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==============================... | c | f7ff8bc6e9535b0227e2d146e596befc920beca2 | https://github.com/kkos/oniguruma/commit/34eac8830181bc348dab845932ae3368d1bcf3ff | null |
arvo:53046 | n132/arvo:53046-vul | /src/oniguruma | [
{
"end_line": 379,
"function_name": "exec",
"start_line": 317,
"target_file": "/src/oniguruma/harnesses/base.c"
}
] | Heap-buffer-overflow READ 1 | oniguruma | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1041492129
INFO: Loaded 1 modules (9906 inline 8-bit counters): 9906 [0x7500c0, 0x752772),
INFO: Loaded 1 PC tables (9906 PCs): 9906 [0x6c4110,0x6eac30),
/out/fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==============================... | c | f7ff8bc6e9535b0227e2d146e596befc920beca2 | https://github.com/kkos/oniguruma/commit/34eac8830181bc348dab845932ae3368d1bcf3ff | null |
arvo:53052 | n132/arvo:53052-vul | /src/ghostpdl | [
{
"end_line": 3671,
"function_name": "Ins_MSIRP",
"start_line": 3635,
"target_file": "/src/ghostpdl/base/ttinterp.c"
}
] | UNKNOWN READ | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 664991898
INFO: Loaded 3 modules (222564 inline 8-bit counters): 13672 [0x7f1c68c159e0, 0x7f1c68c18f48), 959 [0x7f1c68c76a40, 0x7f1c68c76dff), 207933 [0x3805090, 0x3837ccd),
INFO: Loaded 3 PC tables (222564 PCs): 13672 [0x7f1c68c18f48,0x7f1c68c4e5c8... | cpp | 519ca4efe92bd16f850cd32ac783c1015191230c | https://github.com/ArtifexSoftware/ghostpdl/commit/cb46ea041582033e874e1e7b7149e9a9370e3b2f | A missing bounds check in the Ins_MSIRP() function allows out-of-bounds access. |
arvo:53054 | n132/arvo:53054-vul | /src/ghostpdl | [
{
"end_line": 938,
"function_name": "gs_type2_interpret",
"start_line": 122,
"target_file": "/src/ghostpdl/base/gstype2.c"
}
] | Stack-buffer-underflow READ 4 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 107308347
INFO: Loaded 3 modules (204857 inline 8-bit counters): 13708 [0x7ff4509749e0, 0x7ff450977f6c), 959 [0x7ff4509d5a40, 0x7ff4509d5dff), 190190 [0x3481ab0, 0x34b019e),
INFO: Loaded 3 PC tables (204857 PCs): 13708 [0x7ff450977f70,0x7ff4509ad830... | cpp | cf52063e7aada82dc25a356c8f4a98762fa7a421 | https://github.com/ArtifexSoftware/ghostpdl/commit/519ca4efe92bd16f850cd32ac783c1015191230c | A vulnerability exists in the pdfwrite Type 2 (CFF) font interpreter, specifically in the function gs_type2_interpret, where insufficient bounds checking occurs. At the ce3_hflex1 case, the bounds check only verifies up to csp - 3, but the code accesses as far back as csp - 7. Additionally, at the flex: label (reached ... |
arvo:53103 | n132/arvo:53103-vul | /src/fluent-bit | [
{
"end_line": 13,
"function_name": "LLVMFuzzerTestOneInput",
"start_line": 5,
"target_file": "/src/fluent-bit/tests/internal/fuzzers/ctrace_fuzzer.c"
}
] | UNKNOWN READ | fluent-bit | ubsan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2590887543
INFO: Loaded 1 modules (4962 inline 8-bit counters): 4962 [0x54f5d0, 0x550932),
INFO: Loaded 1 PC tables (4962 PCs): 4962 [0x550938,0x563f58),
/out/flb-it-fuzz-ctrace_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Und... | cpp | 0a0491d0eb884f0af88fc6a58799f2b40a1f2f61 | https://github.com/fluent/fluent-bit/commit/fa7fd13c1ffbae70dd089945a90d4045bc80f1d8 | null |
arvo:53158 | n132/arvo:53158-vul | /src/libraw | [
{
"end_line": 689,
"function_name": "LibRaw::uncompressed_fp_dng_load_raw",
"start_line": 587,
"target_file": "/src/libraw/src/decoders/fp_dng.cpp"
}
] | Heap-buffer-overflow WRITE {*} | libraw | asan | =================================================================
==28797==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x621000003900 at pc 0x00000049d2a2 bp 0x7ffe14a71540 sp 0x7ffe14a70d08
WRITE of size 6167 at 0x621000003900 thread T0
SCARINESS: 45 (multi-byte-write-heap-buffer-overflow)
#0 0x49d2a1... | cpp | 79815e265d4861a6ee0e1c9f7f3d5309e6a2a600 | https://github.com/libraw/libraw/commit/b7771a8e4c01851f7674146e47f7a460633f5e99 | The FP-dng decoder does not check for the float data size. |
arvo:53417 | n132/arvo:53417-vul | /src/opensc | [
{
"end_line": 741,
"function_name": "sc_pkcs15init_rmdir",
"start_line": 664,
"target_file": "/src/opensc/src/pkcs15init/pkcs15-lib.c"
}
] | Stack-buffer-overflow READ 1 | opensc | asan | Reading 4945 bytes from /tmp/poc
=================================================================
==41422==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f3beb60d4e0 at pc 0x000000554495 bp 0x7ffe37fd99f0 sp 0x7ffe37fd99e8
READ of size 1 at 0x7f3beb60d4e0 thread T0
SCARINESS: 27 (1-byte-read-stack-buffer... | c | 16fdd70a7e02bc87c14d363ca21777b293cdcf2c | https://github.com/OpenSC/OpenSC/commit/c16d4e6588a19f4b85aa584174335f62efe28aaf | A vulnerability exists where the path length is not checked, which can lead to a buffer underflow. |
arvo:53456 | n132/arvo:53456-vul | /src/ghostpdl | [
{
"end_line": 289,
"function_name": "cmd_put_bits",
"start_line": 155,
"target_file": "/src/ghostpdl/base/gxclbits.c"
}
] | Heap-buffer-overflow WRITE 7 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1697970966
INFO: Loaded 3 modules (222703 inline 8-bit counters): 13672 [0x7f1bf465b9e0, 0x7f1bf465ef48), 959 [0x7f1bf46bca40, 0x7f1bf46bcdff), 208072 [0x38092b0, 0x383bf78),
INFO: Loaded 3 PC tables (222703 PCs): 13672 [0x7f1bf465ef48,0x7f1bf46945c... | cpp | f4bcc37667d82541eaf8a29e0b021fe1d7aa7b5b | https://github.com/ArtifexSoftware/ghostpdl/commit/db34d54064ae35adc78a499c49363a256f5145f6 | A vulnerability exists in clist_copy_bits where small bitmaps are copied into the clist uncompressed. The function calculates the required size as raster * (h-1) + width_bytes, with width_bytes being raster without the padding at the end, saving a byte or two. However, the routine used to copy the bitmap does not accou... |
arvo:53483 | n132/arvo:53483-vul | /src/libredwg | [
{
"end_line": 963,
"function_name": "decode_R13_R2000",
"start_line": 262,
"target_file": "/src/libredwg/src/decode.c"
}
] | Heap-double-free | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1118796947
INFO: Loaded 1 modules (558018 inline 8-bit counters): 558018 [0x4969180, 0x49f1542),
INFO: Loaded 1 PC tables (558018 PCs): 558018 [0x3e59de8,0x46dda08),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
llvmfuzz: decode... | c | 23f93006d0bb1a38079726363aa265e30da0ec71 | https://github.com/LibreDWG/libredwg/commit/795fccd75b2af90f402d9f903346414a1db193a1 | A vulnerability exists in the decode function where an assert can be triggered when processing illegal HEADER data, specifically when there are no Section Locator Records at offset 0x15. |
arvo:53613 | n132/arvo:53613-vul | /src/libxml2 | [
{
"end_line": 4676,
"function_name": "xmlParseCharDataComplex",
"start_line": 4597,
"target_file": "/src/libxml2/parser.c"
},
{
"end_line": 531,
"function_name": "xmlNextChar",
"start_line": 389,
"target_file": "/src/libxml2/parserInternals.c"
}
] | Use-of-uninitialized-value | libxml2 | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2302599710
INFO: Loaded 1 modules (52547 inline 8-bit counters): 52547 [0xd15997, 0xd226da),
INFO: Loaded 1 PC tables (52547 PCs): 52547 [0xbda6b0,0xca7ae0),
/out/xml: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
ALARM: working on the last Un... | c | 234915361e402c39689e8a7be5a351608cfbbc94 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/a8b31e68c2331a1289e860ce07c8b80b855b7bf4 | A vulnerability exists in the parser where the progress check when parsing character data does not properly skip over zero bytes, potentially causing issues due to lack of guaranteed progress. |
arvo:53618 | n132/arvo:53618-vul | /src/librawspeed | [
{
"end_line": 206,
"function_name": "Cr2Decompressor<HuffmanTable>::Cr2Decompressor",
"start_line": 131,
"target_file": "/src/librawspeed/src/librawspeed/decompressors/Cr2DecompressorImpl.h"
}
] | Use-of-uninitialized-value | librawspeed | msan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1164773664
INFO: Loaded 1 modules (20052 inline 8-bit counters): 20052 [0x9c2ce8, 0x9c7b3c),
INFO: Loaded 1 PC tables (20052 PCs): 20052 [0x9c7b40,0xa16080),
/out/TiffDecoderFuzzer-Cr2Decoder: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
Unin... | cpp | db6bb6be9785d5089ea80e9de794a202ff9606c6 | https://github.com/darktable-org/rawspeed/commit/a27d3e37d8a07af333d7626f0d75cc8b49a12428 | The Cr2Decompressor does not check that tiles cover the entire image. |
arvo:53619 | n132/arvo:53619-vul | /src/ghostpdl | [
{
"end_line": 2181,
"function_name": "pdfi_create_indexed",
"start_line": 2065,
"target_file": "/src/ghostpdl/pdf/pdf_colour.c"
}
] | Heap-buffer-overflow READ {*} | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 854131802
INFO: Loaded 3 modules (204980 inline 8-bit counters): 13708 [0x7f099ce689e0, 0x7f099ce6bf6c), 959 [0x7f099cec9a40, 0x7f099cec9dff), 190313 [0x3485d10, 0x34b4479),
INFO: Loaded 3 PC tables (204980 PCs): 13708 [0x7f099ce6bf70,0x7f099cea1830... | cpp | 2fbc816318dcdb0b16a6ea2e357d773a44dd134e | https://github.com/ArtifexSoftware/ghostpdl/commit/c745108a1b72b7b14899e048ee76b99ee49d9d80 | GhostPDF allows an /Indexed color space to have a base space that is an array [/Pattern] in the affected file. Pattern spaces and Indexed spaces are not valid as the base space for an Indexed space in this context. The vulnerability occurs due to a lack of validation of the base space for Indexed color spaces. |
arvo:53631 | n132/arvo:53631-vul | /src/opensc | [
{
"end_line": 138,
"function_name": "msc_zero_object",
"start_line": 126,
"target_file": "/src/opensc/src/libopensc/muscle.c"
}
] | Stack-buffer-overflow WRITE {*} | opensc | asan | Reading 104 bytes from /tmp/poc
=================================================================
==41392==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f0511ea1230 at pc 0x00000049fb0c bp 0x7ffe4ab15350 sp 0x7ffe4ab14b18
WRITE of size 65526 at 0x7f0511ea1230 thread T0
SCARINESS: 60 (multi-byte-write-sta... | c | 578aed8391ef117ca64a9e0cba8e5c264368a0ec | https://github.com/OpenSC/OpenSC/commit/e7f81d86dcdc751f4737f4b29a99bfc54d29c5c9 | An out of bounds write occurs in muscle. |
arvo:53711 | n132/arvo:53711-vul | /src/ghostpdl | [
{
"end_line": 1047,
"function_name": "pdfi_dereference_main",
"start_line": 885,
"target_file": "/src/ghostpdl/pdf/pdf_deref.c"
}
] | Stack-buffer-overflow READ 1 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3812560987
INFO: Loaded 3 modules (222684 inline 8-bit counters): 13672 [0x7f27207399e0, 0x7f272073cf48), 959 [0x7f272079aa40, 0x7f272079adff), 208053 [0x38092f0, 0x383bfa5),
INFO: Loaded 3 PC tables (222684 PCs): 13672 [0x7f272073cf48,0x7f27207725c... | cpp | 04c8185f0e8088f01592917af2b7d52ec63114bf | https://github.com/ArtifexSoftware/ghostpdl/commit/f4bcc37667d82541eaf8a29e0b021fe1d7aa7b5b | A vulnerability exists in GhostPDF's main stream parsing due to the use of a SubFileDecode filter with a 'triler' EODString when parsing objects during indirect reference dereferencing. If the main stream contains the word 'trailer' in uncompressed text, such as in an annotation, the SubFileDecode filter incorrectly si... |
arvo:53750 | n132/arvo:53750-vul | /src/libredwg | [
{
"end_line": 966,
"function_name": "decode_preR13",
"start_line": 658,
"target_file": "/src/libredwg/src/decode_r11.c"
}
] | Heap-buffer-overflow READ 1 | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1603292289
INFO: Loaded 1 modules (555386 inline 8-bit counters): 555386 [0x4945de0, 0x49cd75a),
INFO: Loaded 1 PC tables (555386 PCs): 555386 [0x3e40908,0x46ba0a8),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | c | 97fd500ac19eb64c1218c41ef7582fcd41f98895 | https://github.com/LibreDWG/libredwg/commit/98729e9d56bd5e8e0530de39d955dc838803cbb2 | A vulnerability exists in the decode_r11 function in which a post HEADER overflow can occur. |
arvo:53903 | n132/arvo:53903-vul | /src/ghostpdl | [
{
"end_line": 942,
"function_name": "mem_initialize_device_procs",
"start_line": 912,
"target_file": "/src/ghostpdl/base/gdevmem.c"
}
] | UNKNOWN WRITE | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2274164498
INFO: Loaded 3 modules (222869 inline 8-bit counters): 13672 [0x7efe6c3f49e0, 0x7efe6c3f7f48), 959 [0x7efe6c455a40, 0x7efe6c455dff), 208238 [0x380f350, 0x38420be),
INFO: Loaded 3 PC tables (222869 PCs): 13672 [0x7efe6c3f7f48,0x7efe6c42d5c... | cpp | 8c35f9b067918e39459a468fe49da24a11efd589 | https://github.com/ArtifexSoftware/ghostpdl/commit/ba9672456064ecc4166c6293bc36a1b126f3421a | A vulnerability exists where memory devices are allowed to change media sizes, resolutions, or other parameters that affect the size of the raster memory allocation. |
arvo:53919 | n132/arvo:53919-vul | /src/relic | [
{
"end_line": 92,
"function_name": "bn_lsh",
"start_line": 66,
"target_file": "/src/relic/src/bn/relic_bn_shift.c"
}
] | Heap-buffer-overflow WRITE {*} | relic | asan | INFO: found LLVMFuzzerCustomMutator (0xb391b0). Disabling -len_control by default.
INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2723249023
INFO: Loaded 1 modules (158411 inline 8-bit counters): 158411 [0x1b5b150, 0x1b81c1b),
INFO: Loaded 1 PC tables (158411 PCs): 158411 [0x1b81c20,0x1dec8d0), ... | cpp | b369a6740962bbe533fce4c71eddf2c8d6884edf | https://github.com/relic-toolkit/relic/commit/d4cf7f6faa73136fe14938fa47b24fcc6c626c47 | null |
arvo:53927 | n132/arvo:53927-vul | /src/opensc | [
{
"end_line": 739,
"function_name": "sc_pkcs15init_rmdir",
"start_line": 664,
"target_file": "/src/opensc/src/pkcs15init/pkcs15-lib.c"
}
] | Stack-buffer-overflow WRITE 1 | opensc | asan | Reading 5386 bytes from /tmp/poc
=================================================================
==41391==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f612e615c9f at pc 0x0000004e2b49 bp 0x7ffd330b9130 sp 0x7ffd330b9128
WRITE of size 1 at 0x7f612e615c9f thread T0
SCARINESS: 46 (1-byte-write-stack-buff... | c | b4e7a381e368ce9f0088c0479e3c7986546d0730 | https://github.com/OpenSC/OpenSC/commit/578aed8391ef117ca64a9e0cba8e5c264368a0ec | A vulnerability in the sc_pkcs15init_rmdir function allows an out of bounds write. |
arvo:54228 | n132/arvo:54228-vul | /src/libredwg | [
{
"end_line": 5259,
"function_name": "dwg_decode_add_object",
"start_line": 4794,
"target_file": "/src/libredwg/src/decode.c"
}
] | Heap-buffer-overflow READ 1 | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 691282809
INFO: Loaded 1 modules (559861 inline 8-bit counters): 559861 [0x49a20e0, 0x4a2abd5),
INFO: Loaded 1 PC tables (559861 PCs): 559861 [0x3e8a6a8,0x47155f8),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================... | c | 71b36d281a9a168e0c91d38d6a9802460f9017cd | https://github.com/LibreDWG/libredwg/commit/a709cac8ca35686ddaeeddb54decc05d8de18ebf | null |
arvo:54312 | n132/arvo:54312-vul | /src/opensc | [
{
"end_line": 219,
"function_name": "msc_partial_update_object",
"start_line": 178,
"target_file": "/src/opensc/src/libopensc/muscle.c"
}
] | Stack-buffer-overflow WRITE {*} | opensc | asan | Reading 141 bytes from /tmp/poc
=================================================================
==41421==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f3490364a30 at pc 0x00000049f8ba bp 0x7ffd33753b30 sp 0x7ffd337532f8
WRITE of size 512 at 0x7f3490364a30 thread T0
SCARINESS: 60 (multi-byte-write-stack... | c | cfb35259357c210bfea461dac4ca31dae7faaa7d | https://github.com/OpenSC/OpenSC/commit/df5a176bfdf8c52ba89c7fef1f82f6f3b9312bc1 | null |
arvo:54393 | n132/arvo:54393-vul | /src/libredwg | [
{
"end_line": 14562,
"function_name": "dwg_dynapi_header_set_value",
"start_line": 14478,
"target_file": "/src/libredwg/src/dynapi.c"
}
] | Heap-buffer-overflow READ 16 | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 754246996
INFO: Loaded 1 modules (644833 inline 8-bit counters): 644833 [0x52b6ee0, 0x53545c1),
INFO: Loaded 1 PC tables (644833 PCs): 644833 [0x4636670,0x500d480),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=================... | c | 2ed11a3076459c67e949e352b7abacde66fa4365 | https://github.com/LibreDWG/libredwg/commit/20b119e64393c59d0e5ff6f4945f58868a53b1c1 | null |
arvo:54436 | n132/arvo:54436-vul | /src/ghostpdl | [
{
"end_line": 420,
"function_name": "pdfi_process_xref_stream",
"start_line": 150,
"target_file": "/src/ghostpdl/pdf/pdf_xref.c"
}
] | Segv on unknown address | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 4281883088
INFO: Loaded 3 modules (223346 inline 8-bit counters): 13672 [0x7fe8f084a9e0, 0x7fe8f084df48), 959 [0x7fe8f08aba40, 0x7fe8f08abdff), 208715 [0x381c730, 0x384f67b),
INFO: Loaded 3 PC tables (223346 PCs): 13672 [0x7fe8f084df48,0x7fe8f08835c... | cpp | edd17616f1a0467b109b16cc2ee8407ae4c87af7 | https://github.com/ArtifexSoftware/ghostpdl/commit/1b5facd696e036ce738b93505ffd5ad03f0cb63c | A vulnerability exists in GhostPDF where the W array values in an XRefStrm are not properly bounds-checked. If a PDF file contains a negative W entry, it is treated as valid, leading to an attempt to read that number of bytes (cast to unsigned) from a file into a buffer sized based on the signed value. This causes a bu... |
arvo:54511 | n132/arvo:54511-vul | /src/ghostpdl | [
{
"end_line": 186,
"function_name": "pdfi_process_one_page",
"start_line": 140,
"target_file": "/src/ghostpdl/pdf/pdf_page.c"
}
] | UNKNOWN READ | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2664512286
INFO: Loaded 3 modules (223350 inline 8-bit counters): 13672 [0x7fd54fc8e9e0, 0x7fd54fc91f48), 959 [0x7fd54fcefa40, 0x7fd54fcefdff), 208719 [0x381c730, 0x384f67f),
INFO: Loaded 3 PC tables (223350 PCs): 13672 [0x7fd54fc91f48,0x7fd54fcc75c... | cpp | 1b5facd696e036ce738b93505ffd5ad03f0cb63c | https://github.com/ArtifexSoftware/ghostpdl/commit/6324feaa1bdf8e4f50e49d332ce2ef9ec823aa98 | The code does not perform the same cleanup after rendering annotations and acroforms as it does after processing the main page contents in the pdfi interpreter. This allows errors to result in extra gsave levels persisting after the interpreter exits, which can lead to crashes or other problems. |
arvo:54625 | n132/arvo:54625-vul | /src/libredwg | [
{
"end_line": 6092,
"function_name": "decode_preR13_entities",
"start_line": 5846,
"target_file": "/src/libredwg/src/decode.c"
}
] | Heap-buffer-overflow WRITE 1 | libredwg | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2509148567
INFO: Loaded 1 modules (560346 inline 8-bit counters): 560346 [0x4948320, 0x49d0ffa),
INFO: Loaded 1 PC tables (560346 PCs): 560346 [0x3e2c650,0x46b93f0),
/out/llvmfuzz: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
================... | c | cd2c0d5bcf2eff7bafa46f66e5693c47d24ec500 | https://github.com/LibreDWG/libredwg/commit/7f9016032a29873a9c30c6d6548cda13e67fd335 | A vulnerability exists in the decode_r11 function where entities_end can overflow. |
arvo:54948 | n132/arvo:54948-vul | /src/libplist | [
{
"end_line": 837,
"function_name": "node_from_openstep",
"start_line": 584,
"target_file": "/src/libplist/src/oplist.c"
}
] | Heap-buffer-overflow READ 1 | libplist | asan | =================================================================
==9825==ERROR: AddressSanitizer: use-after-poison on address 0x7fba7e7fd8a4 at pc 0x0000004e34f6 bp 0x7fffe3bda330 sp 0x7fffe3bda328
READ of size 1 at 0x7fba7e7fd8a4 thread T0
SCARINESS: 22 (1-byte-read-use-after-poison)
#0 0x4e34f5 in node_from_open... | cpp | 62b03b85a56a7b98e6eef237deeff1a8b41f8fb8 | https://github.com/libimobiledevice/libplist/commit/5bdbd3fe620e66a65373524a0707909ca926a3a1 | A vulnerability in oplist allows an out-of-bounds read due to improper bounds checking. |
arvo:54949 | n132/arvo:54949-vul | /src/libplist | [
{
"end_line": 869,
"function_name": "plist_from_openstep",
"start_line": 834,
"target_file": "/src/libplist/src/oplist.c"
}
] | Heap-use-after-free READ 8 | libplist | asan | =================================================================
==9832==ERROR: AddressSanitizer: heap-use-after-free on address 0x604000000070 at pc 0x0000004e7421 bp 0x7ffc56870e40 sp 0x7ffc56870e38
READ of size 8 at 0x604000000070 thread T0
SCARINESS: 51 (8-byte-read-heap-use-after-free)
#0 0x4e7420 in plist_fr... | cpp | 491a3acc1015951042c95c389a10634e331818c4 | https://github.com/libimobiledevice/libplist/commit/62b03b85a56a7b98e6eef237deeff1a8b41f8fb8 | A use-after-free vulnerability exists in the oplist code, where a pointer is not set to NULL after being freed. |
arvo:5499 | n132/arvo:5499-vul | /src/open62541 | [
{
"end_line": 56,
"function_name": "removeSession",
"start_line": 33,
"target_file": "/src/open62541/src/server/ua_session_manager.c"
}
] | Heap-use-after-free READ 8 | open62541 | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_binary_message < INPUT_FILE
or
/out/fuzz_binary_message INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/f... | cpp | 01f78374285f16749452ba84289356fc85e4ab22 | https://github.com/open62541/open62541/commit/a6d732b4050e902d9bba3acfa7bf72e30fa4dcc6 | null |
arvo:5504 | n132/arvo:5504-vul | /src/open62541 | [
{
"end_line": 56,
"function_name": "removeSession",
"start_line": 33,
"target_file": "/src/open62541/src/server/ua_session_manager.c"
}
] | Heap-use-after-free READ 8 | open62541 | asan | ======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
/out/fuzz_binary_message < INPUT_FILE
or
/out/fuzz_binary_message INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] /out/f... | cpp | 01f78374285f16749452ba84289356fc85e4ab22 | https://github.com/open62541/open62541/commit/a6d732b4050e902d9bba3acfa7bf72e30fa4dcc6 | null |
arvo:55051 | n132/arvo:55051-vul | /src/mupdf | [
{
"end_line": 251,
"function_name": "pdf_parse_bf_range_array",
"start_line": 219,
"target_file": "/src/mupdf/source/pdf/pdf-cmap-parse.c"
}
] | Stack-buffer-overflow READ 4 | mupdf | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 303210954
INFO: Loaded 1 modules (155045 inline 8-bit counters): 155045 [0x3a582c0, 0x3a7e065),
INFO: Loaded 1 PC tables (155045 PCs): 155045 [0x1674c20,0x18d2670),
/out/pdf_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
error: cannot r... | cpp | 360a6e0772e48272a738a9d825ba554387892ff7 | https://github.com/ArtifexSoftware/mupdf/commit/74e920a40e0aea93f7cefca6e6bbff249d637b18 | null |
arvo:55146 | n132/arvo:55146-vul | /src/libplist | [
{
"end_line": 879,
"function_name": "node_from_openstep",
"start_line": 596,
"target_file": "/src/libplist/src/oplist.c"
}
] | Heap-buffer-overflow READ 1 | libplist | asan | =================================================================
==9950==ERROR: AddressSanitizer: use-after-poison on address 0x7fd7fd2fd802 at pc 0x0000004e2cc9 bp 0x7fff9404fbb0 sp 0x7fff9404fba8
READ of size 1 at 0x7fd7fd2fd802 thread T0
SCARINESS: 22 (1-byte-read-use-after-poison)
#0 0x4e2cc8 in node_from_open... | cpp | f31ab3835bb4bf8e574e9920ef9f17359163cbd3 | https://github.com/libimobiledevice/libplist/commit/85f5cbd3705b34fcc52009ca51d8167ab18764fa | An out-of-bounds read occurs in the oplist component. |
arvo:55214 | n132/arvo:55214-vul | /src/hdf5 | [
{
"end_line": 576,
"function_name": "H5G_ent_decode",
"start_line": 119,
"target_file": "/src/hdf5/src/H5Gent.c"
}
] | Heap-buffer-overflow READ 1 | hdf5 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2108464492
INFO: Loaded 1 modules (77673 inline 8-bit counters): 77673 [0x115d0a0, 0x1170009),
INFO: Loaded 1 PC tables (77673 PCs): 77673 [0x1170010,0x129f6a0),
/out/h5_read_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==============... | c | 65eff22348634144cd5a6e77159c27eb895d54b4 | https://github.com/HDFGroup/hdf5/commit/10d4a6d0941240702b5e8d77d57184a88bb69e6c | An out of bounds access occurs in `hdf5/src/H5Fint.c` at line 2859. |
arvo:55365 | n132/arvo:55365-vul | /src/libzip | [
{
"end_line": 947,
"function_name": "zip_check_torrentzip",
"start_line": 894,
"target_file": "/src/libzip/lib/zip_open.c"
}
] | Heap-use-after-free READ 1 | libzip | asan | Accepting input from '/tmp/poc'
Usage for fuzzing: honggfuzz -P [flags] -- /out/zip_read_fuzzer
=================================================================
==4862==ERROR: AddressSanitizer: heap-use-after-free on address 0x6080000000d8 at pc 0x0000005059ca bp 0x7ffe14ecf070 sp 0x7ffe14ecf068
READ of size 1 at 0x60... | cpp | 5eeb3fdf58caef856c6050431187869f15006912 | https://github.com/nih-at/libzip/commit/e907b0bda2f04c16eb7f10d5b2f41a3416a3e2b8 | null |
arvo:55430 | n132/arvo:55430-vul | /src/zeek | [
{
"end_line": 333,
"function_name": "TeredoAnalyzer::DetectProtocol",
"start_line": 268,
"target_file": "/src/zeek/src/packet_analysis/protocol/teredo/Teredo.cc"
}
] | Heap-buffer-overflow READ 2 | zeek | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 114601111
INFO: Loaded 4 modules (606769 inline 8-bit counters): 242 [0x7fce2f8fdde8, 0x7fce2f8fdeda), 227828 [0x7fce31bf2f00, 0x7fce31c2a8f4), 378167 [0x7fce3534f528, 0x7fce353aba5f), 532 [0x5f6310, 0x5f6524),
INFO: Loaded 4 PC tables (606769 PCs):... | cpp | 9a96e3b52ad1850a1b80375f65add88e8ece4cbf | https://github.com/zeek/zeek/commit/2866bbea4d0f4ccf79f2088728d55c769efe46cc | The Teredo::DetectProtocol function lacks sufficient length checks, which may allow processing of data with incorrect or insufficient length. |
arvo:55443 | n132/arvo:55443-vul | /src/ghostpdl | [
{
"end_line": 1440,
"function_name": "gs_main_finit",
"start_line": 1229,
"target_file": "/src/ghostpdl/psi/imain.c"
}
] | Heap-use-after-free READ 2 | ghostpdl | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 1096716529
INFO: Loaded 3 modules (223637 inline 8-bit counters): 13672 [0x7f76fdb829e0, 0x7f76fdb85f48), 959 [0x7f76fdbe3a40, 0x7f76fdbe3dff), 209006 [0x382a690, 0x385d6fe),
INFO: Loaded 3 PC tables (223637 PCs): 13672 [0x7f76fdb85f48,0x7f76fdbbb5c... | cpp | 936d966618c81fa125604fe76932f1d4f33df8e3 | https://github.com/ArtifexSoftware/ghostpdl/commit/e8da62c6ab890c6a27762f9285441afc6920e558 | A dangling reference vulnerability occurs in an extreme out-of-memory condition where, if memory is exhausted to the point that the Postscript error handler cannot run properly, references to arrays recording the stacks' content in $error can persist until final garbage collection, even though the arrays themselves hav... |
arvo:55724 | n132/arvo:55724-vul | /src/libgit2 | [
{
"end_line": 162,
"function_name": "commit_graph_parse_oid_lookup",
"start_line": 135,
"target_file": "/src/libgit2/src/libgit2/commit_graph.c"
},
{
"end_line": 302,
"function_name": "git_commit_graph_file_parse",
"start_line": 199,
"target_file": "/src/libgit2/src/libgit2/commi... | Heap-buffer-overflow READ {*} | libgit2 | asan | INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2319727579
INFO: Loaded 1 modules (35856 inline 8-bit counters): 35856 [0xc6cf00, 0xc75b10),
INFO: Loaded 1 PC tables (35856 PCs): 35856 [0xb23e30,0xbaff30),
/out/commit_graph_fuzzer: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
=============... | cpp | be484d355b1b41748689fd29381bdcdcbd4c45bb | https://github.com/libgit2/libgit2/commit/b899fda3d88dc92f50e73544fb7524a1c3c70354 | null |
arvo:5576 | n132/arvo:5576-vul | /src/open62541 | [
{
"end_line": 282,
"function_name": "Service_ActivateSession",
"start_line": 232,
"target_file": "/src/open62541/src/server/ua_services_session.c"
}
] | Use-of-uninitialized-value | open62541 | msan | INFO: Seed: 2780430290
INFO: Loaded 1 modules (5217 inline 8-bit counters): 5217 [0xb547f8, 0xb55c59),
INFO: Loaded 1 PC tables (5217 PCs): 5217 [0xb55c60,0xb6a270),
/out/fuzz_binary_message: Running 1 inputs 1 time(s) each.
Running: /tmp/poc
==878==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x5232... | cpp | c54a3e26439600a075c5ac427da1aae0f0781655 | https://github.com/open62541/open62541/commit/3d4b8666b02ecea0045c2ba8ae4c46a3f766c765 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.