task_id
stringlengths
8
10
docker_image
stringlengths
17
19
basedir
stringclasses
157 values
target_functions
listlengths
1
3
crash_type
stringclasses
85 values
project_name
stringclasses
157 values
sanitizer
stringclasses
3 values
sanitizer_output
stringlengths
1.13k
6.5M
language
stringclasses
2 values
vuln_commit
stringlengths
40
40
fix
stringlengths
69
110
vulnerability_description
stringlengths
38
824
arvo:49549
n132/arvo:49549-vul
/src/lcms
[ { "end_line": 884, "function_name": "_cmsReadHeader", "start_line": 764, "target_file": "/src/lcms/src/cmsio0.c" } ]
Use-of-uninitialized-value
lcms
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4111556026 INFO: Loaded 1 modules (7688 inline 8-bit counters): 7688 [0x6ddc79, 0x6dfa81), INFO: Loaded 1 PC tables (7688 PCs): 7688 [0x66bfd0,0x68a050), /out/cms_transform_all_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==12982==WAR...
cpp
89b5f465e5e47d43209b09e4b577b6f09d597cc1
https://github.com/mm2/Little-CMS/commit/f3f6b7bceb629bc4b6f1dea3e45b44dc3f8674af
null
arvo:49550
n132/arvo:49550-vul
/src/mruby
[ { "end_line": 2442, "function_name": "mrb_vm_exec", "start_line": 1287, "target_file": "/src/mruby/src/vm.c" } ]
UNKNOWN READ
mruby
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 468667285 INFO: Loaded 1 modules (23289 inline 8-bit counters): 23289 [0x99b0e9, 0x9a0be2), INFO: Loaded 1 PC tables (23289 PCs): 23289 [0x8dd1e8,0x938178), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc MemorySanitizer:DEADL...
c
de2ea3c389e4f5a4b0910fbf203b93d8cf409957
https://github.com/mruby/mruby/commit/d0780c0525830b51162fd04e5f618181cec8620b
In vm.c, failing to cast bigint length to unsigned causes lengths greater than 127 to be interpreted as negative.
arvo:49582
n132/arvo:49582-vul
/src/lcms
[ { "end_line": 884, "function_name": "_cmsReadHeader", "start_line": 764, "target_file": "/src/lcms/src/cmsio0.c" } ]
Use-of-uninitialized-value
lcms
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1588127420 INFO: Loaded 1 modules (7688 inline 8-bit counters): 7688 [0x6ddc79, 0x6dfa81), INFO: Loaded 1 PC tables (7688 PCs): 7688 [0x66bfd0,0x68a050), /out/cms_transform_all_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==12981==WAR...
cpp
89b5f465e5e47d43209b09e4b577b6f09d597cc1
https://github.com/mm2/Little-CMS/commit/f3f6b7bceb629bc4b6f1dea3e45b44dc3f8674af
null
arvo:49606
n132/arvo:49606-vul
/src/ghostpdl
[ { "end_line": 82, "function_name": "pdfi_repair_add_object", "start_line": 28, "target_file": "/src/ghostpdl/pdf/pdf_repair.c" } ]
UNKNOWN WRITE
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1824331617 INFO: Loaded 3 modules (222176 inline 8-bit counters): 13708 [0x7fb4647969e0, 0x7fb464799f6c), 959 [0x7fb4647f7a40, 0x7fb4647f7dff), 207509 [0x378f530, 0x37c1fc5), INFO: Loaded 3 PC tables (222176 PCs): 13708 [0x7fb464799f70,0x7fb4647cf83...
cpp
af3fa99aece39bfb83583d28e817c630c269bfea
https://github.com/ArtifexSoftware/ghostpdl/commit/dd907d6d9e772f91a9b652c3e765439f38e7147d
A vulnerability exists where, if an addition to the xref table in the relevant file is rejected because the object number exceeds a 32-bit signed integer, is less than 0, the generation number is less than 0, or the file offset is less than 0, no error is returned. When decoding an object stream, the absence of an erro...
arvo:49654
n132/arvo:49654-vul
/src/ghostpdl
[ { "end_line": 381, "function_name": "pdfi_open_CIDFont_substitute_file", "start_line": 180, "target_file": "/src/ghostpdl/pdf/pdf_font.c" } ]
Heap-use-after-free READ 1
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 392153004 INFO: Loaded 3 modules (222179 inline 8-bit counters): 13708 [0x7f400b6469e0, 0x7f400b649f6c), 959 [0x7f400b6a7a40, 0x7f400b6a7dff), 207512 [0x378f570, 0x37c2008), INFO: Loaded 3 PC tables (222179 PCs): 13708 [0x7f400b649f70,0x7f400b67f830...
cpp
00b46feb7034a46b2933bfadecfdc9bc1091fb99
https://github.com/ArtifexSoftware/ghostpdl/commit/8958762daf5c75ebd7f076f5140376acd09652b4
null
arvo:49662
n132/arvo:49662-vul
/src/ghostpdl
[ { "end_line": 381, "function_name": "pdfi_open_CIDFont_substitute_file", "start_line": 180, "target_file": "/src/ghostpdl/pdf/pdf_font.c" } ]
UNKNOWN READ
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 958780079 INFO: Loaded 3 modules (222179 inline 8-bit counters): 13708 [0x7f85716059e0, 0x7f8571608f6c), 959 [0x7f8571666a40, 0x7f8571666dff), 207512 [0x378f530, 0x37c1fc8), INFO: Loaded 3 PC tables (222179 PCs): 13708 [0x7f8571608f70,0x7f857163e830...
cpp
00b46feb7034a46b2933bfadecfdc9bc1091fb99
https://github.com/ArtifexSoftware/ghostpdl/commit/8958762daf5c75ebd7f076f5140376acd09652b4
null
arvo:49698
n132/arvo:49698-vul
/src/openexr
[ { "end_line": 1826, "function_name": "internal_huf_decompress", "start_line": 1745, "target_file": "/src/openexr/src/lib/OpenEXRCore/internal_huf.c" } ]
Heap-buffer-overflow READ 8
openexr
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 355281388 INFO: Loaded 1 modules (37591 inline 8-bit counters): 37591 [0xd3eb88, 0xd47e5f), INFO: Loaded 1 PC tables (37591 PCs): 37591 [0xd47e60,0xddabd0), /out/openexr_exrcorecheck_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ======...
cpp
d59452aa382d620ed9a903b3a9b9a920f35d9c32
https://github.com/AcademySoftwareFoundation/openexr/commit/043a50807eb19af844dd34281900b2ad8571325f
null
arvo:49763
n132/arvo:49763-vul
/src/mruby
[ { "end_line": 499, "function_name": "udiv", "start_line": 431, "target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c" } ]
Heap-buffer-overflow WRITE 4
mruby
asan
INFO: found LLVMFuzzerCustomMutator (0x55fc00). Disabling -len_control by default. INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 400639784 INFO: Loaded 1 modules (27693 inline 8-bit counters): 27693 [0xb68918, 0xb6f545), INFO: Loaded 1 PC tables (27693 PCs): 27693 [0x9cb968,0xa37c38), /out/mru...
cpp
02f44d76fcf86ee50d5e3604312da963bbcb2c74
https://github.com/mruby/mruby/commit/5ccca7e45b802051e00e3398ecf036f86ba92843
null
arvo:49797
n132/arvo:49797-vul
/src/assimp
[ { "end_line": 331, "function_name": "OFFImporter::InternReadFile", "start_line": 108, "target_file": "/src/assimp/code/AssetLib/OFF/OFFLoader.cpp" } ]
Heap-buffer-overflow READ 4
assimp
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2250769320 INFO: Loaded 1 modules (206139 inline 8-bit counters): 206139 [0x1c72ba0, 0x1ca50db), INFO: Loaded 1 PC tables (206139 PCs): 206139 [0x1ca50e0,0x1fca490), /out/assimp_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Info, T0: ...
cpp
0fdae2879d78864693ee730610dcf8ee10707875
https://github.com/assimp/assimp/commit/ee02c389ca2106cc70f5cea2d7e5d43b96510f27
A heap-buffer-overflow occurs during a READ operation of 4 bytes in the function Assimp::ScenePreprocessor::ProcssMesh.
arvo:49819
n132/arvo:49819-vul
/src/S2OPC
[ { "end_line": 1420, "function_name": "Decode_Message_V1", "start_line": 1225, "target_file": "/src/S2OPC/src/PubSub/network/sopc_network_layer.c" } ]
Use-of-uninitialized-value
S2OPC
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3142684030 INFO: Loaded 1 modules (16372 inline 8-bit counters): 16372 [0x847cb3, 0x84bca7), INFO: Loaded 1 PC tables (16372 PCs): 16372 [0x84bca8,0x88bbe8), /out/sub_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==10733==WARNING: Memo...
c
8cb6dd6c1f3460dda05a4ec28bdfd35371dc35d3
https://gitlab.com/systerel/S2OPC/-/commit/040cd827d395f46a8515a7d2a7c7ab101f7f1de1
null
arvo:49845
n132/arvo:49845-vul
/src/mruby
[ { "end_line": 499, "function_name": "udiv", "start_line": 431, "target_file": "/src/mruby/mrbgems/mruby-bigint/core/bigint.c" } ]
Heap-buffer-overflow WRITE 4
mruby
asan
INFO: found LLVMFuzzerCustomMutator (0x55fc00). Disabling -len_control by default. INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3277569687 INFO: Loaded 1 modules (27693 inline 8-bit counters): 27693 [0xb68918, 0xb6f545), INFO: Loaded 1 PC tables (27693 PCs): 27693 [0x9cb968,0xa37c38), /out/mr...
cpp
02f44d76fcf86ee50d5e3604312da963bbcb2c74
https://github.com/mruby/mruby/commit/5ccca7e45b802051e00e3398ecf036f86ba92843
null
arvo:50099
n132/arvo:50099-vul
/src/ghostpdl
[ { "end_line": 1985, "function_name": "pdfi_read_cff", "start_line": 1608, "target_file": "/src/ghostpdl/pdf/pdf_font1C.c" } ]
Heap-buffer-overflow READ 1
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1896875745 INFO: Loaded 3 modules (213008 inline 8-bit counters): 13708 [0x7fca21dfb9e0, 0x7fca21dfef6c), 959 [0x7fca21e5ca40, 0x7fca21e5cdff), 198341 [0x3615650, 0x3645d15), INFO: Loaded 3 PC tables (213008 PCs): 13708 [0x7fca21dfef70,0x7fca21e3483...
cpp
be2dd780341922ea945ad6abc7cfeed3400c2afe
https://github.com/ArtifexSoftware/ghostpdl/commit/2b3b754fe12591dc26309fc92fcefac12ca5a6af
A mistake in setting the CFF data buffer limit for fdarray subfonts in the code allows for a security vulnerability.
arvo:50115
n132/arvo:50115-vul
/src/lcms
[ { "end_line": 884, "function_name": "_cmsReadHeader", "start_line": 764, "target_file": "/src/lcms/src/cmsio0.c" } ]
Heap-buffer-overflow READ 8
lcms
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 729637037 INFO: Loaded 1 modules (7683 inline 8-bit counters): 7683 [0x831c5d0, 0x831e3d3), INFO: Loaded 1 PC tables (7683 PCs): 7683 [0x829e63c,0x82ad654), /out/cms_transform_all_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =========...
c
89b5f465e5e47d43209b09e4b577b6f09d597cc1
https://github.com/mm2/Little-CMS/commit/f3f6b7bceb629bc4b6f1dea3e45b44dc3f8674af
null
arvo:5018
n132/arvo:5018-vul
/src/open62541
[ { "end_line": 940, "function_name": "writeValueAttributeWithRange", "start_line": 903, "target_file": "/src/open62541/src/server/ua_services_attribute.c" } ]
Heap-buffer-overflow READ 4
open62541
asan
INFO: Seed: 2646230007 INFO: Loaded 1 modules (5136 inline 8-bit counters): 5136 [0xa26030, 0xa27440), INFO: Loaded 1 PC tables (5136 PCs): 5136 [0xa27440,0xa3b540), /out/fuzz_binary_message: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==875==...
cpp
b4a72aad61762e4f3aa84702ef415454ab3c958e
https://github.com/open62541/open62541/commit/68bdf5e9a9bfc1c50b0bae131ef34b7c12f2b9ba
null
arvo:50306
n132/arvo:50306-vul
/src/ghostpdl
[ { "end_line": 912, "function_name": "gs_type2_interpret", "start_line": 121, "target_file": "/src/ghostpdl/base/gstype2.c" } ]
Stack-buffer-underflow READ 4
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1914675536 INFO: Loaded 3 modules (203613 inline 8-bit counters): 13708 [0x7fcfaec279e0, 0x7fcfaec2af6c), 959 [0x7fcfaec88a40, 0x7fcfaec88dff), 188946 [0x345cc90, 0x348aea2), INFO: Loaded 3 PC tables (203613 PCs): 13708 [0x7fcfaec2af70,0x7fcfaec6083...
cpp
9f8ad8cff4ca7d6ce8b772b109b8aa77a84ba97a
https://github.com/ArtifexSoftware/ghostpdl/commit/05efb77627aa0e05ab59ec1d6cb6988e1eb9710e
The Type 2 charstring interpreter in the code lacks a stack bounds check, which can lead to a security vulnerability.
arvo:50326
n132/arvo:50326-vul
/src/ghostpdl
[ { "end_line": 573, "function_name": "gs_type1_piece_codes", "start_line": 348, "target_file": "/src/ghostpdl/base/gxtype1.c" } ]
Stack-buffer-overflow WRITE 8
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4233075121 INFO: Loaded 3 modules (203622 inline 8-bit counters): 13708 [0x7fc1cee8d9e0, 0x7fc1cee90f6c), 959 [0x7fc1ceeeea40, 0x7fc1ceeeedff), 188955 [0x345cd50, 0x348af6b), INFO: Loaded 3 PC tables (203622 PCs): 13708 [0x7fc1cee90f70,0x7fc1ceec683...
cpp
71484d8977bf79411dca9ebc6c9c1fcc36723ea7
https://github.com/ArtifexSoftware/ghostpdl/commit/eba3379360caec1d881d96c5d51ed4282278cd1f
A vulnerability exists in the Type 1/2 charstring execution state stack due to an incorrect bounds checking macro, which is not used in the minimal CharString interpreter found in pdfwrite and related components.
arvo:50406
n132/arvo:50406-vul
/src/ghostpdl
[ { "end_line": 3727, "function_name": "pdfi_annot_draw_Widget", "start_line": 3632, "target_file": "/src/ghostpdl/pdf/pdf_annot.c" } ]
UNKNOWN WRITE
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1616728514 INFO: Loaded 3 modules (222767 inline 8-bit counters): 13708 [0x7f095a5199e0, 0x7f095a51cf6c), 959 [0x7f095a57aa40, 0x7f095a57adff), 208100 [0x37e06b0, 0x3813394), INFO: Loaded 3 PC tables (222767 PCs): 13708 [0x7f095a51cf70,0x7f095a55283...
cpp
f31bb9804bd1bc3bc744fad90320279691979154
https://github.com/ArtifexSoftware/ghostpdl/commit/1d8d9605e251d1b51281efe5ef8db07640e49203
null
arvo:50414
n132/arvo:50414-vul
/src/lcms
[ { "end_line": 2326, "function_name": "Type_LUT16_Write", "start_line": 2191, "target_file": "/src/lcms/src/cmstypes.c" } ]
Heap-buffer-overflow READ 2
lcms
asan
================================================================= ==13019==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x610000000100 at pc 0x0000004e92ea bp 0x7ffdafccfb90 sp 0x7ffdafccfb88 READ of size 2 at 0x610000000100 thread T0 SCARINESS: 14 (2-byte-read-heap-buffer-overflow) #0 0x4e92e9 in _cmsW...
c
7600d91699256c0b2929023700c41772e8b61a99
https://github.com/mm2/Little-CMS/commit/54390818348493a88c43b0dadbad77bdc9750699
lcms reads crafted profiles with bogus data due to its tolerant reading behavior, but does not write them because it is strict when writing. This situation may result in memory corruption.
arvo:50433
n132/arvo:50433-vul
/src/c-blosc2
[ { "end_line": 2287, "function_name": "write_compression_header", "start_line": 2212, "target_file": "/src/c-blosc2/blosc/blosc2.c" } ]
Heap-buffer-overflow WRITE 4
c-blosc2
asan
================================================================= ==7250==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6040000000b0 at pc 0x0000004e2aee bp 0x7ffc207e2bf0 sp 0x7ffc207e2be8 WRITE of size 4 at 0x6040000000b0 thread T0 SCARINESS: 36 (4-byte-write-heap-buffer-overflow) #0 0x4e2aed in _sw3...
cpp
3c630983297df56c3db4a490bd2175fb22691089
https://github.com/Blosc/c-blosc2/commit/55e9b06c6191af68938dc3301b7ed4153cf86f7a
null
arvo:50436
n132/arvo:50436-vul
/src/ghostpdl
[ { "end_line": 3727, "function_name": "pdfi_annot_draw_Widget", "start_line": 3632, "target_file": "/src/ghostpdl/pdf/pdf_annot.c" } ]
Global-buffer-overflow READ 8
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3692411194 INFO: Loaded 3 modules (222767 inline 8-bit counters): 13708 [0x7f40b74509e0, 0x7f40b7453f6c), 959 [0x7f40b74b1a40, 0x7f40b74b1dff), 208100 [0x37e06b0, 0x3813394), INFO: Loaded 3 PC tables (222767 PCs): 13708 [0x7f40b7453f70,0x7f40b748983...
cpp
f31bb9804bd1bc3bc744fad90320279691979154
https://github.com/ArtifexSoftware/ghostpdl/commit/1d8d9605e251d1b51281efe5ef8db07640e49203
null
arvo:50589
n132/arvo:50589-vul
/src/assimp
[ { "end_line": 331, "function_name": "IOStreamBuffer<T>::getNextLine", "start_line": 288, "target_file": "/src/assimp/include/assimp/IOStreamBuffer.h" } ]
UNKNOWN READ
assimp
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1200122727 INFO: Loaded 1 modules (222573 inline 8-bit counters): 222573 [0x1619db0, 0x165031d), INFO: Loaded 1 PC tables (222573 PCs): 222573 [0x1650320,0x19b59f0), /out/assimp_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Info, T0: ...
cpp
8c6b3fe69aecb8d92af8b151faf847f9bc11eb3b
https://github.com/assimp/assimp/commit/db72c6ee38e5a87f4aaf255197eb49da2b1fa651
A vulnerability exists where, if "getNextBlock" is called after "getNextLine", the pointer may still be positioned on the newline character. When a line ends with \r\n, the pointer may not advance sufficiently, causing it to point at \n, which is still part of the newline. As a result, "getNextBlock" may process 1 byte...
arvo:50610
n132/arvo:50610-vul
/src/h2o
[ { "end_line": 939, "function_name": "h2o_socket_sendvec", "start_line": 896, "target_file": "/src/h2o/lib/common/socket.c" } ]
Non-positive-vla-bound-value
h2o
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3447951186 INFO: Loaded 1 modules (31983 inline 8-bit counters): 31983 [0xa77ef8, 0xa7fbe7), INFO: Loaded 1 PC tables (31983 PCs): 31983 [0x8d0e88,0x94dd78), /out/h2o-fuzzer-http1: Running 1 inputs 1 time(s) each. Running: /tmp/poc /src/h2o/lib/com...
cpp
36a23af525d2b4a2249d7a36191b6de74c71c6be
https://github.com/h2o/h2o/commit/f995000834a6bbee1c2a53114e0e41b596c33431
null
arvo:50656
n132/arvo:50656-vul
/src/ghostpdl
[ { "end_line": 2341, "function_name": "Ins_NPUSHB", "start_line": 2322, "target_file": "/src/ghostpdl/base/ttinterp.c" } ]
Heap-buffer-overflow READ 1
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 702513896 INFO: Loaded 3 modules (203721 inline 8-bit counters): 13708 [0x7f748148a9e0, 0x7f748148df6c), 959 [0x7f74814eba40, 0x7f74814ebdff), 189054 [0x345ddf0, 0x348c06e), INFO: Loaded 3 PC tables (203721 PCs): 13708 [0x7f748148df70,0x7f74814c3830...
cpp
0381294369ea5bacd10b4167b336bf1cb6d8d4ef
https://github.com/ArtifexSoftware/ghostpdl/commit/ed51807f5c7d5208c703de3ab60cff49adf96328
A vulnerability exists in Ins_NPUSHB() due to a missing bounds check on the instruction buffer.
arvo:50725
n132/arvo:50725-vul
/src/lcms
[ { "end_line": 1221, "function_name": "cmsCreateExtendedTransform", "start_line": 1074, "target_file": "/src/lcms/src/cmsxform.c" } ]
Heap-buffer-overflow READ 8
lcms
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1607711012 INFO: Loaded 1 modules (7699 inline 8-bit counters): 7699 [0x6a4030, 0x6a5e43), INFO: Loaded 1 PC tables (7699 PCs): 7699 [0x630d60,0x64ee90), /out/cms_transform_all_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ============...
c
682d84ccdc6d6f33b73557d8c2e2e73fc4c31025
https://github.com/mm2/Little-CMS/commit/e515daaa2259657319eb9f07181d02af24b4e7fe
null
arvo:50731
n132/arvo:50731-vul
/src/ghostpdl
[ { "end_line": 670, "function_name": "pdfi_get_image_info", "start_line": 438, "target_file": "/src/ghostpdl/pdf/pdf_image.c" } ]
Global-buffer-overflow READ 8
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2131070297 INFO: Loaded 3 modules (221388 inline 8-bit counters): 13672 [0x7f491754b9e0, 0x7f491754ef48), 959 [0x7f49175aca40, 0x7f49175acdff), 206757 [0x37e0390, 0x3812b35), INFO: Loaded 3 PC tables (221388 PCs): 13672 [0x7f491754ef48,0x7f49175845c...
cpp
a8168fcba7cf6ebb82d3ec334c25cfa57062fc83
https://github.com/ArtifexSoftware/ghostpdl/commit/593cc12df5834bf0734b4196d7447e02414f5ba3
null
arvo:50773
n132/arvo:50773-vul
/src/php-src
[ { "end_line": 2412, "function_name": "php_date_initialize", "start_line": 2301, "target_file": "/src/php-src/ext/date/php_date.c" } ]
Heap-use-after-free READ 4
php-src
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/php-fuzz-execute ================================================================= ==132860==ERROR: AddressSanitizer: heap-use-after-free on address 0x60300001aff0 at pc 0x0000006d2d8b bp 0x7fffd069bf50 sp 0x7fffd069bf48 READ of size 4 at 0...
cpp
6af3f5d514f8223f7557ed1930847259d3896436
https://github.com/php/php-src/commit/8cdfffb7537084e3f8a691fc13428425f559566c
null
arvo:50783
n132/arvo:50783-vul
/src/lcms
[ { "end_line": 1221, "function_name": "cmsCreateExtendedTransform", "start_line": 1074, "target_file": "/src/lcms/src/cmsxform.c" } ]
Use-of-uninitialized-value
lcms
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2337873479 INFO: Loaded 1 modules (7699 inline 8-bit counters): 7699 [0x6ddcc9, 0x6dfadc), INFO: Loaded 1 PC tables (7699 PCs): 7699 [0x66c010,0x68a140), /out/cms_transform_all_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==12985==WAR...
cpp
682d84ccdc6d6f33b73557d8c2e2e73fc4c31025
https://github.com/mm2/Little-CMS/commit/e515daaa2259657319eb9f07181d02af24b4e7fe
null
arvo:50832
n132/arvo:50832-vul
/src/lcms
[ { "end_line": 1221, "function_name": "cmsCreateExtendedTransform", "start_line": 1074, "target_file": "/src/lcms/src/cmsxform.c" } ]
Negative-size-param
lcms
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 920785964 INFO: Loaded 1 modules (7658 inline 8-bit counters): 7658 [0x834c670, 0x834e45a), INFO: Loaded 1 PC tables (7658 PCs): 7658 [0x82cb2d8,0x82da228), /out/cms_universal_transform_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===...
c
682d84ccdc6d6f33b73557d8c2e2e73fc4c31025
https://github.com/mm2/Little-CMS/commit/e515daaa2259657319eb9f07181d02af24b4e7fe
null
arvo:50834
n132/arvo:50834-vul
/src/ghostpdl
[ { "end_line": 2370, "function_name": "Ins_NPUSHW", "start_line": 2347, "target_file": "/src/ghostpdl/base/ttinterp.c" } ]
Heap-buffer-overflow READ 1
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1214686358 INFO: Loaded 3 modules (203752 inline 8-bit counters): 13708 [0x7fa33fc619e0, 0x7fa33fc64f6c), 959 [0x7fa33fcc2a40, 0x7fa33fcc2dff), 189085 [0x345ee70, 0x348d10d), INFO: Loaded 3 PC tables (203752 PCs): 13708 [0x7fa33fc64f70,0x7fa33fc9a83...
cpp
d65e1bd8a5f8183897d2fb99bf3428217370b645
https://github.com/ArtifexSoftware/ghostpdl/commit/00897ae3a48a4f36b84fe61a1e3aa6252bf418e5
A security vulnerability exists in the Ins_NPUSHW() function where there is no bounds check on the code buffer. For each argument pushed, the function reads two values from the code buffer, which can lead to out-of-bounds reads.
arvo:50839
n132/arvo:50839-vul
/src/lcms
[ { "end_line": 1221, "function_name": "cmsCreateExtendedTransform", "start_line": 1074, "target_file": "/src/lcms/src/cmsxform.c" } ]
Null-dereference READ
lcms
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2688347976 INFO: Loaded 1 modules (7663 inline 8-bit counters): 7663 [0x6d2030, 0x6d3e1f), INFO: Loaded 1 PC tables (7663 PCs): 7663 [0x65b988,0x679878), /out/cms_universal_transform_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Addres...
c
682d84ccdc6d6f33b73557d8c2e2e73fc4c31025
https://github.com/mm2/Little-CMS/commit/e515daaa2259657319eb9f07181d02af24b4e7fe
null
arvo:50847
n132/arvo:50847-vul
/src/ghostpdl
[ { "end_line": 874, "function_name": "ttfOutliner__BuildGlyphOutlineAux", "start_line": 485, "target_file": "/src/ghostpdl/base/ttfmain.c" } ]
Heap-buffer-overflow READ 4
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3676121890 INFO: Loaded 3 modules (222504 inline 8-bit counters): 13708 [0x7f6f753c79e0, 0x7f6f753caf6c), 959 [0x7f6f75428a40, 0x7f6f75428dff), 207837 [0x37956b0, 0x37c828d), INFO: Loaded 3 PC tables (222504 PCs): 13708 [0x7f6f753caf70,0x7f6f7540083...
cpp
00897ae3a48a4f36b84fe61a1e3aa6252bf418e5
https://github.com/ArtifexSoftware/ghostpdl/commit/361febcf961baa853f34909cd3925ffa7f90e7ea
A vulnerability exists in ttfOutliner__BuildGlyphOutlineAux() where points indices are not bounds checked.
arvo:509
n132/arvo:509-vul
/src/freetype2
[ { "end_line": 1285, "function_name": "tt_size_reset", "start_line": 1208, "target_file": "/src/freetype2/src/truetype/ttobjs.c" } ]
Heap-buffer-overflow WRITE 1
freetype2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4045030726 INFO: Loaded 1 modules (22423 inline 8-bit counters): 22423 [0x8c8fe8, 0x8ce77f), INFO: Loaded 1 PC tables (22423 PCs): 22423 [0x7ff530,0x856ea0), /out/ftfuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ========================...
cpp
dadc50a4679c74ead5a283dd48a4164bc4a27cdd
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=e6699596af5c5d6f0ae0ea06e19df87dce088df8
A vulnerability exists in the MVAR post-action handling in src/truetype/ttobjs.c, where the function tt_size_reset does not properly handle CFF2. This affects the correct operation of tt_size_reset_iterator when called in tt_apply_mvar.
arvo:50956
n132/arvo:50956-vul
/src/lcms
[ { "end_line": 1785, "function_name": "OptimizeMatrixShaper", "start_line": 1662, "target_file": "/src/lcms/src/cmsopt.c" } ]
Heap-buffer-overflow READ 8
lcms
asan
================================================================= ==12991==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6030000001a8 at pc 0x0000005a5375 bp 0x7ffed2b69d60 sp 0x7ffed2b69d58 READ of size 8 at 0x6030000001a8 thread T0 SCARINESS: 23 (8-byte-read-heap-buffer-overflow) #0 0x5a5374 in _cmsM...
c
caab4c07e60022a0f776b543eaa30785e2bb42ed
https://github.com/mm2/Little-CMS/commit/ba7004c8ff07bee2c9b6bccb8036611d8b0b2408
null
arvo:51011
n132/arvo:51011-vul
/src/ghostpdl
[ { "end_line": 578, "function_name": "gs_type1_piece_codes", "start_line": 348, "target_file": "/src/ghostpdl/base/gxtype1.c" } ]
Stack-buffer-underflow READ 4
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2897323115 INFO: Loaded 3 modules (203807 inline 8-bit counters): 13708 [0x7f74c03929e0, 0x7f74c0395f6c), 959 [0x7f74c03f3a40, 0x7f74c03f3dff), 189140 [0x3460ef0, 0x348f1c4), INFO: Loaded 3 PC tables (203807 PCs): 13708 [0x7f74c0395f70,0x7f74c03cb83...
cpp
0c3592453c20d3e61f539232422f1f57014a055c
https://github.com/ArtifexSoftware/ghostpdl/commit/21380a712bb427670db47a0193d450c35e72856a
A lack of bounds checking on the CharString opstack for the SEAC opcode in the code allows for a security vulnerability.
arvo:51045
n132/arvo:51045-vul
/src/ghostpdl
[ { "end_line": 4115, "function_name": "Ins_ISECT", "start_line": 4045, "target_file": "/src/ghostpdl/base/ttinterp.c" } ]
UNKNOWN WRITE
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3747104975 INFO: Loaded 3 modules (203809 inline 8-bit counters): 13708 [0x7ff94cb869e0, 0x7ff94cb89f6c), 959 [0x7ff94cbe7a40, 0x7ff94cbe7dff), 189142 [0x3460ef0, 0x348f1c6), INFO: Loaded 3 PC tables (203809 PCs): 13708 [0x7ff94cb89f70,0x7ff94cbbf83...
cpp
21380a712bb427670db47a0193d450c35e72856a
https://github.com/ArtifexSoftware/ghostpdl/commit/f86dd15fb28335c36274d76fd98b5c8d49f4008a
A vulnerability exists in the Ins_ISECT() function due to a missing bounds check on available points.
arvo:51089
n132/arvo:51089-vul
/src/ghostpdl
[ { "end_line": 929, "function_name": "gs_type2_interpret", "start_line": 122, "target_file": "/src/ghostpdl/base/gstype2.c" } ]
Stack-buffer-underflow READ 4
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 823789872 INFO: Loaded 3 modules (203983 inline 8-bit counters): 13708 [0x7ffafeb759e0, 0x7ffafeb78f6c), 959 [0x7ffafebd6a40, 0x7ffafebd6dff), 189316 [0x3463f50, 0x34922d4), INFO: Loaded 3 PC tables (203983 PCs): 13708 [0x7ffafeb78f70,0x7ffafebae830...
cpp
8126e9fdff42fb5d33d5d2bee8372a73e02f10e1
https://github.com/ArtifexSoftware/ghostpdl/commit/92b792f6a34d2436772dd141760faf925e139c01
A security vulnerability exists in the Type 2 charstring code due to insufficient operand stack checking, which can lead to potential stack overflows or other unintended behavior.
arvo:51090
n132/arvo:51090-vul
/src/wireshark
[ { "end_line": 178, "function_name": "dissect_form_urlencoded", "start_line": 102, "target_file": "/src/wireshark/epan/dissectors/packet-http-urlencoded.c" } ]
Heap-buffer-overflow READ 1
wireshark
asan
oss-fuzzshark: disabling: ip oss-fuzzshark: disabling: udplite oss-fuzzshark: disabling: ospf oss-fuzzshark: disabling: bgp oss-fuzzshark: disabling: dhcp oss-fuzzshark: disabling: json oss-fuzzshark: disabling: snort oss-fuzzshark: configured for dissector: udp in table: ip.proto INFO: Running with entropic power sche...
c
2c3702776263827bc645fb3078c400cfda97704e
https://github.com/wireshark/wireshark/commit/af0b20a9692cd7cbfb58c655e82a4310f9cb6eba
null
arvo:51102
n132/arvo:51102-vul
/src/hunspell
[ { "end_line": 147, "function_name": "SuggestMgr::SuggestMgr", "start_line": 85, "target_file": "/src/hunspell/src/hunspell/suggestmgr.cxx" } ]
Heap-buffer-overflow READ 2
hunspell
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3165467470 INFO: Loaded 1 modules (17226 inline 8-bit counters): 17226 [0x84ccd8, 0x851022), INFO: Loaded 1 PC tables (17226 PCs): 17226 [0x788788,0x7cbc28), /out/affdicfuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ====================...
cpp
74b08bfb8b611b7ae4bea2a6f1f74d9f73c1d0e3
https://github.com/hunspell/hunspell/commit/5aa940a5a3b65263db809953024e9689e191868f
A vulnerability exists where utf-8 encoding failures in malformed .aff files are not properly handled.
arvo:51134
n132/arvo:51134-vul
/src/hunspell
[ { "end_line": 210, "function_name": "PfxEntry::test_condition", "start_line": 125, "target_file": "/src/hunspell/src/hunspell/affentry.cxx" } ]
Stack-buffer-overflow READ 1
hunspell
asan
================================================================= ==10339==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fabff863038 at pc 0x000000675c36 bp 0x7ffc59deb5c0 sp 0x7ffc59deb5b8 READ of size 1 at 0x7fabff863038 thread T0 SCARINESS: 27 (1-byte-read-stack-buffer-overflow) #0 0x675c35 in Pfx...
cpp
3809b8e9389bda86e6208560842fe145b671cc73
https://github.com/hunspell/hunspell/commit/4631c530b0afbd57ef34ffa6260899ffa6d91eb4
null
arvo:51147
n132/arvo:51147-vul
/src/hunspell
[ { "end_line": 414, "function_name": "HashMgr::add_word", "start_line": 164, "target_file": "/src/hunspell/src/hunspell/hashmgr.cxx" } ]
Use-of-uninitialized-value
hunspell
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1399920789 INFO: Loaded 1 modules (15906 inline 8-bit counters): 15906 [0x9e9a28, 0x9ed84a), INFO: Loaded 1 PC tables (15906 PCs): 15906 [0x91a438,0x958658), /out/affdicfuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Uninitialized bytes ...
cpp
32db4657fb5c3748100958ce2cf669c195af0ce2
https://github.com/hunspell/hunspell/commit/018bf1c05542c30d954a8cfc0bd40f20e0a0ade4
null
arvo:51169
n132/arvo:51169-vul
/src/php-src
[ { "end_line": 2284, "function_name": "update_errors_warnings", "start_line": 2266, "target_file": "/src/php-src/ext/date/php_date.c" } ]
Heap-use-after-free READ 4
php-src
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2417933116 INFO: Loaded 2 modules (176467 inline 8-bit counters): 143128 [0x1b63080, 0x1b85f98), 33339 [0x7f70b75692d0, 0x7f70b757150b), INFO: Loaded 2 PC tables (176467 PCs): 143128 [0x1b85f98,0x1db5118), 33339 [0x7f70b7571510,0x7f70b75f38c0), /ou...
c
2d2a1e39ac8ab3f39f9ab0ffb981dce738da3efa
https://github.com/php/php-src/commit/49c029858b371c718da9982c524848edc88a85dc
null
arvo:51180
n132/arvo:51180-vul
/src/php-src
[ { "end_line": 2284, "function_name": "update_errors_warnings", "start_line": 2266, "target_file": "/src/php-src/ext/date/php_date.c" } ]
Heap-use-after-free READ 4
php-src
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/php-fuzz-tracing-jit ================================================================= ==132859==ERROR: AddressSanitizer: heap-use-after-free on address 0x60300001b714 at pc 0x0000007a602d bp 0x7fff0f95f380 sp 0x7fff0f95f378 READ of size 4 ...
cpp
2d2a1e39ac8ab3f39f9ab0ffb981dce738da3efa
https://github.com/php/php-src/commit/49c029858b371c718da9982c524848edc88a85dc
null
arvo:51208
n132/arvo:51208-vul
/src/h3
[ { "end_line": 503, "function_name": "localIjkToCell", "start_line": 302, "target_file": "/src/h3/src/h3lib/lib/localij.c" } ]
Global-buffer-overflow READ 4
h3
asan
================================================================= ==483==ERROR: AddressSanitizer: global-buffer-overflow on address 0x0000005226f8 at pc 0x0000004e3423 bp 0x7ffeb1107c20 sp 0x7ffeb1107c18 READ of size 4 at 0x0000005226f8 thread T0 SCARINESS: 17 (4-byte-read-global-buffer-overflow) #0 0x4e3422 in _ge...
c
cbd294ac7327ce262103bb10756ccec4edeccc90
https://github.com/uber/h3/commit/fce1c53844ca21dcc14f3acabeaf2e12d47e5568
A potential out-of-bounds read exists in the localIjToCell function.
arvo:51275
n132/arvo:51275-vul
/src/ghostpdl
[ { "end_line": 935, "function_name": "gs_type2_interpret", "start_line": 122, "target_file": "/src/ghostpdl/base/gstype2.c" } ]
Stack-buffer-overflow READ 4
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3818123672 INFO: Loaded 3 modules (222749 inline 8-bit counters): 13708 [0x7f8cd8df69e0, 0x7f8cd8df9f6c), 959 [0x7f8cd8e57a40, 0x7f8cd8e57dff), 208082 [0x379a7d0, 0x37cd4a2), INFO: Loaded 3 PC tables (222749 PCs): 13708 [0x7f8cd8df9f70,0x7f8cd8e2f83...
cpp
cd42596379866887dfb14e92e2ecfeab46359cf0
https://github.com/ArtifexSoftware/ghostpdl/commit/893e67b7b7253aa147740269525b2a071c7bbe79
The vulnerability exists in the pdfwrite component, specifically in the handling of type 2 CharString operations. In two locations, the code checks for sufficient operands on the stack for the initial part of the operation but fails to verify operand sufficiency for the subsequent part. In particular, the c2_rlinecurve...
arvo:51292
n132/arvo:51292-vul
/src/cyclonedds
[ { "end_line": 731, "function_name": "if_network_partition", "start_line": 717, "target_file": "/src/cyclonedds/src/core/ddsi/src/ddsi_config.c" } ]
Segv on unknown address
cyclonedds
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 231792847 INFO: Loaded 1 modules (24246 inline 8-bit counters): 24246 [0x94c370, 0x952226), INFO: Loaded 1 PC tables (24246 PCs): 24246 [0x844020,0x8a2b80), /out/fuzz_config_init: Running 1 inputs 1 time(s) each. Running: /tmp/poc 1744242285.285973...
c
d8eff6f65296202894cf998239ee5e4f4da55d5c
https://github.com/eclipse-cyclonedds/cyclonedds/commit/9f9026899dc94f5a3e740ba5cabc2647f1e9a0bd
A vulnerability exists in network partition where the interface_names variable is not initialised. This allows a specially crafted configuration to trigger an invalid free operation.
arvo:51418
n132/arvo:51418-vul
/src/ghostpdl
[ { "end_line": 2393, "function_name": "Ins_PUSHB", "start_line": 2376, "target_file": "/src/ghostpdl/base/ttinterp.c" } ]
Heap-buffer-overflow READ 1
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4258196836 INFO: Loaded 3 modules (213445 inline 8-bit counters): 13708 [0x7fc3a6d229e0, 0x7fc3a6d25f6c), 959 [0x7fc3a6d83a40, 0x7fc3a6d83dff), 198778 [0x361f850, 0x36500ca), INFO: Loaded 3 PC tables (213445 PCs): 13708 [0x7fc3a6d25f70,0x7fc3a6d5b83...
cpp
968a8826747e67dad5188ee79a0a98e7dc89b287
https://github.com/ArtifexSoftware/ghostpdl/commit/e3615c77c860a20d7537f3d126c0aaa399c52787
A vulnerability exists in the Ins_PUSHB function where values are read from the byte code buffer without performing a bounds check.
arvo:51603
n132/arvo:51603-vul
/src/file
[ { "end_line": 2488, "function_name": "parse_strength", "start_line": 2430, "target_file": "/src/file/src/apprentice.c" } ]
Heap-buffer-overflow READ {*}
file
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/magic_fuzzer_loaddb cont offset type opcode mask value desc /tmp/generate_temporary_file.y8CVOG, 1: Warning: offset ` ' invalid /tmp/generate_temporary_file.y8CVOG, 2: Warning: ===============================================================...
cpp
411ec5bf0708dcd5ec99e4d0961740fca30a6bc7
https://github.com/file/file/commit/66efe2fa6abc233011a58965d6de2bb0f91328bd
The vulnerability allows the raw svalue to be printed and permits incrementing past the end of string (EOS) in OP_NONE.
arvo:51687
n132/arvo:51687-vul
/src/mongoose
[ { "end_line": 6779, "function_name": "rx_dhcp", "start_line": 6754, "target_file": "/src/mongoose/mongoose.c" } ]
Use-after-poison READ 1
mongoose
asan
================================================================= ==127==ERROR: AddressSanitizer: use-after-poison on address 0x7fec837fd963 at pc 0x00000052f5b2 bp 0x7ffe9a98a370 sp 0x7ffe9a98a368 READ of size 1 at 0x7fec837fd963 thread T0 SCARINESS: 22 (1-byte-read-use-after-poison) #0 0x52f5b1 in rx_dhcp(mip_if*...
c
d7fe8196990989609a0a165dd21354716b153327
https://github.com/cesanta/mongoose/commit/1237185bb44b518c3f1c56f0e83b84782e772da1
null
arvo:51745
n132/arvo:51745-vul
/src/ghostpdl
[ { "end_line": 790, "function_name": "pdf_write_embedded_font", "start_line": 592, "target_file": "/src/ghostpdl/devices/vector/gdevpdtb.c" } ]
Heap-use-after-free READ 8
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1970762171 INFO: Loaded 3 modules (204064 inline 8-bit counters): 13708 [0x7fcac77139e0, 0x7fcac7716f6c), 959 [0x7fcac7774a40, 0x7fcac7774dff), 189397 [0x34670b0, 0x3495485), INFO: Loaded 3 PC tables (204064 PCs): 13708 [0x7fcac7716f70,0x7fcac774c83...
cpp
9e1a0aa79da04c1ccf6bf6e030c551d03149bb3e
https://github.com/ArtifexSoftware/ghostpdl/commit/ebfb46da46e3f2872e4d1136571224a60891f80a
null
arvo:51845
n132/arvo:51845-vul
/src/binutils-gdb
[ { "end_line": 1453, "function_name": "_bfd_stab_section_find_nearest_line", "start_line": 930, "target_file": "/src/binutils-gdb/bfd/syms.c" } ]
Segv on unknown address
binutils-gdb
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1308424276 INFO: Loaded 1 modules (175944 inline 8-bit counters): 175944 [0x1b020a0, 0x1b2cfe8), INFO: Loaded 1 PC tables (175944 PCs): 175944 [0x15fd550,0x18ac9d0), /out/fuzz_addr2line: Running 1 inputs 1 time(s) each. Running: /tmp/poc BFD: /tmp/...
cpp
540e53422cd8916b85d43060210251132fba8548
https://github.com/bminor/binutils-gdb/commit/8e4a500a5c4cef1aafc2c6e47cadd3dea0bfb99b
A segmentation fault occurs in syms.c within the _bfd_stab_section_find_nearest_line function when "info->strs[strsize - 1] = 0;" is executed with strsize set to zero. If strsize is zero, there are no filenames in stabs, resulting in no useful information. The vulnerability is triggered when either stabsize or strsize ...
arvo:51988
n132/arvo:51988-vul
/src/hunspell
[ { "end_line": 1374, "function_name": "AffixMgr::cpdcase_check", "start_line": 1353, "target_file": "/src/hunspell/src/hunspell/affixmgr.cxx" } ]
Heap-buffer-overflow READ 1
hunspell
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2837065145 INFO: Loaded 1 modules (17534 inline 8-bit counters): 17534 [0x85609a4, 0x8564e22), INFO: Loaded 1 PC tables (17534 PCs): 17534 [0x8487c54,0x84aa044), /out/affdicfuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
cpp
52021df98d3b5d279a68d91d6f7c34fdcf011abb
https://github.com/hunspell/hunspell/commit/7357713ba5d529f3ff70c654b703429fc9cb55a4
A vulnerability exists where processing invalid UTF-8 sequences can result in reading past the start of the sequence.
arvo:52145
n132/arvo:52145-vul
/src/ghostpdl
[ { "end_line": 937, "function_name": "gs_type2_interpret", "start_line": 122, "target_file": "/src/ghostpdl/base/gstype2.c" } ]
Stack-buffer-underflow READ 4
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3446946968 INFO: Loaded 3 modules (204082 inline 8-bit counters): 13708 [0x7ff2d9e6c9e0, 0x7ff2d9e6ff6c), 959 [0x7ff2d9ecda40, 0x7ff2d9ecddff), 189415 [0x34670f0, 0x34954d7), INFO: Loaded 3 PC tables (204082 PCs): 13708 [0x7ff2d9e6ff70,0x7ff2d9ea583...
cpp
bb338fb50c89f4d999e02b215fef350a1f1da852
https://github.com/ArtifexSoftware/ghostpdl/commit/b7f934c26b6d139d665ab924167036c74a973360
The CFF interpreter in the Type 2 (CFF) interpreter executes the 'dup' operation in pdfwrite and related components without verifying that data is available, which, in the case of a corrupted font, results in reading off the bottom of the buffer.
arvo:52181
n132/arvo:52181-vul
/src/msquic
[ { "end_line": 41, "function_name": "LLVMFuzzerTestOneInput", "start_line": 23, "target_file": "/src/msquic/src/fuzzing/fuzz.cc" } ]
Stack-buffer-overflow READ 2
msquic
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3370388304 INFO: Loaded 1 modules (59115 inline 8-bit counters): 59115 [0xceae60, 0xcf954b), INFO: Loaded 1 PC tables (59115 PCs): 59115 [0xcf9550,0xde0400), /out/fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ============================...
cpp
3e89ddcf94210edd2fe21b7c15310922de55142f
https://github.com/microsoft/msquic/commit/2dfbdcbceb6c17abb6a0b5ac5ba86e955db6f2f8
null
arvo:52258
n132/arvo:52258-vul
/src/hunspell
[ { "end_line": 2082, "function_name": "SuggestMgr::leftcommonsubstring", "start_line": 2062, "target_file": "/src/hunspell/src/hunspell/suggestmgr.cxx" } ]
Heap-buffer-overflow READ 1
hunspell
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1726976058 INFO: Loaded 1 modules (17595 inline 8-bit counters): 17595 [0x8561a34, 0x8565eef), INFO: Loaded 1 PC tables (17595 PCs): 17595 [0x8488c94,0x84ab26c), /out/affdicfuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
cpp
0d2ed609cd61240e7c9e444db75e9d7acd0bca35
https://github.com/hunspell/hunspell/commit/cca31da62a61ef0fdfff47deb947c655bdb7d187
null
arvo:52475
n132/arvo:52475-vul
/src/libraw
[ { "end_line": 887, "function_name": "LibRaw::parseAdobeRAFMakernote", "start_line": 105, "target_file": "/src/libraw/src/metadata/fuji.cpp" } ]
UNKNOWN READ
libraw
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4098352552 INFO: Loaded 1 modules (19350 inline 8-bit counters): 19350 [0xad9d70, 0xade906), INFO: Loaded 1 PC tables (19350 PCs): 19350 [0x7bec68,0x80a5c8), /out/libraw_raf_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitize...
cpp
dc0c984edfc9b36089f86f6068ee7805e9cd9efc
https://github.com/libraw/libraw/commit/c00f3dd7daeba0596899b34cbade6b6abdba46b7
The function parseAdobeRAFMakernote inappropriately fails to check for available space, which can lead to a security vulnerability.
arvo:52694
n132/arvo:52694-vul
/src/libraw
[ { "end_line": 206, "function_name": "LibRaw::raw2image", "start_line": 53, "target_file": "/src/libraw/src/preprocessing/raw2image.cpp" } ]
Heap-buffer-overflow READ 2
libraw
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2903771947 INFO: Loaded 1 modules (21887 inline 8-bit counters): 21887 [0x939cf0, 0x93f26f), INFO: Loaded 1 PC tables (21887 PCs): 21887 [0x819f20,0x86f710), /out/libraw_nef_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc unknown file: d...
cpp
63794a2471b426ff4268de6982e8a6f711163e2e
https://github.com/libraw/libraw/commit/59721b08cfcec3d425d4a9ae5a53bbc8e938fedd
null
arvo:52724
n132/arvo:52724-vul
/src/mruby
[ { "end_line": 1064, "function_name": "unpack_qenc", "start_line": 1031, "target_file": "/src/mruby/mrbgems/mruby-pack/src/pack.c" } ]
Index-out-of-bounds
mruby
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1139032062 INFO: Loaded 1 modules (26073 inline 8-bit counters): 26073 [0x7099c0, 0x70ff99), INFO: Loaded 1 PC tables (26073 PCs): 26073 [0x61f150,0x684ee0), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc [0].pack("C") -> "\x...
c
a8a8e7fbd88c47a09e6b33fbb717a00d137f2b62
https://github.com/mruby/mruby/commit/8a67a26104a70b666c5e209a5fb3b0733cfbb3d8
A vulnerability exists in mruby-pack/pack.c within the unpack function, where the given length is not checked for positivity, potentially allowing out-of-bound array access.
arvo:52730
n132/arvo:52730-vul
/src/openexr
[ { "end_line": 1416, "function_name": "fasthuf_initialize", "start_line": 1194, "target_file": "/src/openexr/src/lib/OpenEXRCore/internal_huf.c" } ]
Heap-buffer-overflow READ 1
openexr
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 977479435 INFO: Loaded 1 modules (37588 inline 8-bit counters): 37588 [0xd3eb88, 0xd47e5c), INFO: Loaded 1 PC tables (37588 PCs): 37588 [0xd47e60,0xddaba0), /out/openexr_exrcorecheck_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ======...
cpp
436fcd2829ae9a8965af1db15ac8531fdc8b96ce
https://github.com/AcademySoftwareFoundation/openexr/commit/063a881e7a5cd57156dbd0c9b6ad4d30f7023e55
null
arvo:52869
n132/arvo:52869-vul
/src/libxml2
[ { "end_line": 2300, "function_name": "xmlXIncludeDoProcess", "start_line": 2225, "target_file": "/src/libxml2/xinclude.c" } ]
Heap-use-after-free READ 4
libxml2
asan
Running LLVMFuzzerInitialize ... continue... ================================================================= ==10642==ERROR: AddressSanitizer: heap-use-after-free on address 0x60c00001a2c8 at pc 0x00000083606e bp 0x7ffdbcfde5e0 sp 0x7ffdbcfde5d8 READ of size 4 at 0x60c00001a2c8 thread T0 SCARINESS: 45 (4-byte-read-he...
c
b59ff58728d6c4380b4b23c4881058d3dce11775
https://gitlab.gnome.org/GNOME/libxml2/-/commit/075cee9e9f1bedb6b2ca87e73a952fb2e92da3c1
A memory leak occurs in the xinclude module when running in fuzzing build mode.
arvo:52901
n132/arvo:52901-vul
/src/libraw
[ { "end_line": 1259, "function_name": "LibRaw::open_datastream", "start_line": 457, "target_file": "/src/libraw/src/utils/open.cpp" } ]
Heap-buffer-overflow WRITE {*}
libraw
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2349912298 INFO: Loaded 1 modules (21893 inline 8-bit counters): 21893 [0x939cf0, 0x93f275), INFO: Loaded 1 PC tables (21893 PCs): 21893 [0x819f20,0x86f770), /out/libraw_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===================...
cpp
19849976cb575cb709cfc6d9c517094d1fd76876
https://github.com/libraw/libraw/commit/a50a568b786da111a0406e4861813949c0058bf4
null
arvo:52944
n132/arvo:52944-vul
/src/librawspeed
[ { "end_line": 342, "function_name": "applyOP", "start_line": 327, "target_file": "/src/librawspeed/src/librawspeed/common/DngOpcodes.cpp" } ]
Heap-buffer-overflow READ 4
librawspeed
asan
================================================================= ==6244==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000000e0 at pc 0x0000006030d2 bp 0x7ffde7b662b0 sp 0x7ffde7b662a8 READ of size 4 at 0x6020000000e0 thread T0 SCARINESS: 17 (4-byte-read-heap-buffer-overflow) #0 0x6030d1 in rawspe...
cpp
2df1d7686c1072886b14e02aa05891b5d3b27bef
https://github.com/darktable-org/rawspeed/commit/e29d15cda20e6e7c7e1122c30bff7805a2e59fbc
A vulnerability exists in DngOpcodes::PixelOpcode where the applyOP() function does not ensure that the op() function receives coordinates with step 1, regardless of the current step. This can lead to incorrect processing of pixel data.
arvo:5296
n132/arvo:5296-vul
/src/librawspeed
[ { "end_line": 174, "function_name": "calculateCurve", "start_line": 149, "target_file": "/src/librawspeed/src/librawspeed/common/Spline.h" } ]
Container-overflow READ 8
librawspeed
asan
INFO: Seed: 1909840043 INFO: Loaded 1 modules (13954 inline 8-bit counters): 13954 [0xb1f390, 0xb22a12), INFO: Loaded 1 PC tables (13954 PCs): 13954 [0xb22a18,0xb59238), /out/TiffDecoderFuzzer-IiqDecoder: Running 1 inputs 1 time(s) each. Running: /tmp/poc TiffDecoderFuzzer-IiqDecoder: /src/librawspeed/src/librawspe...
cpp
719c1996b08420a899045bf838fc0294c4443c4f
https://github.com/darktable-org/rawspeed/commit/3f116fa4ff59f78e1699b950e8ef348b896fc606
The Spline::calculateCurve() function does not clamp the interpolated value to the maximum, which can lead to a security vulnerability.
arvo:53030
n132/arvo:53030-vul
/src/oniguruma
[ { "end_line": 379, "function_name": "exec", "start_line": 317, "target_file": "/src/oniguruma/harnesses/base.c" } ]
Heap-buffer-overflow READ 1
oniguruma
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2441890090 INFO: Loaded 1 modules (9906 inline 8-bit counters): 9906 [0x7500c0, 0x752772), INFO: Loaded 1 PC tables (9906 PCs): 9906 [0x6c4110,0x6eac30), /out/fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==============================...
c
f7ff8bc6e9535b0227e2d146e596befc920beca2
https://github.com/kkos/oniguruma/commit/34eac8830181bc348dab845932ae3368d1bcf3ff
null
arvo:53036
n132/arvo:53036-vul
/src/oniguruma
[ { "end_line": 379, "function_name": "exec", "start_line": 317, "target_file": "/src/oniguruma/harnesses/base.c" } ]
Heap-buffer-overflow READ 1
oniguruma
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1099926333 INFO: Loaded 1 modules (9906 inline 8-bit counters): 9906 [0x7500c0, 0x752772), INFO: Loaded 1 PC tables (9906 PCs): 9906 [0x6c4110,0x6eac30), /out/fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==============================...
c
f7ff8bc6e9535b0227e2d146e596befc920beca2
https://github.com/kkos/oniguruma/commit/34eac8830181bc348dab845932ae3368d1bcf3ff
null
arvo:53041
n132/arvo:53041-vul
/src/oniguruma
[ { "end_line": 379, "function_name": "exec", "start_line": 317, "target_file": "/src/oniguruma/harnesses/base.c" } ]
Heap-buffer-overflow READ 1
oniguruma
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2399685439 INFO: Loaded 1 modules (9906 inline 8-bit counters): 9906 [0x7500c0, 0x752772), INFO: Loaded 1 PC tables (9906 PCs): 9906 [0x6c4110,0x6eac30), /out/fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==============================...
c
f7ff8bc6e9535b0227e2d146e596befc920beca2
https://github.com/kkos/oniguruma/commit/34eac8830181bc348dab845932ae3368d1bcf3ff
null
arvo:53046
n132/arvo:53046-vul
/src/oniguruma
[ { "end_line": 379, "function_name": "exec", "start_line": 317, "target_file": "/src/oniguruma/harnesses/base.c" } ]
Heap-buffer-overflow READ 1
oniguruma
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1041492129 INFO: Loaded 1 modules (9906 inline 8-bit counters): 9906 [0x7500c0, 0x752772), INFO: Loaded 1 PC tables (9906 PCs): 9906 [0x6c4110,0x6eac30), /out/fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==============================...
c
f7ff8bc6e9535b0227e2d146e596befc920beca2
https://github.com/kkos/oniguruma/commit/34eac8830181bc348dab845932ae3368d1bcf3ff
null
arvo:53052
n132/arvo:53052-vul
/src/ghostpdl
[ { "end_line": 3671, "function_name": "Ins_MSIRP", "start_line": 3635, "target_file": "/src/ghostpdl/base/ttinterp.c" } ]
UNKNOWN READ
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 664991898 INFO: Loaded 3 modules (222564 inline 8-bit counters): 13672 [0x7f1c68c159e0, 0x7f1c68c18f48), 959 [0x7f1c68c76a40, 0x7f1c68c76dff), 207933 [0x3805090, 0x3837ccd), INFO: Loaded 3 PC tables (222564 PCs): 13672 [0x7f1c68c18f48,0x7f1c68c4e5c8...
cpp
519ca4efe92bd16f850cd32ac783c1015191230c
https://github.com/ArtifexSoftware/ghostpdl/commit/cb46ea041582033e874e1e7b7149e9a9370e3b2f
A missing bounds check in the Ins_MSIRP() function allows out-of-bounds access.
arvo:53054
n132/arvo:53054-vul
/src/ghostpdl
[ { "end_line": 938, "function_name": "gs_type2_interpret", "start_line": 122, "target_file": "/src/ghostpdl/base/gstype2.c" } ]
Stack-buffer-underflow READ 4
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 107308347 INFO: Loaded 3 modules (204857 inline 8-bit counters): 13708 [0x7ff4509749e0, 0x7ff450977f6c), 959 [0x7ff4509d5a40, 0x7ff4509d5dff), 190190 [0x3481ab0, 0x34b019e), INFO: Loaded 3 PC tables (204857 PCs): 13708 [0x7ff450977f70,0x7ff4509ad830...
cpp
cf52063e7aada82dc25a356c8f4a98762fa7a421
https://github.com/ArtifexSoftware/ghostpdl/commit/519ca4efe92bd16f850cd32ac783c1015191230c
A vulnerability exists in the pdfwrite Type 2 (CFF) font interpreter, specifically in the function gs_type2_interpret, where insufficient bounds checking occurs. At the ce3_hflex1 case, the bounds check only verifies up to csp - 3, but the code accesses as far back as csp - 7. Additionally, at the flex: label (reached ...
arvo:53103
n132/arvo:53103-vul
/src/fluent-bit
[ { "end_line": 13, "function_name": "LLVMFuzzerTestOneInput", "start_line": 5, "target_file": "/src/fluent-bit/tests/internal/fuzzers/ctrace_fuzzer.c" } ]
UNKNOWN READ
fluent-bit
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2590887543 INFO: Loaded 1 modules (4962 inline 8-bit counters): 4962 [0x54f5d0, 0x550932), INFO: Loaded 1 PC tables (4962 PCs): 4962 [0x550938,0x563f58), /out/flb-it-fuzz-ctrace_fuzzer_OSSFUZZ: Running 1 inputs 1 time(s) each. Running: /tmp/poc Und...
cpp
0a0491d0eb884f0af88fc6a58799f2b40a1f2f61
https://github.com/fluent/fluent-bit/commit/fa7fd13c1ffbae70dd089945a90d4045bc80f1d8
null
arvo:53158
n132/arvo:53158-vul
/src/libraw
[ { "end_line": 689, "function_name": "LibRaw::uncompressed_fp_dng_load_raw", "start_line": 587, "target_file": "/src/libraw/src/decoders/fp_dng.cpp" } ]
Heap-buffer-overflow WRITE {*}
libraw
asan
================================================================= ==28797==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x621000003900 at pc 0x00000049d2a2 bp 0x7ffe14a71540 sp 0x7ffe14a70d08 WRITE of size 6167 at 0x621000003900 thread T0 SCARINESS: 45 (multi-byte-write-heap-buffer-overflow) #0 0x49d2a1...
cpp
79815e265d4861a6ee0e1c9f7f3d5309e6a2a600
https://github.com/libraw/libraw/commit/b7771a8e4c01851f7674146e47f7a460633f5e99
The FP-dng decoder does not check for the float data size.
arvo:53417
n132/arvo:53417-vul
/src/opensc
[ { "end_line": 741, "function_name": "sc_pkcs15init_rmdir", "start_line": 664, "target_file": "/src/opensc/src/pkcs15init/pkcs15-lib.c" } ]
Stack-buffer-overflow READ 1
opensc
asan
Reading 4945 bytes from /tmp/poc ================================================================= ==41422==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f3beb60d4e0 at pc 0x000000554495 bp 0x7ffe37fd99f0 sp 0x7ffe37fd99e8 READ of size 1 at 0x7f3beb60d4e0 thread T0 SCARINESS: 27 (1-byte-read-stack-buffer...
c
16fdd70a7e02bc87c14d363ca21777b293cdcf2c
https://github.com/OpenSC/OpenSC/commit/c16d4e6588a19f4b85aa584174335f62efe28aaf
A vulnerability exists where the path length is not checked, which can lead to a buffer underflow.
arvo:53456
n132/arvo:53456-vul
/src/ghostpdl
[ { "end_line": 289, "function_name": "cmd_put_bits", "start_line": 155, "target_file": "/src/ghostpdl/base/gxclbits.c" } ]
Heap-buffer-overflow WRITE 7
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1697970966 INFO: Loaded 3 modules (222703 inline 8-bit counters): 13672 [0x7f1bf465b9e0, 0x7f1bf465ef48), 959 [0x7f1bf46bca40, 0x7f1bf46bcdff), 208072 [0x38092b0, 0x383bf78), INFO: Loaded 3 PC tables (222703 PCs): 13672 [0x7f1bf465ef48,0x7f1bf46945c...
cpp
f4bcc37667d82541eaf8a29e0b021fe1d7aa7b5b
https://github.com/ArtifexSoftware/ghostpdl/commit/db34d54064ae35adc78a499c49363a256f5145f6
A vulnerability exists in clist_copy_bits where small bitmaps are copied into the clist uncompressed. The function calculates the required size as raster * (h-1) + width_bytes, with width_bytes being raster without the padding at the end, saving a byte or two. However, the routine used to copy the bitmap does not accou...
arvo:53483
n132/arvo:53483-vul
/src/libredwg
[ { "end_line": 963, "function_name": "decode_R13_R2000", "start_line": 262, "target_file": "/src/libredwg/src/decode.c" } ]
Heap-double-free
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1118796947 INFO: Loaded 1 modules (558018 inline 8-bit counters): 558018 [0x4969180, 0x49f1542), INFO: Loaded 1 PC tables (558018 PCs): 558018 [0x3e59de8,0x46dda08), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc llvmfuzz: decode...
c
23f93006d0bb1a38079726363aa265e30da0ec71
https://github.com/LibreDWG/libredwg/commit/795fccd75b2af90f402d9f903346414a1db193a1
A vulnerability exists in the decode function where an assert can be triggered when processing illegal HEADER data, specifically when there are no Section Locator Records at offset 0x15.
arvo:53613
n132/arvo:53613-vul
/src/libxml2
[ { "end_line": 4676, "function_name": "xmlParseCharDataComplex", "start_line": 4597, "target_file": "/src/libxml2/parser.c" }, { "end_line": 531, "function_name": "xmlNextChar", "start_line": 389, "target_file": "/src/libxml2/parserInternals.c" } ]
Use-of-uninitialized-value
libxml2
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2302599710 INFO: Loaded 1 modules (52547 inline 8-bit counters): 52547 [0xd15997, 0xd226da), INFO: Loaded 1 PC tables (52547 PCs): 52547 [0xbda6b0,0xca7ae0), /out/xml: Running 1 inputs 1 time(s) each. Running: /tmp/poc ALARM: working on the last Un...
c
234915361e402c39689e8a7be5a351608cfbbc94
https://gitlab.gnome.org/GNOME/libxml2/-/commit/a8b31e68c2331a1289e860ce07c8b80b855b7bf4
A vulnerability exists in the parser where the progress check when parsing character data does not properly skip over zero bytes, potentially causing issues due to lack of guaranteed progress.
arvo:53618
n132/arvo:53618-vul
/src/librawspeed
[ { "end_line": 206, "function_name": "Cr2Decompressor<HuffmanTable>::Cr2Decompressor", "start_line": 131, "target_file": "/src/librawspeed/src/librawspeed/decompressors/Cr2DecompressorImpl.h" } ]
Use-of-uninitialized-value
librawspeed
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1164773664 INFO: Loaded 1 modules (20052 inline 8-bit counters): 20052 [0x9c2ce8, 0x9c7b3c), INFO: Loaded 1 PC tables (20052 PCs): 20052 [0x9c7b40,0xa16080), /out/TiffDecoderFuzzer-Cr2Decoder: Running 1 inputs 1 time(s) each. Running: /tmp/poc Unin...
cpp
db6bb6be9785d5089ea80e9de794a202ff9606c6
https://github.com/darktable-org/rawspeed/commit/a27d3e37d8a07af333d7626f0d75cc8b49a12428
The Cr2Decompressor does not check that tiles cover the entire image.
arvo:53619
n132/arvo:53619-vul
/src/ghostpdl
[ { "end_line": 2181, "function_name": "pdfi_create_indexed", "start_line": 2065, "target_file": "/src/ghostpdl/pdf/pdf_colour.c" } ]
Heap-buffer-overflow READ {*}
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 854131802 INFO: Loaded 3 modules (204980 inline 8-bit counters): 13708 [0x7f099ce689e0, 0x7f099ce6bf6c), 959 [0x7f099cec9a40, 0x7f099cec9dff), 190313 [0x3485d10, 0x34b4479), INFO: Loaded 3 PC tables (204980 PCs): 13708 [0x7f099ce6bf70,0x7f099cea1830...
cpp
2fbc816318dcdb0b16a6ea2e357d773a44dd134e
https://github.com/ArtifexSoftware/ghostpdl/commit/c745108a1b72b7b14899e048ee76b99ee49d9d80
GhostPDF allows an /Indexed color space to have a base space that is an array [/Pattern] in the affected file. Pattern spaces and Indexed spaces are not valid as the base space for an Indexed space in this context. The vulnerability occurs due to a lack of validation of the base space for Indexed color spaces.
arvo:53631
n132/arvo:53631-vul
/src/opensc
[ { "end_line": 138, "function_name": "msc_zero_object", "start_line": 126, "target_file": "/src/opensc/src/libopensc/muscle.c" } ]
Stack-buffer-overflow WRITE {*}
opensc
asan
Reading 104 bytes from /tmp/poc ================================================================= ==41392==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f0511ea1230 at pc 0x00000049fb0c bp 0x7ffe4ab15350 sp 0x7ffe4ab14b18 WRITE of size 65526 at 0x7f0511ea1230 thread T0 SCARINESS: 60 (multi-byte-write-sta...
c
578aed8391ef117ca64a9e0cba8e5c264368a0ec
https://github.com/OpenSC/OpenSC/commit/e7f81d86dcdc751f4737f4b29a99bfc54d29c5c9
An out of bounds write occurs in muscle.
arvo:53711
n132/arvo:53711-vul
/src/ghostpdl
[ { "end_line": 1047, "function_name": "pdfi_dereference_main", "start_line": 885, "target_file": "/src/ghostpdl/pdf/pdf_deref.c" } ]
Stack-buffer-overflow READ 1
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3812560987 INFO: Loaded 3 modules (222684 inline 8-bit counters): 13672 [0x7f27207399e0, 0x7f272073cf48), 959 [0x7f272079aa40, 0x7f272079adff), 208053 [0x38092f0, 0x383bfa5), INFO: Loaded 3 PC tables (222684 PCs): 13672 [0x7f272073cf48,0x7f27207725c...
cpp
04c8185f0e8088f01592917af2b7d52ec63114bf
https://github.com/ArtifexSoftware/ghostpdl/commit/f4bcc37667d82541eaf8a29e0b021fe1d7aa7b5b
A vulnerability exists in GhostPDF's main stream parsing due to the use of a SubFileDecode filter with a 'triler' EODString when parsing objects during indirect reference dereferencing. If the main stream contains the word 'trailer' in uncompressed text, such as in an annotation, the SubFileDecode filter incorrectly si...
arvo:53750
n132/arvo:53750-vul
/src/libredwg
[ { "end_line": 966, "function_name": "decode_preR13", "start_line": 658, "target_file": "/src/libredwg/src/decode_r11.c" } ]
Heap-buffer-overflow READ 1
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1603292289 INFO: Loaded 1 modules (555386 inline 8-bit counters): 555386 [0x4945de0, 0x49cd75a), INFO: Loaded 1 PC tables (555386 PCs): 555386 [0x3e40908,0x46ba0a8), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
c
97fd500ac19eb64c1218c41ef7582fcd41f98895
https://github.com/LibreDWG/libredwg/commit/98729e9d56bd5e8e0530de39d955dc838803cbb2
A vulnerability exists in the decode_r11 function in which a post HEADER overflow can occur.
arvo:53903
n132/arvo:53903-vul
/src/ghostpdl
[ { "end_line": 942, "function_name": "mem_initialize_device_procs", "start_line": 912, "target_file": "/src/ghostpdl/base/gdevmem.c" } ]
UNKNOWN WRITE
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2274164498 INFO: Loaded 3 modules (222869 inline 8-bit counters): 13672 [0x7efe6c3f49e0, 0x7efe6c3f7f48), 959 [0x7efe6c455a40, 0x7efe6c455dff), 208238 [0x380f350, 0x38420be), INFO: Loaded 3 PC tables (222869 PCs): 13672 [0x7efe6c3f7f48,0x7efe6c42d5c...
cpp
8c35f9b067918e39459a468fe49da24a11efd589
https://github.com/ArtifexSoftware/ghostpdl/commit/ba9672456064ecc4166c6293bc36a1b126f3421a
A vulnerability exists where memory devices are allowed to change media sizes, resolutions, or other parameters that affect the size of the raster memory allocation.
arvo:53919
n132/arvo:53919-vul
/src/relic
[ { "end_line": 92, "function_name": "bn_lsh", "start_line": 66, "target_file": "/src/relic/src/bn/relic_bn_shift.c" } ]
Heap-buffer-overflow WRITE {*}
relic
asan
INFO: found LLVMFuzzerCustomMutator (0xb391b0). Disabling -len_control by default. INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2723249023 INFO: Loaded 1 modules (158411 inline 8-bit counters): 158411 [0x1b5b150, 0x1b81c1b), INFO: Loaded 1 PC tables (158411 PCs): 158411 [0x1b81c20,0x1dec8d0), ...
cpp
b369a6740962bbe533fce4c71eddf2c8d6884edf
https://github.com/relic-toolkit/relic/commit/d4cf7f6faa73136fe14938fa47b24fcc6c626c47
null
arvo:53927
n132/arvo:53927-vul
/src/opensc
[ { "end_line": 739, "function_name": "sc_pkcs15init_rmdir", "start_line": 664, "target_file": "/src/opensc/src/pkcs15init/pkcs15-lib.c" } ]
Stack-buffer-overflow WRITE 1
opensc
asan
Reading 5386 bytes from /tmp/poc ================================================================= ==41391==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f612e615c9f at pc 0x0000004e2b49 bp 0x7ffd330b9130 sp 0x7ffd330b9128 WRITE of size 1 at 0x7f612e615c9f thread T0 SCARINESS: 46 (1-byte-write-stack-buff...
c
b4e7a381e368ce9f0088c0479e3c7986546d0730
https://github.com/OpenSC/OpenSC/commit/578aed8391ef117ca64a9e0cba8e5c264368a0ec
A vulnerability in the sc_pkcs15init_rmdir function allows an out of bounds write.
arvo:54228
n132/arvo:54228-vul
/src/libredwg
[ { "end_line": 5259, "function_name": "dwg_decode_add_object", "start_line": 4794, "target_file": "/src/libredwg/src/decode.c" } ]
Heap-buffer-overflow READ 1
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 691282809 INFO: Loaded 1 modules (559861 inline 8-bit counters): 559861 [0x49a20e0, 0x4a2abd5), INFO: Loaded 1 PC tables (559861 PCs): 559861 [0x3e8a6a8,0x47155f8), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc =================...
c
71b36d281a9a168e0c91d38d6a9802460f9017cd
https://github.com/LibreDWG/libredwg/commit/a709cac8ca35686ddaeeddb54decc05d8de18ebf
null
arvo:54312
n132/arvo:54312-vul
/src/opensc
[ { "end_line": 219, "function_name": "msc_partial_update_object", "start_line": 178, "target_file": "/src/opensc/src/libopensc/muscle.c" } ]
Stack-buffer-overflow WRITE {*}
opensc
asan
Reading 141 bytes from /tmp/poc ================================================================= ==41421==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f3490364a30 at pc 0x00000049f8ba bp 0x7ffd33753b30 sp 0x7ffd337532f8 WRITE of size 512 at 0x7f3490364a30 thread T0 SCARINESS: 60 (multi-byte-write-stack...
c
cfb35259357c210bfea461dac4ca31dae7faaa7d
https://github.com/OpenSC/OpenSC/commit/df5a176bfdf8c52ba89c7fef1f82f6f3b9312bc1
null
arvo:54393
n132/arvo:54393-vul
/src/libredwg
[ { "end_line": 14562, "function_name": "dwg_dynapi_header_set_value", "start_line": 14478, "target_file": "/src/libredwg/src/dynapi.c" } ]
Heap-buffer-overflow READ 16
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 754246996 INFO: Loaded 1 modules (644833 inline 8-bit counters): 644833 [0x52b6ee0, 0x53545c1), INFO: Loaded 1 PC tables (644833 PCs): 644833 [0x4636670,0x500d480), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc =================...
c
2ed11a3076459c67e949e352b7abacde66fa4365
https://github.com/LibreDWG/libredwg/commit/20b119e64393c59d0e5ff6f4945f58868a53b1c1
null
arvo:54436
n132/arvo:54436-vul
/src/ghostpdl
[ { "end_line": 420, "function_name": "pdfi_process_xref_stream", "start_line": 150, "target_file": "/src/ghostpdl/pdf/pdf_xref.c" } ]
Segv on unknown address
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4281883088 INFO: Loaded 3 modules (223346 inline 8-bit counters): 13672 [0x7fe8f084a9e0, 0x7fe8f084df48), 959 [0x7fe8f08aba40, 0x7fe8f08abdff), 208715 [0x381c730, 0x384f67b), INFO: Loaded 3 PC tables (223346 PCs): 13672 [0x7fe8f084df48,0x7fe8f08835c...
cpp
edd17616f1a0467b109b16cc2ee8407ae4c87af7
https://github.com/ArtifexSoftware/ghostpdl/commit/1b5facd696e036ce738b93505ffd5ad03f0cb63c
A vulnerability exists in GhostPDF where the W array values in an XRefStrm are not properly bounds-checked. If a PDF file contains a negative W entry, it is treated as valid, leading to an attempt to read that number of bytes (cast to unsigned) from a file into a buffer sized based on the signed value. This causes a bu...
arvo:54511
n132/arvo:54511-vul
/src/ghostpdl
[ { "end_line": 186, "function_name": "pdfi_process_one_page", "start_line": 140, "target_file": "/src/ghostpdl/pdf/pdf_page.c" } ]
UNKNOWN READ
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2664512286 INFO: Loaded 3 modules (223350 inline 8-bit counters): 13672 [0x7fd54fc8e9e0, 0x7fd54fc91f48), 959 [0x7fd54fcefa40, 0x7fd54fcefdff), 208719 [0x381c730, 0x384f67f), INFO: Loaded 3 PC tables (223350 PCs): 13672 [0x7fd54fc91f48,0x7fd54fcc75c...
cpp
1b5facd696e036ce738b93505ffd5ad03f0cb63c
https://github.com/ArtifexSoftware/ghostpdl/commit/6324feaa1bdf8e4f50e49d332ce2ef9ec823aa98
The code does not perform the same cleanup after rendering annotations and acroforms as it does after processing the main page contents in the pdfi interpreter. This allows errors to result in extra gsave levels persisting after the interpreter exits, which can lead to crashes or other problems.
arvo:54625
n132/arvo:54625-vul
/src/libredwg
[ { "end_line": 6092, "function_name": "decode_preR13_entities", "start_line": 5846, "target_file": "/src/libredwg/src/decode.c" } ]
Heap-buffer-overflow WRITE 1
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2509148567 INFO: Loaded 1 modules (560346 inline 8-bit counters): 560346 [0x4948320, 0x49d0ffa), INFO: Loaded 1 PC tables (560346 PCs): 560346 [0x3e2c650,0x46b93f0), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
c
cd2c0d5bcf2eff7bafa46f66e5693c47d24ec500
https://github.com/LibreDWG/libredwg/commit/7f9016032a29873a9c30c6d6548cda13e67fd335
A vulnerability exists in the decode_r11 function where entities_end can overflow.
arvo:54948
n132/arvo:54948-vul
/src/libplist
[ { "end_line": 837, "function_name": "node_from_openstep", "start_line": 584, "target_file": "/src/libplist/src/oplist.c" } ]
Heap-buffer-overflow READ 1
libplist
asan
================================================================= ==9825==ERROR: AddressSanitizer: use-after-poison on address 0x7fba7e7fd8a4 at pc 0x0000004e34f6 bp 0x7fffe3bda330 sp 0x7fffe3bda328 READ of size 1 at 0x7fba7e7fd8a4 thread T0 SCARINESS: 22 (1-byte-read-use-after-poison) #0 0x4e34f5 in node_from_open...
cpp
62b03b85a56a7b98e6eef237deeff1a8b41f8fb8
https://github.com/libimobiledevice/libplist/commit/5bdbd3fe620e66a65373524a0707909ca926a3a1
A vulnerability in oplist allows an out-of-bounds read due to improper bounds checking.
arvo:54949
n132/arvo:54949-vul
/src/libplist
[ { "end_line": 869, "function_name": "plist_from_openstep", "start_line": 834, "target_file": "/src/libplist/src/oplist.c" } ]
Heap-use-after-free READ 8
libplist
asan
================================================================= ==9832==ERROR: AddressSanitizer: heap-use-after-free on address 0x604000000070 at pc 0x0000004e7421 bp 0x7ffc56870e40 sp 0x7ffc56870e38 READ of size 8 at 0x604000000070 thread T0 SCARINESS: 51 (8-byte-read-heap-use-after-free) #0 0x4e7420 in plist_fr...
cpp
491a3acc1015951042c95c389a10634e331818c4
https://github.com/libimobiledevice/libplist/commit/62b03b85a56a7b98e6eef237deeff1a8b41f8fb8
A use-after-free vulnerability exists in the oplist code, where a pointer is not set to NULL after being freed.
arvo:5499
n132/arvo:5499-vul
/src/open62541
[ { "end_line": 56, "function_name": "removeSession", "start_line": 33, "target_file": "/src/open62541/src/server/ua_session_manager.c" } ]
Heap-use-after-free READ 8
open62541
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_binary_message < INPUT_FILE or /out/fuzz_binary_message INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/f...
cpp
01f78374285f16749452ba84289356fc85e4ab22
https://github.com/open62541/open62541/commit/a6d732b4050e902d9bba3acfa7bf72e30fa4dcc6
null
arvo:5504
n132/arvo:5504-vul
/src/open62541
[ { "end_line": 56, "function_name": "removeSession", "start_line": 33, "target_file": "/src/open62541/src/server/ua_session_manager.c" } ]
Heap-use-after-free READ 8
open62541
asan
======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_binary_message < INPUT_FILE or /out/fuzz_binary_message INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] /out/f...
cpp
01f78374285f16749452ba84289356fc85e4ab22
https://github.com/open62541/open62541/commit/a6d732b4050e902d9bba3acfa7bf72e30fa4dcc6
null
arvo:55051
n132/arvo:55051-vul
/src/mupdf
[ { "end_line": 251, "function_name": "pdf_parse_bf_range_array", "start_line": 219, "target_file": "/src/mupdf/source/pdf/pdf-cmap-parse.c" } ]
Stack-buffer-overflow READ 4
mupdf
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 303210954 INFO: Loaded 1 modules (155045 inline 8-bit counters): 155045 [0x3a582c0, 0x3a7e065), INFO: Loaded 1 PC tables (155045 PCs): 155045 [0x1674c20,0x18d2670), /out/pdf_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc error: cannot r...
cpp
360a6e0772e48272a738a9d825ba554387892ff7
https://github.com/ArtifexSoftware/mupdf/commit/74e920a40e0aea93f7cefca6e6bbff249d637b18
null
arvo:55146
n132/arvo:55146-vul
/src/libplist
[ { "end_line": 879, "function_name": "node_from_openstep", "start_line": 596, "target_file": "/src/libplist/src/oplist.c" } ]
Heap-buffer-overflow READ 1
libplist
asan
================================================================= ==9950==ERROR: AddressSanitizer: use-after-poison on address 0x7fd7fd2fd802 at pc 0x0000004e2cc9 bp 0x7fff9404fbb0 sp 0x7fff9404fba8 READ of size 1 at 0x7fd7fd2fd802 thread T0 SCARINESS: 22 (1-byte-read-use-after-poison) #0 0x4e2cc8 in node_from_open...
cpp
f31ab3835bb4bf8e574e9920ef9f17359163cbd3
https://github.com/libimobiledevice/libplist/commit/85f5cbd3705b34fcc52009ca51d8167ab18764fa
An out-of-bounds read occurs in the oplist component.
arvo:55214
n132/arvo:55214-vul
/src/hdf5
[ { "end_line": 576, "function_name": "H5G_ent_decode", "start_line": 119, "target_file": "/src/hdf5/src/H5Gent.c" } ]
Heap-buffer-overflow READ 1
hdf5
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2108464492 INFO: Loaded 1 modules (77673 inline 8-bit counters): 77673 [0x115d0a0, 0x1170009), INFO: Loaded 1 PC tables (77673 PCs): 77673 [0x1170010,0x129f6a0), /out/h5_read_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==============...
c
65eff22348634144cd5a6e77159c27eb895d54b4
https://github.com/HDFGroup/hdf5/commit/10d4a6d0941240702b5e8d77d57184a88bb69e6c
An out of bounds access occurs in `hdf5/src/H5Fint.c` at line 2859.
arvo:55365
n132/arvo:55365-vul
/src/libzip
[ { "end_line": 947, "function_name": "zip_check_torrentzip", "start_line": 894, "target_file": "/src/libzip/lib/zip_open.c" } ]
Heap-use-after-free READ 1
libzip
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/zip_read_fuzzer ================================================================= ==4862==ERROR: AddressSanitizer: heap-use-after-free on address 0x6080000000d8 at pc 0x0000005059ca bp 0x7ffe14ecf070 sp 0x7ffe14ecf068 READ of size 1 at 0x60...
cpp
5eeb3fdf58caef856c6050431187869f15006912
https://github.com/nih-at/libzip/commit/e907b0bda2f04c16eb7f10d5b2f41a3416a3e2b8
null
arvo:55430
n132/arvo:55430-vul
/src/zeek
[ { "end_line": 333, "function_name": "TeredoAnalyzer::DetectProtocol", "start_line": 268, "target_file": "/src/zeek/src/packet_analysis/protocol/teredo/Teredo.cc" } ]
Heap-buffer-overflow READ 2
zeek
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 114601111 INFO: Loaded 4 modules (606769 inline 8-bit counters): 242 [0x7fce2f8fdde8, 0x7fce2f8fdeda), 227828 [0x7fce31bf2f00, 0x7fce31c2a8f4), 378167 [0x7fce3534f528, 0x7fce353aba5f), 532 [0x5f6310, 0x5f6524), INFO: Loaded 4 PC tables (606769 PCs):...
cpp
9a96e3b52ad1850a1b80375f65add88e8ece4cbf
https://github.com/zeek/zeek/commit/2866bbea4d0f4ccf79f2088728d55c769efe46cc
The Teredo::DetectProtocol function lacks sufficient length checks, which may allow processing of data with incorrect or insufficient length.
arvo:55443
n132/arvo:55443-vul
/src/ghostpdl
[ { "end_line": 1440, "function_name": "gs_main_finit", "start_line": 1229, "target_file": "/src/ghostpdl/psi/imain.c" } ]
Heap-use-after-free READ 2
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1096716529 INFO: Loaded 3 modules (223637 inline 8-bit counters): 13672 [0x7f76fdb829e0, 0x7f76fdb85f48), 959 [0x7f76fdbe3a40, 0x7f76fdbe3dff), 209006 [0x382a690, 0x385d6fe), INFO: Loaded 3 PC tables (223637 PCs): 13672 [0x7f76fdb85f48,0x7f76fdbbb5c...
cpp
936d966618c81fa125604fe76932f1d4f33df8e3
https://github.com/ArtifexSoftware/ghostpdl/commit/e8da62c6ab890c6a27762f9285441afc6920e558
A dangling reference vulnerability occurs in an extreme out-of-memory condition where, if memory is exhausted to the point that the Postscript error handler cannot run properly, references to arrays recording the stacks' content in $error can persist until final garbage collection, even though the arrays themselves hav...
arvo:55724
n132/arvo:55724-vul
/src/libgit2
[ { "end_line": 162, "function_name": "commit_graph_parse_oid_lookup", "start_line": 135, "target_file": "/src/libgit2/src/libgit2/commit_graph.c" }, { "end_line": 302, "function_name": "git_commit_graph_file_parse", "start_line": 199, "target_file": "/src/libgit2/src/libgit2/commi...
Heap-buffer-overflow READ {*}
libgit2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2319727579 INFO: Loaded 1 modules (35856 inline 8-bit counters): 35856 [0xc6cf00, 0xc75b10), INFO: Loaded 1 PC tables (35856 PCs): 35856 [0xb23e30,0xbaff30), /out/commit_graph_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc =============...
cpp
be484d355b1b41748689fd29381bdcdcbd4c45bb
https://github.com/libgit2/libgit2/commit/b899fda3d88dc92f50e73544fb7524a1c3c70354
null
arvo:5576
n132/arvo:5576-vul
/src/open62541
[ { "end_line": 282, "function_name": "Service_ActivateSession", "start_line": 232, "target_file": "/src/open62541/src/server/ua_services_session.c" } ]
Use-of-uninitialized-value
open62541
msan
INFO: Seed: 2780430290 INFO: Loaded 1 modules (5217 inline 8-bit counters): 5217 [0xb547f8, 0xb55c59), INFO: Loaded 1 PC tables (5217 PCs): 5217 [0xb55c60,0xb6a270), /out/fuzz_binary_message: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==878==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x5232...
cpp
c54a3e26439600a075c5ac427da1aae0f0781655
https://github.com/open62541/open62541/commit/3d4b8666b02ecea0045c2ba8ae4c46a3f766c765
null