task_id
stringlengths
8
10
docker_image
stringlengths
17
19
basedir
stringclasses
157 values
target_functions
listlengths
1
3
crash_type
stringclasses
85 values
project_name
stringclasses
157 values
sanitizer
stringclasses
3 values
sanitizer_output
stringlengths
1.13k
6.5M
language
stringclasses
2 values
vuln_commit
stringlengths
40
40
fix
stringlengths
69
110
vulnerability_description
stringlengths
38
824
arvo:5577
n132/arvo:5577-vul
/src/open62541
[ { "end_line": 56, "function_name": "removeSession", "start_line": 33, "target_file": "/src/open62541/src/server/ua_session_manager.c" } ]
Heap-use-after-free WRITE 8
open62541
asan
Reading 2520 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_binary_message < INPUT_FILE or /out/fuzz_binary_message INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute th...
cpp
01f78374285f16749452ba84289356fc85e4ab22
https://github.com/open62541/open62541/commit/a6d732b4050e902d9bba3acfa7bf72e30fa4dcc6
null
arvo:55818
n132/arvo:55818-vul
/src/hunspell
[ { "end_line": 1565, "function_name": "AffixMgr::setcminmax", "start_line": 1550, "target_file": "/src/hunspell/src/hunspell/affixmgr.cxx" } ]
Stack-buffer-underflow READ 1
hunspell
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3171476752 INFO: Loaded 1 modules (17516 inline 8-bit counters): 17516 [0x8a3d78, 0x8a81e4), INFO: Loaded 1 PC tables (17516 PCs): 17516 [0x7dc618,0x820cd8), /out/affdicfuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ====================...
cpp
dbfc3656efd1217b1ae242d9f60f26ccf94b34b4
https://github.com/hunspell/hunspell/commit/1cb9ba1f695624ee0a823fac6d9dbd83b6a7066a
null
arvo:55874
n132/arvo:55874-vul
/src/libavc
[ { "end_line": 1665, "function_name": "isvcd_parse_sps", "start_line": 1096, "target_file": "/src/libavc/decoder/svc/isvcd_parse_headers.c" } ]
Heap-buffer-overflow READ 16
libavc
asan
================================================================= ==2279==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000005dad at pc 0x0000005c5408 bp 0x7fff9e7554e0 sp 0x7fff9e7554d8 READ of size 16 at 0x619000005dad thread T0 SCARINESS: 36 (multi-byte-read-heap-buffer-overflow-far-from-bounds) ...
cpp
764ab7b702142762bfa9c4e93427c6e494ff7940
https://github.com/ittiam-systems/libavc/commit/8739b7da75f305ab391eb36c613210c23243fe5b
null
arvo:55876
n132/arvo:55876-vul
/src/libavc
[ { "end_line": 1665, "function_name": "isvcd_parse_sps", "start_line": 1096, "target_file": "/src/libavc/decoder/svc/isvcd_parse_headers.c" } ]
UNKNOWN READ
libavc
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 134076288 INFO: Loaded 1 modules (16557 inline 8-bit counters): 16557 [0x9d9b70, 0x9ddc1d), INFO: Loaded 1 PC tables (16557 PCs): 16557 [0x93e480,0x97ef50), /out/svc_dec_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc MemorySanitizer:DEA...
cpp
764ab7b702142762bfa9c4e93427c6e494ff7940
https://github.com/ittiam-systems/libavc/commit/8739b7da75f305ab391eb36c613210c23243fe5b
null
arvo:55877
n132/arvo:55877-vul
/src/libavc
[ { "end_line": 1665, "function_name": "isvcd_parse_sps", "start_line": 1096, "target_file": "/src/libavc/decoder/svc/isvcd_parse_headers.c" } ]
Heap-buffer-overflow WRITE 1
libavc
asan
================================================================= ==2279==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61100000594c at pc 0x00000058448e bp 0x7fff1e0d1020 sp 0x7fff1e0d1018 WRITE of size 1 at 0x61100000594c thread T0 SCARINESS: 31 (1-byte-write-heap-buffer-overflow) #0 0x58448d in isvc...
cpp
764ab7b702142762bfa9c4e93427c6e494ff7940
https://github.com/ittiam-systems/libavc/commit/8739b7da75f305ab391eb36c613210c23243fe5b
null
arvo:55886
n132/arvo:55886-vul
/src/mosquitto
[ { "end_line": 175, "function_name": "config__add_listener", "start_line": 144, "target_file": "/src/mosquitto/src/conf.c" } ]
Heap-use-after-free READ 2
mosquitto
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1309876256 INFO: Loaded 1 modules (10232 inline 8-bit counters): 10232 [0x70ca38, 0x70f230), INFO: Loaded 1 PC tables (10232 PCs): 10232 [0x70f230,0x7371b0), /out/broker_fuzz_test_config: Running 1 inputs 1 time(s) each. Running: /tmp/poc 174429919...
cpp
be688e883b734fc421e1dc1931a349b4d9afea49
https://github.com/eclipse/mosquitto/commit/1df253e4e3c48079a196788dbacc9c1364c92162
A vulnerability exists where a mixed default/non-default listener configuration in the listener config could cause a crash on startup. This affects only very unusual configurations.
arvo:55905
n132/arvo:55905-vul
/src/libavc
[ { "end_line": 1665, "function_name": "isvcd_parse_sps", "start_line": 1096, "target_file": "/src/libavc/decoder/svc/isvcd_parse_headers.c" } ]
Heap-buffer-overflow READ 4
libavc
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1450786119 INFO: Loaded 1 modules (16891 inline 8-bit counters): 16891 [0x851a5d0, 0x851e7cb), INFO: Loaded 1 PC tables (16891 PCs): 16891 [0x847e9a4,0x849f97c), /out/svc_dec_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==============...
cpp
764ab7b702142762bfa9c4e93427c6e494ff7940
https://github.com/ittiam-systems/libavc/commit/8739b7da75f305ab391eb36c613210c23243fe5b
null
arvo:55910
n132/arvo:55910-vul
/src/freeradius-server
[ { "end_line": 968, "function_name": "fr_tacacs_decode", "start_line": 342, "target_file": "/src/freeradius-server/src/protocols/tacacs/decode.c" } ]
Heap-buffer-overflow READ 1
freeradius-server
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3906339780 INFO: Loaded 3 modules (19873 inline 8-bit counters): 19082 [0x7fab9133bf00, 0x7fab9134098a), 738 [0x7fab90f40d50, 0x7fab90f41032), 53 [0x5f0600, 0x5f0635), INFO: Loaded 3 PC tables (19873 PCs): 19082 [0x7fab91340990,0x7fab9138b230), 738 ...
c
c297f3525a60da93487108c8fe1be3851827d4c8
https://github.com/FreeRADIUS/freeradius-server/commit/f186a56705574338ef3f9ea2445891be41a4b759
null
arvo:55911
n132/arvo:55911-vul
/src/libavc
[ { "end_line": 1665, "function_name": "isvcd_parse_sps", "start_line": 1096, "target_file": "/src/libavc/decoder/svc/isvcd_parse_headers.c" } ]
Heap-buffer-overflow READ 1
libavc
asan
================================================================= ==2280==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61d000003a88 at pc 0x000000589d4b bp 0x7ffc11175e30 sp 0x7ffc11175e28 READ of size 1 at 0x61d000003a88 thread T0 SCARINESS: 22 (1-byte-read-heap-buffer-overflow-far-from-bounds) #0 0x...
cpp
764ab7b702142762bfa9c4e93427c6e494ff7940
https://github.com/ittiam-systems/libavc/commit/8739b7da75f305ab391eb36c613210c23243fe5b
null
arvo:55933
n132/arvo:55933-vul
/src/binutils-gdb
[ { "end_line": 981, "function_name": "_bfd_ecoff_slurp_symbol_table", "start_line": 843, "target_file": "/src/binutils-gdb/bfd/ecoff.c" } ]
Heap-buffer-overflow WRITE 8
binutils-gdb
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_nm ================================================================= ==83637==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x621000018ed0 at pc 0x000000b9cc64 bp 0x7ffc4e2e7310 sp 0x7ffc4e2e7308 WRITE of size 8 at 0x6210000...
cpp
77be7257442b1ca19deba8ec0e424f0faf53321f
https://github.com/bminor/binutils-gdb/commit/0d2f72332c7606fa3181b54dceef82d1af403624
A buffer overflow exists in _bfd_ecoff_slurp_symbol_table in ecoff.c due to missing bounds checks on internal_sym.iss, which can lead to out-of-bounds memory access. The function lacks proper validation of input sizes, making it vulnerable to buffer overflows.
arvo:55950
n132/arvo:55950-vul
/src/mosquitto
[ { "end_line": 110, "function_name": "mosquitto_validate_utf8", "start_line": 24, "target_file": "/src/mosquitto/lib/utf8_mosq.c" } ]
Heap-buffer-overflow READ 1
mosquitto
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3382427068 INFO: Loaded 1 modules (41 inline 8-bit counters): 41 [0x5eaf00, 0x5eaf29), INFO: Loaded 1 PC tables (41 PCs): 41 [0x5eaf30,0x5eb1c0), /out/lib_fuzz_utf8: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===============================...
cpp
11cb25ee00ed858394fbf4103be2254ce13805e7
https://github.com/eclipse/mosquitto/commit/769c94a10373db28ff0d63f25e6d382f5db3ec3c
null
arvo:55964
n132/arvo:55964-vul
/src/libavc
[ { "end_line": 409, "function_name": "isvcd_pic_reset_ctxt", "start_line": 360, "target_file": "/src/libavc/decoder/svc/isvcd_nal_parse.c" } ]
Heap-buffer-overflow READ 4
libavc
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/svc_dec_fuzzer ================================================================= ==2261==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7fe83aff9800 at pc 0x0000005f8b88 bp 0x7ffe171f8570 sp 0x7ffe171f8568 READ of size 4 at 0x7f...
cpp
8b8c7e390d00e5f6e8b354051680e5acd6c9a912
https://github.com/ittiam-systems/libavc/commit/764ab7b702142762bfa9c4e93427c6e494ff7940
A non-vcl buffer overflow occurs in the nal_parse function.
arvo:55982
n132/arvo:55982-vul
/src/freeradius-server
[ { "end_line": 965, "function_name": "fr_tacacs_decode", "start_line": 340, "target_file": "/src/freeradius-server/src/protocols/tacacs/decode.c" } ]
Stack-buffer-overflow WRITE {*}
freeradius-server
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3586529230 INFO: Loaded 3 modules (19901 inline 8-bit counters): 19082 [0x7f9b228fcf00, 0x7f9b2290198a), 766 [0x7f9b22501ee8, 0x7f9b225021e6), 53 [0x5f0600, 0x5f0635), INFO: Loaded 3 PC tables (19901 PCs): 19082 [0x7f9b22901990,0x7f9b2294c230), 766 ...
c
8e3e3144fbbb3272fd86bcf0e4f03e0e68093b4d
https://github.com/FreeRADIUS/freeradius-server/commit/e9896af945d36f9548089164a8077cb368a4ad8f
null
arvo:55985
n132/arvo:55985-vul
/src/binutils-gdb
[ { "end_line": 985, "function_name": "_bfd_ecoff_slurp_symbol_table", "start_line": 842, "target_file": "/src/binutils-gdb/bfd/ecoff.c" } ]
UNKNOWN READ
binutils-gdb
asan
AddressSanitizer:DEADLYSIGNAL ================================================================= ==78699==ERROR: AddressSanitizer: SEGV on unknown address 0x621514bd35b9 (pc 0x7fe414c5cc12 bp 0x7ffc3abf9e90 sp 0x7ffc3abf9658 T0) ==78699==The signal is caused by a READ memory access. SCARINESS: 20 (wild-addr-read) #0...
cpp
72d225ef9cc7d475db188581da33b056df3191fd
https://github.com/bminor/binutils-gdb/commit/c91714309754e27f7f3a6ffc08ba61739c418532
The vulnerability allows unused pointers to escape the UPDATE_RAW_END sanity checks in ecoff.c, potentially resulting in overflows. Additionally, the local sym fdr isymBase and csym values in the _bfd_ecoff_slurp_symbolic_info function are not properly sanity checked, which can lead to unsafe pointer usage and memory i...
arvo:56150
n132/arvo:56150-vul
/src/serenity
[ { "end_line": 607, "function_name": "read_start_of_scan", "start_line": 548, "target_file": "/src/serenity/Userland/Libraries/LibGfx/JPEGLoader.cpp" } ]
Bad-cast
serenity
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2774324601 INFO: Loaded 1 modules (34180 inline 8-bit counters): 34180 [0x7738c8, 0x77be4c), INFO: Loaded 1 PC tables (34180 PCs): 34180 [0x77be50,0x801690), /out/FuzzJPEGLoader: Running 1 inputs 1 time(s) each. Running: /tmp/poc /src/serenity/Meta...
cpp
947698f29fb54b0e0e5f87b63ba7353cc704530f
https://github.com/SerenityOS/serenity/commit/ae124c19efb5fda789f399b9207d84359fe4599a
LibGfx incorrectly assumes that a scan includes all components for the image. A scan can contain fewer components than the full image, and if there are multiple components, they must follow the ordering of the frame header. This can lead to improper handling when looping over image components and skipping those that do...
arvo:56157
n132/arvo:56157-vul
/src/librabbitmq
[ { "end_line": 24, "function_name": "LLVMFuzzerTestOneInput", "start_line": 12, "target_file": "/src/librabbitmq/fuzz/fuzz_url.c" } ]
Use-after-poison READ 5
librabbitmq
asan
================================================================= ==927==ERROR: AddressSanitizer: use-after-poison on address 0x7fbed7dfd816 at pc 0x0000004dc445 bp 0x7ffd8120b590 sp 0x7ffd8120b588 READ of size 1 at 0x7fbed7dfd816 thread T0 SCARINESS: 22 (1-byte-read-use-after-poison) #0 0x4dc444 in find_delim /src...
c
cb04afb806447d509e7722776e8533c5069571a3
https://github.com/alanxz/rabbitmq-c/commit/a78737482b3f5e9359c303099107644d7ee48e07
null
arvo:56176
n132/arvo:56176-vul
/src/libavc
[ { "end_line": 884, "function_name": "isvcd_parse_subset_sps", "start_line": 126, "target_file": "/src/libavc/decoder/svc/isvcd_parse_headers.c" } ]
Use-of-uninitialized-value
libavc
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1950193256 INFO: Loaded 1 modules (16667 inline 8-bit counters): 16667 [0x9ddb60, 0x9e1c7b), INFO: Loaded 1 PC tables (16667 PCs): 16667 [0x942550,0x983700), /out/svc_dec_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==2266==WARNING: M...
c
a7c8d4764346a0c03626d6a9ffcf64aa762acf0e
https://github.com/ittiam-systems/libavc/commit/5fabd43f6af6c5f432c543b8a84e690dfa31a3b2
null
arvo:56210
n132/arvo:56210-vul
/src/libavc
[ { "end_line": 884, "function_name": "isvcd_parse_subset_sps", "start_line": 126, "target_file": "/src/libavc/decoder/svc/isvcd_parse_headers.c" } ]
Heap-buffer-overflow READ 1
libavc
asan
================================================================= ==2279==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x613000008f36 at pc 0x00000057b6cf bp 0x7fffca61a030 sp 0x7fffca61a028 READ of size 1 at 0x613000008f36 thread T0 SCARINESS: 22 (1-byte-read-heap-buffer-overflow-far-from-bounds) #0 0x...
cpp
a7c8d4764346a0c03626d6a9ffcf64aa762acf0e
https://github.com/ittiam-systems/libavc/commit/5fabd43f6af6c5f432c543b8a84e690dfa31a3b2
null
arvo:56277
n132/arvo:56277-vul
/src/binutils-gdb
[ { "end_line": 2423, "function_name": "lookup_line", "start_line": 1878, "target_file": "/src/binutils-gdb/bfd/ecofflink.c" } ]
UNKNOWN READ
binutils-gdb
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_addr2line BFD: /tmp/libfuzzer.83637: no group info for section '' /tmp/libfuzzer.83637: no group info for section '' BFD: /tmp/libfuzzer.83637: no group info for section '' /tmp/libfuzzer.83637: no group info for section '' AddressSani...
cpp
3f316bf83bc59299e96e1395793e6493d3ab9581
https://github.com/bminor/binutils-gdb/commit/f6389c5a793648f1b12cc791b8957cf6d1752222
The ECOFF support in ecofflink.c lacks sufficient bounds checking in functions such as mk_fdrtab and lookup_line. The code uses "long" for counts and sizes, which can lead to issues with signed integer overflow and improper handling of string offsets and symbol indices. This can result in vulnerabilities due to inadequ...
arvo:56455
n132/arvo:56455-vul
/src/harfbuzz
[ { "end_line": 119, "function_name": "LLVMFuzzerTestOneInput", "start_line": 46, "target_file": "/src/harfbuzz/test/fuzzing/hb-subset-fuzzer.cc" } ]
Heap-buffer-overflow READ 4
harfbuzz
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3811444627 INFO: Loaded 1 modules (93778 inline 8-bit counters): 93778 [0x8c50590, 0x8c673e2), INFO: Loaded 1 PC tables (93778 PCs): 93778 [0x8c673e4,0x8d1e674), /out/hb-subset-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ============...
cpp
5226d697338756e661c951af28c19b9a69b4ff93
https://github.com/harfbuzz/harfbuzz/commit/2d33a6b4dfdcd751eba242637c863d810a4a803c
null
arvo:56469
n132/arvo:56469-vul
/src/mupdf
[ { "end_line": 126, "function_name": "pdf_load_page_tree_internal", "start_line": 104, "target_file": "/src/mupdf/source/pdf/pdf-page.c" } ]
Use-of-uninitialized-value
mupdf
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3549084358 INFO: Loaded 1 modules (158649 inline 8-bit counters): 158649 [0x42125c1, 0x423917a), INFO: Loaded 1 PC tables (158649 PCs): 158649 [0x1ee13b0,0x214cf40), /out/pdf_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc error: cannot ...
cpp
14fe6e23252fa475016df7120a6c70d28bf85c3f
https://github.com/ArtifexSoftware/mupdf/commit/9054d993d2b035c78e61b54a8bd5515bb494e042
The forward page map is implemented as a list of object numbers, which causes pdf_lookup_page_obj to resolve the object and return a borrowed reference to the required object. However, code that calls this function often assumes it will receive a borrowed reference to an indirection object pointing to the page object, ...
arvo:56513
n132/arvo:56513-vul
/src/mruby
[ { "end_line": 361, "function_name": "mrb_format_float", "start_line": 78, "target_file": "/src/mruby/src/fmt_fp.c" } ]
Use-of-uninitialized-value
mruby
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3013550729 INFO: Loaded 1 modules (24470 inline 8-bit counters): 24470 [0x9cf699, 0x9d562f), INFO: Loaded 1 PC tables (24470 PCs): 24470 [0x90b4b8,0x96ae18), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==2287==WARNING: Mem...
c
31c99eb99b52d7469bbe3f46863fcfe1bff36cfe
https://github.com/mruby/mruby/commit/956d0c51271d453f2d66cbe8fc5626f00035d151
A vulnerability exists in fmt_fp.c within the mrb_format_float function, where the "%e" format specifier does not enforce a minimum precision of 1.
arvo:56515
n132/arvo:56515-vul
/src/cyclonedds
[ { "end_line": 110, "function_name": "LLVMFuzzerTestOneInput", "start_line": 40, "target_file": "/src/cyclonedds/fuzz/fuzz_type_object/fuzz_type_object.c" } ]
UNKNOWN WRITE
cyclonedds
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 695104779 INFO: Loaded 1 modules (34592 inline 8-bit counters): 34592 [0x777a78, 0x780198), INFO: Loaded 1 PC tables (34592 PCs): 34592 [0x650df8,0x6d7ff8), /out/fuzz_type_object: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehavior...
c
aa35c3cc3de6fdb57c475c6ac404d306f874639c
https://github.com/eclipse-cyclonedds/cyclonedds/commit/090b62ee46e8af9c539b2881aa36787e1de08079
The error handling for ddsi_type_ref_proxy in the type object test in test_typeobj.c is insufficient, potentially leading to security vulnerabilities.
arvo:5652
n132/arvo:5652-vul
/src/open62541
[ { "end_line": 282, "function_name": "Service_ActivateSession", "start_line": 232, "target_file": "/src/open62541/src/server/ua_services_session.c" } ]
Heap-use-after-free READ 8
open62541
asan
Reading 964 bytes from /tmp/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: /out/fuzz_binary_message < INPUT_FILE or /out/fuzz_binary_message INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute thi...
cpp
c54a3e26439600a075c5ac427da1aae0f0781655
https://github.com/open62541/open62541/commit/3d4b8666b02ecea0045c2ba8ae4c46a3f766c765
null
arvo:56544
n132/arvo:56544-vul
/src/ghostpdl
[ { "end_line": 4612, "function_name": "pdf14_fill_stroke_path", "start_line": 4506, "target_file": "/src/ghostpdl/base/gdevp14.c" } ]
Heap-buffer-overflow WRITE {*}
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 76866910 INFO: Loaded 3 modules (224310 inline 8-bit counters): 13672 [0x7fecd2f169e0, 0x7fecd2f19f48), 959 [0x7fecd2f77a40, 0x7fecd2f77dff), 209679 [0x383b1d0, 0x386e4df), INFO: Loaded 3 PC tables (224310 PCs): 13672 [0x7fecd2f19f48,0x7fecd2f4f5c8)...
cpp
b2992b7fa5dfae682c3c6f8fccb6b16733978e48
https://github.com/ArtifexSoftware/ghostpdl/commit/f62a3f606db3163b85666a0b8997e52987c87e97
null
arvo:56554
n132/arvo:56554-vul
/src/mruby
[ { "end_line": 172, "function_name": "mrb_debug_get_position", "start_line": 159, "target_file": "/src/mruby/src/debug.c" } ]
Use-of-uninitialized-value
mruby
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4136035985 INFO: Loaded 1 modules (24267 inline 8-bit counters): 24267 [0x9f45b9, 0x9fa484), INFO: Loaded 1 PC tables (24267 PCs): 24267 [0x92e358,0x98d008), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==2300==WARNING: Mem...
c
ce86040a0fbd11b3d00df5ee96d55f005c5b38c9
https://github.com/mruby/mruby/commit/31c99eb99b52d7469bbe3f46863fcfe1bff36cfe
null
arvo:56687
n132/arvo:56687-vul
/src/mruby
[ { "end_line": 1664, "function_name": "mrb_init_io", "start_line": 1617, "target_file": "/src/mruby/mrbgems/mruby-io/src/io.c" } ]
UNKNOWN READ
mruby
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2373020415 INFO: Loaded 1 modules (23602 inline 8-bit counters): 23602 [0x96c6d0, 0x972302), INFO: Loaded 1 PC tables (23602 PCs): 23602 [0x83a118,0x896438), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc line 100:18: warning...
c
d0659b089f3d9eb8b7969bc2c006032d10076d8b
https://github.com/mruby/mruby/commit/af59e30710ea72aa479e6d26ae5c6951d1954d11
null
arvo:56781
n132/arvo:56781-vul
/src/opensc
[ { "end_line": 158, "function_name": "cosm_delete_file", "start_line": 119, "target_file": "/src/opensc/src/pkcs15init/pkcs15-oberthur.c" } ]
Index-out-of-bounds
opensc
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3176867118 INFO: Loaded 1 modules (109040 inline 8-bit counters): 109040 [0x11599b0, 0x11743a0), INFO: Loaded 1 PC tables (109040 PCs): 109040 [0xd1c408,0xec6308), /out/fuzz_pkcs15init: Running 1 inputs 1 time(s) each. Running: /tmp/poc sc.c:467:61...
c
eac9f21202377cb2b34246f2920504dfbd92b139
https://github.com/OpenSC/OpenSC/commit/d0a2bdaac5dcecc905c7aad6579c46624cc0ebde
null
arvo:56820
n132/arvo:56820-vul
/src/wireshark
[ { "end_line": 2219, "function_name": "dissect_oran_c_section", "start_line": 1097, "target_file": "/src/wireshark/epan/dissectors/packet-oran.c" } ]
Index-out-of-bounds
wireshark
ubsan
oss-fuzzshark: disabling: ip oss-fuzzshark: disabling: udplite oss-fuzzshark: disabling: ospf oss-fuzzshark: disabling: bgp oss-fuzzshark: disabling: dhcp oss-fuzzshark: disabling: json oss-fuzzshark: disabling: snort oss-fuzzshark: configured for dissector: udp in table: ip.proto INFO: Running with entropic power sche...
c
2a7e4982a55b0d8e1a22f42cf6bb1e410daa92c0
https://github.com/wireshark/wireshark/commit/9a63e4cf79052a7897db2f8f239b7a5249155f7e
null
arvo:56936
n132/arvo:56936-vul
/src/wireshark
[ { "end_line": 266, "function_name": "dissect_gsmrlp", "start_line": 203, "target_file": "/src/wireshark/epan/dissectors/packet-gsm_rlp.c" } ]
Heap-buffer-overflow READ 1
wireshark
asan
oss-fuzzshark: disabling: ip oss-fuzzshark: disabling: udplite oss-fuzzshark: disabling: ospf oss-fuzzshark: disabling: bgp oss-fuzzshark: disabling: dhcp oss-fuzzshark: disabling: json oss-fuzzshark: disabling: snort oss-fuzzshark: configured for dissector: udp in table: ip.proto Accepting input from '/tmp/poc' Usage ...
c
b911cf286f495ba068c77b8b2b3445d1a325a819
https://github.com/wireshark/wireshark/commit/450aa4e580314cdd55733858c72dcd4828a234b0
A vulnerability exists in packet-gsm_rlp where the code reads beyond the captured length when computing the FCS.
arvo:56990
n132/arvo:56990-vul
/src/wireshark
[ { "end_line": 2226, "function_name": "dissect_oran_c_section", "start_line": 1099, "target_file": "/src/wireshark/epan/dissectors/packet-oran.c" } ]
UNKNOWN READ
wireshark
asan
oss-fuzzshark: disabling: udp oss-fuzzshark: disabling: udplite oss-fuzzshark: disabling: ospf oss-fuzzshark: disabling: bgp oss-fuzzshark: disabling: dhcp oss-fuzzshark: disabling: json oss-fuzzshark: disabling: snort oss-fuzzshark: configured for dissector: ip INFO: Running with entropic power schedule (0xFF, 100). I...
c
8bc487ea762da0f565695e9e9e33b58f14d9f31d
https://github.com/wireshark/wireshark/commit/5f2c523703f3f8caf2c954c1bd1cf1e3c3f9e0c9
A vulnerability exists in the ORAN FH CUS Ext11 implementation where improper handling of the array index occurs if there are 0 bundles, potentially leading to out-of-bounds access.
arvo:56991
n132/arvo:56991-vul
/src/mruby
[ { "end_line": 1358, "function_name": "mrb_field_write_barrier", "start_line": 1339, "target_file": "/src/mruby/src/gc.c" } ]
Heap-use-after-free READ 4
mruby
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/mruby_proto_fuzzer [libprotobuf WARNING /src/LPM/external.protobuf/src/external.protobuf/src/google/protobuf/text_format.cc:352] Warning parsing text-format ruby_fuzzer.Function: 1134:18: Message type "ruby_fuzzer.StatementSeq" has no field...
cpp
ccca6ec45895020b0b32b99652fb1b3cbbc42e93
https://github.com/mruby/mruby/commit/8d1192f8a28034b1931a41e8c55cd86715101d0c
A vulnerability exists in gc.c within the mrb_field_write_barrier function, where the condition does not account for the possibility that Minor GC may be suspended with the MRB_GC_STATE_SWEEP state.
arvo:57001
n132/arvo:57001-vul
/src/assimp
[ { "end_line": 331, "function_name": "OFFImporter::InternReadFile", "start_line": 108, "target_file": "/src/assimp/code/AssetLib/OFF/OFFLoader.cpp" } ]
UNKNOWN WRITE
assimp
asan
Reading 45 bytes from /tmp/poc Info, T0: Load $$$___magic___$$$. Info, T0: File extension not known, trying signature-based detection Info, T0: Found a matching importer for this file format: OFF Importer. Info, T0: Import root directory is './' Error, T0: OFF: Vertex index is out of range Error, T0: OFF: The numbe...
cpp
4180b1fd080b2cab0a2d3a3149eff1f5163ee888
https://github.com/assimp/assimp/commit/36dfa3bed31fe220a15648083a78c925fbec0792
An unknown write occurs in the function Assimp::SortByPTypeProcess::Execute.
arvo:57061
n132/arvo:57061-vul
/src/libxslt
[ { "end_line": 357, "function_name": "xsltCompMatchAdd", "start_line": 300, "target_file": "/src/libxslt/libxslt/pattern.c" } ]
Heap-double-free
libxslt
asan
Running LLVMFuzzerInitialize ... continue... ================================================================= ==17834==ERROR: AddressSanitizer: attempting double-free on 0x602000001590 in thread T0: SCARINESS: 42 (double-free) #0 0x49f8c2 in free /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:52:3 ...
c
f13329a622f0370bf1eb72ef99229e8faf46f732
https://gitlab.gnome.org/GNOME/libxslt.gitac9d752240d399db1d7c09f2ef4008200a272c8c
A double free vulnerability exists in the xsltCompMatchAdd function due to improper handling of memory allocation failures.
arvo:57077
n132/arvo:57077-vul
/src/libxml2
[ { "end_line": 837, "function_name": "xmlCurrentChar", "start_line": 698, "target_file": "/src/libxml2/parserInternals.c" } ]
Global-buffer-overflow READ 1
libxml2
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/xinclude ================================================================= ==10547==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000000852f9f at pc 0x00000056ba63 bp 0x7ffee6882fb0 sp 0x7ffee6882fa8 READ of size 1 at 0x00000...
c
4b3452d17123631ec43d532b83dc182c1a638fed
https://gitlab.gnome.org/GNOME/libxml2/-/commit/ca2bfecea9c23f8d2e11741fff7c6a5372c56bb8
null
arvo:57080
n132/arvo:57080-vul
/src/libxml2
[ { "end_line": 837, "function_name": "xmlCurrentChar", "start_line": 698, "target_file": "/src/libxml2/parserInternals.c" } ]
Global-buffer-overflow READ 1
libxml2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3164410884 INFO: Loaded 1 modules (52514 inline 8-bit counters): 52514 [0xad7b30, 0xae4852), INFO: Loaded 1 PC tables (52514 PCs): 52514 [0x960110,0xa2d330), /out/xinclude: Running 1 inputs 1 time(s) each. Running: /tmp/poc ========================...
c
4b3452d17123631ec43d532b83dc182c1a638fed
https://gitlab.gnome.org/GNOME/libxml2/-/commit/ca2bfecea9c23f8d2e11741fff7c6a5372c56bb8
null
arvo:57084
n132/arvo:57084-vul
/src/libxml2
[ { "end_line": 837, "function_name": "xmlCurrentChar", "start_line": 698, "target_file": "/src/libxml2/parserInternals.c" } ]
Global-buffer-overflow READ 1
libxml2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1950158454 INFO: Loaded 1 modules (52509 inline 8-bit counters): 52509 [0x874d4c0, 0x875a1dd), INFO: Loaded 1 PC tables (52509 PCs): 52509 [0x863db1c,0x86a4404), /out/schema: Running 1 inputs 1 time(s) each. Running: /tmp/poc ======================...
c
4b3452d17123631ec43d532b83dc182c1a638fed
https://gitlab.gnome.org/GNOME/libxml2/-/commit/ca2bfecea9c23f8d2e11741fff7c6a5372c56bb8
null
arvo:57089
n132/arvo:57089-vul
/src/libxml2
[ { "end_line": 3170, "function_name": "htmlParseScript", "start_line": 3097, "target_file": "/src/libxml2/HTMLparser.c" } ]
Global-buffer-overflow READ 1
libxml2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 39997470 INFO: Loaded 1 modules (52493 inline 8-bit counters): 52493 [0x874d4c0, 0x875a1cd), INFO: Loaded 1 PC tables (52493 PCs): 52493 [0x863db3c,0x86a43a4), /out/html: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==========================...
c
1a91392c62e40eaa920b8a406c659da3f1ccf2f5
https://gitlab.gnome.org/GNOME/libxml2/-/commit/8090e5856465c0b8e26e2a080f4b498f37fa83ab
null
arvo:57105
n132/arvo:57105-vul
/src/libraw
[ { "end_line": 887, "function_name": "LibRaw::parseAdobeRAFMakernote", "start_line": 105, "target_file": "/src/libraw/src/metadata/fuji.cpp" } ]
UNKNOWN READ
libraw
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/libraw_nef_fuzzer AddressSanitizer:DEADLYSIGNAL ================================================================= ==54004==ERROR: AddressSanitizer: SEGV on unknown address 0x7feb7ddfa7fd (pc 0x000000504abd bp 0x7ffd5d72a8d0 sp 0x7ffd5d72a8b...
cpp
443b7fb51e1ca89a1178180258a0f10ed353617d
https://github.com/libraw/libraw/commit/f2998bacc3d06484769150bfbc8df379a4f81f2c
null
arvo:57110
n132/arvo:57110-vul
/src/libxml2
[ { "end_line": 837, "function_name": "xmlCurrentChar", "start_line": 698, "target_file": "/src/libxml2/parserInternals.c" } ]
Global-buffer-overflow READ 1
libxml2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2437780186 INFO: Loaded 1 modules (52506 inline 8-bit counters): 52506 [0xad7b40, 0xae485a), INFO: Loaded 1 PC tables (52506 PCs): 52506 [0x960110,0xa2d2b0), /out/schema: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==========================...
c
4b3452d17123631ec43d532b83dc182c1a638fed
https://gitlab.gnome.org/GNOME/libxml2/-/commit/ca2bfecea9c23f8d2e11741fff7c6a5372c56bb8
null
arvo:57202
n132/arvo:57202-vul
/src/p11-kit
[ { "end_line": 3421, "function_name": "base_C_MessageSignFinal", "start_line": 3412, "target_file": "/src/p11-kit/p11-kit/virtual.c" } ]
Global-buffer-overflow READ 8
p11-kit
asan
================================================================= ==24471==ERROR: AddressSanitizer: global-buffer-overflow on address 0x00000098fa78 at pc 0x0000004e8c7c bp 0x7ffec7801ff0 sp 0x7ffec7801fe8 READ of size 8 at 0x00000098fa78 thread T0 SCARINESS: 23 (8-byte-read-global-buffer-overflow) #0 0x4e8c7b in b...
c
cb531a61afc0e3c0f2174fa1bf026e993c76ea89
https://github.com/p11-glue/p11-kit/commit/d7c318845405fa7ea33154082b437e4a87ee3699
null
arvo:57209
n132/arvo:57209-vul
/src/arrow
[ { "end_line": 692, "function_name": "ValidateRunEndEncoded", "start_line": 641, "target_file": "/src/arrow/cpp/src/arrow/array/validate.cc" } ]
UNKNOWN READ
arrow
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2049760309 INFO: Loaded 1 modules (352193 inline 8-bit counters): 352193 [0x169fca0, 0x16f5c61), INFO: Loaded 1 PC tables (352193 PCs): 352193 [0x16f5c68,0x1c55878), /out/arrow-ipc-file-fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc Undef...
cpp
0ead719bdcc90bdeee4d225f7bb9dab1c458eccf
https://github.com/apache/arrow/commit/02bc24cd531ae7597dc5c93c85293870c57d8b73
Sending a REE array with an invalid null buffer through IPC to the C++ implementation causes a crash if the array is validated in the Validate() function.
arvo:57224
n132/arvo:57224-vul
/src/libxml2
[ { "end_line": 3259, "function_name": "htmlParseCharDataInternal", "start_line": 3187, "target_file": "/src/libxml2/HTMLparser.c" } ]
Global-buffer-overflow READ 1
libxml2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2002051291 INFO: Loaded 1 modules (52300 inline 8-bit counters): 52300 [0x87484c0, 0x875510c), INFO: Loaded 1 PC tables (52300 PCs): 52300 [0x8639b3c,0x869fd9c), /out/html: Running 1 inputs 1 time(s) each. Running: /tmp/poc ========================...
c
9ef2a9abf357f747c2fb03841b7f479cc0dfd3ef
https://gitlab.gnome.org/GNOME/libxml2/-/commit/067986fa674f0811614dab4c4572f5f7ff483400
null
arvo:57288
n132/arvo:57288-vul
/src/libxml2
[ { "end_line": 3170, "function_name": "htmlParseScript", "start_line": 3097, "target_file": "/src/libxml2/HTMLparser.c" } ]
Global-buffer-overflow READ 1
libxml2
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/html ================================================================= ==10548==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000000852fa3 at pc 0x000000620822 bp 0x7ffce6d42250 sp 0x7ffce6d42248 READ of size 1 at 0x000000852...
c
1a91392c62e40eaa920b8a406c659da3f1ccf2f5
https://gitlab.gnome.org/GNOME/libxml2/-/commit/8090e5856465c0b8e26e2a080f4b498f37fa83ab
null
arvo:57323
n132/arvo:57323-vul
/src/arrow
[ { "end_line": 700, "function_name": "ValidateRunEndEncoded", "start_line": 641, "target_file": "/src/arrow/cpp/src/arrow/array/validate.cc" } ]
Object-size
arrow
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1787789123 INFO: Loaded 1 modules (352253 inline 8-bit counters): 352253 [0x16a0d70, 0x16f6d6d), INFO: Loaded 1 PC tables (352253 PCs): 352253 [0x16f6d70,0x1c56d40), /out/arrow-ipc-stream-fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc /sr...
cpp
509735ce7076d74e19217e5c4671566e3e4550a3
https://github.com/apache/arrow/commit/0e5af04bc776a852c414bf39f82a77886538e474
null
arvo:57333
n132/arvo:57333-vul
/src/libavc
[ { "end_line": 854, "function_name": "ih264e_encode", "start_line": 203, "target_file": "/src/libavc/encoder/ih264e_encode.c" } ]
Use-of-uninitialized-value
libavc
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1155717500 INFO: Loaded 1 modules (7979 inline 8-bit counters): 7979 [0x805968, 0x807893), INFO: Loaded 1 PC tables (7979 PCs): 7979 [0x78fb58,0x7aee08), /out/avc_enc_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==3317==WARNING: Memor...
cpp
9783b509ac174fb51e510548ba1953e3997f07ab
https://github.com/ittiam-systems/libavc/commit/ba34616a119952074bf32bbb8ae2b93e1d8500c2
The s_inp_buf and s_out_buf structures on the stack in ih264e_encode() can be accessed uninitialized, leading to a security vulnerability due to the use of uninitialized memory.
arvo:57369
n132/arvo:57369-vul
/src/ndpi
[ { "end_line": 1788, "function_name": "ndpi_is_valid_vxlan", "start_line": 1748, "target_file": "/src/ndpi/example/reader_util.c" } ]
Heap-buffer-overflow READ 1
ndpi
asan
================================================================= ==12917==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6040000aec81 at pc 0x0000004f5c6f bp 0x7ffc1dca17b0 sp 0x7ffc1dca17a8 READ of size 1 at 0x6040000aec81 thread T0 SCARINESS: 12 (1-byte-read-heap-buffer-overflow) #0 0x4f5c6e in ndpi_...
c
ddb9aa0f95ba263361b9be2ba0a122ea1e001be9
https://github.com/ntop/nDPI/commit/04a426feef3399a2354b4aa10ee2a28cf107fb45
A heap-buffer-overflow vulnerability exists in the VXLAN de-tunneling logic of ndpiReader. Specifically, the function ndpi_is_valid_vxlan in ndpi/example/reader_util.c can read out of bounds, leading to a 1-byte heap buffer overflow when processing certain packets. This issue is triggered during packet processing in nd...
arvo:5740
n132/arvo:5740-vul
/src/imagemagick
[ { "end_line": 1151, "function_name": "ParseGeometry", "start_line": 839, "target_file": "/src/imagemagick/MagickCore/geometry.c" } ]
Use-of-uninitialized-value
imagemagick
msan
INFO: Seed: 2242967240 INFO: Loaded 1 modules (52467 inline 8-bit counters): 52467 [0x16d5f98, 0x16e2c8b), INFO: Loaded 1 PC tables (52467 PCs): 52467 [0x133b090,0x1407fc0), /out/encoder_miff_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==62778==WARNING: MemorySanitizer: use-of-uninitialized-value ...
cpp
0017e695e6fa71744997e18056ed4e022e0133a8
https://github.com/imagemagick/imagemagick/commit/40c374be9af667f4c284c038ec2a83489b29fb57
A use-of-uninitialized-value vulnerability exists in the ParseGeometry() function.
arvo:57410
n132/arvo:57410-vul
/src/libxml2
[ { "end_line": 1048, "function_name": "xmlDetectEBCDIC", "start_line": 993, "target_file": "/src/libxml2/parserInternals.c" } ]
Use-of-uninitialized-value
libxml2
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2471977415 INFO: Loaded 1 modules (52254 inline 8-bit counters): 52254 [0xcfba47, 0xd08665), INFO: Loaded 1 PC tables (52254 PCs): 52254 [0xbc1830,0xc8da10), /out/valid: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==10552==WARNING: MemorySan...
c
7fbd454d9f70f0f0c0a0c27a7d541fed4d038c2a
https://gitlab.gnome.org/GNOME/libxml2/-/commit/3660229219c12d5a44f8539d25fb5c428480ce3f
A buffer overread occurs in the xmlDetectEBCDIC function in the parser, potentially leading to security issues.
arvo:57426
n132/arvo:57426-vul
/src/serenity
[ { "end_line": 1172, "function_name": "TextDescriptionTagData::from_bytes", "start_line": 1032, "target_file": "/src/serenity/Userland/Libraries/LibGfx/ICC/TagTypes.cpp" } ]
Heap-buffer-overflow READ 1
serenity
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1430027087 INFO: Loaded 1 modules (14795 inline 8-bit counters): 14795 [0x5956e0, 0x5990ab), INFO: Loaded 1 PC tables (14795 PCs): 14795 [0x5990b0,0x5d2d60), /out/FuzzICCProfile: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==================...
cpp
4b995542c4f7ae8f2e71fdf01b346b734b8fcf3a
https://github.com/SerenityOS/serenity/commit/c1d7a51391839e77fce4b466026353acae74ba02
A vulnerability exists in LibGfx/ICC where creating `TextDescriptionTagData` does not validate that the offsets used cannot overflow, which can lead to possible buffer overruns.
arvo:57436
n132/arvo:57436-vul
/src/libxslt
[ { "end_line": 362, "function_name": "xsltCompileAttr", "start_line": 176, "target_file": "/src/libxslt/libxslt/attrvt.c" } ]
Use-of-uninitialized-value
libxslt
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3324577305 INFO: Loaded 1 modules (40224 inline 8-bit counters): 40224 [0xb3e517, 0xb48237), INFO: Loaded 1 PC tables (40224 PCs): 40224 [0xa3f708,0xadc908), /out/xslt: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==17783==WARNING: MemorySani...
c
f80ae929fa9e80d66d4c42108c6fb2456ce14b8b
https://gitlab.gnome.org/GNOME/libxslt.git075b6087785d7ba3dd6904f117ef9d0b9aa36a2b
A use-after-free vulnerability exists in the xsltCompileAttr function due to improper handling of memory allocation failures.
arvo:57448
n132/arvo:57448-vul
/src/ndpi
[ { "end_line": 762, "function_name": "processCertificateElements", "start_line": 363, "target_file": "/src/ndpi/src/lib/protocols/tls.c" } ]
UNKNOWN WRITE
ndpi
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2994405051 INFO: Loaded 1 modules (18570 inline 8-bit counters): 18570 [0xae5640, 0xae9eca), INFO: Loaded 1 PC tables (18570 PCs): 18570 [0xae9ed0,0xb32770), /out/fuzz_tls_certificate: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanit...
c
9ea8a5783950d6697da9a771c62ccc7bec5e682b
https://github.com/ntop/nDPI/commit/6e0cd162254e54ee2ca349455f39786fe039b811
null
arvo:57521
n132/arvo:57521-vul
/src/libxml2
[ { "end_line": 1252, "function_name": "xmlSwitchInputEncoding", "start_line": 1152, "target_file": "/src/libxml2/parserInternals.c" } ]
Use-of-uninitialized-value
libxml2
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2669459328 INFO: Loaded 1 modules (52245 inline 8-bit counters): 52245 [0xcfba49, 0xd0865e), INFO: Loaded 1 PC tables (52245 PCs): 52245 [0xbc1850,0xc8d9a0), /out/html: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==10551==WARNING: MemorySani...
c
1061537efdf3874c91fd50d18f98c4b8a3518e52
https://gitlab.gnome.org/GNOME/libxml2/-/commit/0e42adce77a9c115402d7f24d8d3b0130f841ed1
A vulnerability in the parser allows a buffer overread in htmlParseHTMLAttribute if switching encodings fails. The parser does not halt properly in this scenario, leading to potential security risks.
arvo:57580
n132/arvo:57580-vul
/src/arrow
[ { "end_line": 700, "function_name": "ValidateRunEndEncoded", "start_line": 641, "target_file": "/src/arrow/cpp/src/arrow/array/validate.cc" } ]
UNKNOWN READ
arrow
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 756076147 INFO: Loaded 1 modules (352253 inline 8-bit counters): 352253 [0x16a0d70, 0x16f6d6d), INFO: Loaded 1 PC tables (352253 PCs): 352253 [0x16f6d70,0x1c56d40), /out/arrow-ipc-stream-fuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc Unde...
cpp
509735ce7076d74e19217e5c4671566e3e4550a3
https://github.com/apache/arrow/commit/0e5af04bc776a852c414bf39f82a77886538e474
null
arvo:57586
n132/arvo:57586-vul
/src/libredwg
[ { "end_line": 2922, "function_name": "bit_utf8_to_TU", "start_line": 2840, "target_file": "/src/libredwg/src/bits.c" } ]
Heap-buffer-overflow READ 1
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2200824303 INFO: Loaded 1 modules (568451 inline 8-bit counters): 568451 [0x4a116e0, 0x4a9c363), INFO: Loaded 1 PC tables (568451 PCs): 568451 [0x3ecc9c8,0x47791f8), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
c
5363f2eaaa83a7692652a019e475e9259ce49422
https://github.com/LibreDWG/libredwg/commit/c1ed1d91e28a6ddc7a9b5479d4795d58fb6be0ca
null
arvo:57587
n132/arvo:57587-vul
/src/libredwg
[ { "end_line": 2922, "function_name": "bit_utf8_to_TU", "start_line": 2840, "target_file": "/src/libredwg/src/bits.c" } ]
Heap-buffer-overflow WRITE 2
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3915339386 INFO: Loaded 1 modules (568451 inline 8-bit counters): 568451 [0x4a116e0, 0x4a9c363), INFO: Loaded 1 PC tables (568451 PCs): 568451 [0x3ecc9c8,0x47791f8), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
c
5363f2eaaa83a7692652a019e475e9259ce49422
https://github.com/LibreDWG/libredwg/commit/c1ed1d91e28a6ddc7a9b5479d4795d58fb6be0ca
null
arvo:57589
n132/arvo:57589-vul
/src/libredwg
[ { "end_line": 2922, "function_name": "bit_utf8_to_TU", "start_line": 2840, "target_file": "/src/libredwg/src/bits.c" } ]
Heap-buffer-overflow READ 1
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3080183543 INFO: Loaded 1 modules (568451 inline 8-bit counters): 568451 [0x4a116e0, 0x4a9c363), INFO: Loaded 1 PC tables (568451 PCs): 568451 [0x3ecc9c8,0x47791f8), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
c
5363f2eaaa83a7692652a019e475e9259ce49422
https://github.com/LibreDWG/libredwg/commit/c1ed1d91e28a6ddc7a9b5479d4795d58fb6be0ca
null
arvo:57656
n132/arvo:57656-vul
/src/assimp
[ { "end_line": 111, "function_name": "DefaultIOSystem::Exists", "start_line": 95, "target_file": "/src/assimp/code/Common/DefaultIOSystem.cpp" } ]
Heap-use-after-free READ 8
assimp
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1596618807 INFO: Loaded 1 modules (246732 inline 8-bit counters): 246732 [0x2092020, 0x20ce3ec), INFO: Loaded 1 PC tables (246732 PCs): 246732 [0x20ce3f0,0x24920b0), /out/assimp_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Info, T0: ...
cpp
e86f1acb9b11e317fe81124cbd38972da04f98d7
https://github.com/assimp/assimp/commit/d03ab3ef276e4ee8fe4705100c3d1516eea338fc
null
arvo:57672
n132/arvo:57672-vul
/src/mruby
[ { "end_line": 411, "function_name": "mrb_env_unshare", "start_line": 371, "target_file": "/src/mruby/src/vm.c" } ]
Heap-use-after-free READ 1
mruby
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3394394283 INFO: Loaded 1 modules (23888 inline 8-bit counters): 23888 [0x96ea50, 0x9747a0), INFO: Loaded 1 PC tables (23888 PCs): 23888 [0x83ad98,0x898298), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc line 87:18: warning:...
c
9369679e3656760dd4b281ceed30949db5b1a612
https://github.com/mruby/mruby/commit/93648fc954c0133acc6e89860ba49f78ca60460f
A write barrier bug exists in the mrb_env_unshare function in gc.c.
arvo:57703
n132/arvo:57703-vul
/src/mruby
[ { "end_line": 1251, "function_name": "clear_all_old", "start_line": 1235, "target_file": "/src/mruby/src/gc.c" } ]
Heap-use-after-free READ 4
mruby
asan
INFO: found LLVMFuzzerCustomMutator (0x56efb0). Disabling -len_control by default. INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 565549257 INFO: Loaded 1 modules (28093 inline 8-bit counters): 28093 [0xbb83b8, 0xbbf175), INFO: Loaded 1 PC tables (28093 PCs): 28093 [0xa14308,0xa81ed8), /out/mru...
cpp
0bb08718b8cab3d6c63d5762ab2dca5417ddf17c
https://github.com/mruby/mruby/commit/b47c8b738ae3e400ec02269fae9857222218e9d5
null
arvo:57745
n132/arvo:57745-vul
/src/ghostpdl
[ { "end_line": 642, "function_name": "pdfi_set_blackgeneration", "start_line": 582, "target_file": "/src/ghostpdl/pdf/pdf_gstate.c" } ]
Stack-buffer-overflow WRITE 4
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3301931342 INFO: Loaded 3 modules (188117 inline 8-bit counters): 13708 [0x7f66d9ed89e0, 0x7f66d9edbf6c), 959 [0x7f66d9f39a40, 0x7f66d9f39dff), 173450 [0x3191d60, 0x31bc2ea), INFO: Loaded 3 PC tables (188117 PCs): 13708 [0x7f66d9edbf70,0x7f66d9f1183...
cpp
64175a080a39883a0c2ad1850eb4c9a36a54a319
https://github.com/ArtifexSoftware/ghostpdl/commit/7eced55b5700c0d2aa2e102ed78f10b0ce755a64
null
arvo:57880
n132/arvo:57880-vul
/src/ghostpdl
[ { "end_line": 2870, "function_name": "pdfi_read_cff_font", "start_line": 2234, "target_file": "/src/ghostpdl/pdf/pdf_font1C.c" } ]
UNKNOWN READ
ghostpdl
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2836678821 INFO: Loaded 3 modules (225693 inline 8-bit counters): 13708 [0x7f4a8a6609e0, 0x7f4a8a663f6c), 959 [0x7f4a8a6c1a40, 0x7f4a8a6c1dff), 211026 [0x383a2f0, 0x386db42), INFO: Loaded 3 PC tables (225693 PCs): 13708 [0x7f4a8a663f70,0x7f4a8a69983...
cpp
91943811904f562b101b0ac410da60974b4186f2
https://github.com/ArtifexSoftware/ghostpdl/commit/acaa21f68ede3ae8fca48136fa95ee32de6533b2
A vulnerability exists in GhostPDF where checking the size of a table can result in a 32-bit integer overflow. Specifically, the variable toffs can be set to a value near 2^32-1, and when a valid tlen is added, the sum overflows a 32-bit value. This allows the check intended to ensure the table is entirely contained wi...
arvo:58108
n132/arvo:58108-vul
/src/mosquitto
[ { "end_line": 241, "function_name": "dynsec_clients__config_load", "start_line": 108, "target_file": "/src/mosquitto/plugins/dynamic-security/clients.c" } ]
Heap-use-after-free READ 8
mosquitto
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1989019729 INFO: Loaded 1 modules (12937 inline 8-bit counters): 12937 [0x752d78, 0x756001), INFO: Loaded 1 PC tables (12937 PCs): 12937 [0x756008,0x788898), /out/dynsec_fuzz_load: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
cpp
3c6ad454895f7a07082d44c1241ed3c89c8eaf08
https://github.com/eclipse/mosquitto/commit/56462c122925f716865827cc5505f671c2933aca
null
arvo:5820
n132/arvo:5820-vul
/src/imagemagick
[ { "end_line": 1151, "function_name": "ParseGeometry", "start_line": 839, "target_file": "/src/imagemagick/MagickCore/geometry.c" } ]
Use-of-uninitialized-value
imagemagick
msan
INFO: Seed: 129821402 INFO: Loaded 1 modules (52581 inline 8-bit counters): 52581 [0x16ddfb8, 0x16ead1d), INFO: Loaded 1 PC tables (52581 PCs): 52581 [0x1341690,0x140ece0), /out/encoder_pattern_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==62790==WARNING: MemorySanitizer: use-of-uninitialized-value ...
cpp
9a2799300860f0f690f28433288ff9397539f20a
https://github.com/imagemagick/imagemagick/commit/be70cc9701a19290cb3eaa3fe9f57d192ad4136c
null
arvo:58278
n132/arvo:58278-vul
/src/libavc
[ { "end_line": 489, "function_name": "isvcd_mv_pred_ref_tfr_nby2_epmb", "start_line": 179, "target_file": "/src/libavc/decoder/svc/isvcd_process_epslice.c" } ]
Heap-use-after-free READ 16
libavc
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 541099929 INFO: Loaded 1 modules (16671 inline 8-bit counters): 16671 [0x8a1fd0, 0x8a60ef), INFO: Loaded 1 PC tables (16671 PCs): 16671 [0x804fa8,0x846198), /out/svc_dec_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ===================...
cpp
f8ae418b38e8ac52cf87425d27cb20925607debc
https://github.com/ittiam-systems/libavc/commit/84f955dd77e42ffb57cb05a869cb8c8bf68f1e13
An out of range reference index occurs during base mode flag processing in svcdec.
arvo:58291
n132/arvo:58291-vul
/src/libssh2
[ { "end_line": 618, "function_name": "packet_authagent_open", "start_line": 460, "target_file": "/src/libssh2/src/packet.c" } ]
Heap-buffer-overflow READ 1
libssh2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1179313593 INFO: Loaded 1 modules (4084 inline 8-bit counters): 4084 [0x6d04f0, 0x6d14e4), INFO: Loaded 1 PC tables (4084 PCs): 4084 [0x66ce30,0x67cd70), /out/ssh2_client_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==================...
cpp
a790d3784eca821aeaee0b5db54cbf037780676f
https://github.com/libssh2/libssh2/commit/88a960a86b9ffbabd17a4bbcf767e26514c4678e
null
arvo:58295
n132/arvo:58295-vul
/src/cpython3
[ { "end_line": 2498, "function_name": "tok_get_normal_mode", "start_line": 1633, "target_file": "/src/cpython3/Parser/tokenizer.c" } ]
Heap-buffer-overflow WRITE 1
cpython3
asan
Running LLVMFuzzerInitialize ... continue... ================================================================= ==27956==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62a00000b1f4 at pc 0x000000dad564 bp 0x7ffd8c738650 sp 0x7ffd8c738648 WRITE of size 1 at 0x62a00000b1f4 thread T0 SCARINESS: 31 (1-byte-write...
cpp
2d526cd32fe8b286aae38956648e508070729f8f
https://github.com/python/cpython/commit/5078eedc5b18f0d208af6e30f60b33419132d1b6
An off by 1 error exists in the f string tokenizer, which can lead to incorrect parsing of f-strings.
arvo:58364
n132/arvo:58364-vul
/src/faad2
[ { "end_line": 386, "function_name": "decode_sce_lfe", "start_line": 325, "target_file": "/src/faad2/libfaad/syntax.c" } ]
Index-out-of-bounds
faad2
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2897332323 INFO: Loaded 1 modules (5298 inline 8-bit counters): 5298 [0x5979e0, 0x598e92), INFO: Loaded 1 PC tables (5298 PCs): 5298 [0x544e40,0x559960), /out/fuzz_decode: Running 1 inputs 1 time(s) each. Running: /tmp/poc syntax.c:372:13: runtime ...
c
c4fb9abbba38e6d5a9c8c5f8fc998dc0324ad0d1
https://github.com/knik0/faad2/commit/135b37882f57a4883851ccb5be9363795f10fb9b
An "Index-out-of-bounds" vulnerability exists where, in some cases, the result of the `program_config_element` function is ignored in accordance with 14496-4: 5.6.4.1.2.1.3, which states that program_configuration_element()'s in access units shall be ignored. The only check in that method ensures that the number of cha...
arvo:5843
n132/arvo:5843-vul
/src/librawspeed
[ { "end_line": 142, "function_name": "RawDecoder::decodeUncompressed", "start_line": 57, "target_file": "/src/librawspeed/src/librawspeed/decoders/RawDecoder.cpp" } ]
Use-of-uninitialized-value
librawspeed
msan
INFO: Seed: 2919482628 INFO: Loaded 1 modules (12104 inline 8-bit counters): 12104 [0xc83e20, 0xc86d68), INFO: Loaded 1 PC tables (12104 PCs): 12104 [0xc86d68,0xcb61e8), /out/TiffDecoderFuzzer-PefDecoder: Running 1 inputs 1 time(s) each. Running: /tmp/poc Uninitialized bytes in __msan_check_mem_is_initialized at of...
cpp
6075628a141c7081fb528082d7296bdcec490bab
https://github.com/darktable-org/rawspeed/commit/e542162d9a96ad3bc7c05abace119cbbf2b184bc
The vulnerability exists in PefDecoder within the RawDecoder::decodeUncompressed() function, where exceptions are caught, potentially allowing security issues to go unnoticed.
arvo:58452
n132/arvo:58452-vul
/src/faad2
[ { "end_line": 691, "function_name": "quant_to_spec", "start_line": 553, "target_file": "/src/faad2/libfaad/specrec.c" } ]
Use-of-uninitialized-value
faad2
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3094171661 INFO: Loaded 1 modules (4738 inline 8-bit counters): 4738 [0x6b9446, 0x6ba6c8), INFO: Loaded 1 PC tables (4738 PCs): 4738 [0x660230,0x672a50), /out/fuzz_decode: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==9615==WARNING: MemorySa...
c
d59ee831e1ef2412a9f4f4aae7fe51575a436ebb
https://github.com/knik0/faad2/commit/d7aa650f3c04aa344ab236d784394c8f6d8d59ee
A use-of-uninitialized-value vulnerability exists in the function lt_update_state, where in some cases the variables spec1 and spec2 are only transformed but never filled. This can lead to undefined behavior, especially when handling streams with num_swb == 0, as there is not enough evidence to reject such streams.
arvo:58479
n132/arvo:58479-vul
/src/assimp
[ { "end_line": 313, "function_name": "MDLImporter::SizeCheck", "start_line": 291, "target_file": "/src/assimp/code/AssetLib/MDL/MDLLoader.cpp" } ]
UNKNOWN READ
assimp
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2048142404 INFO: Loaded 1 modules (263682 inline 8-bit counters): 263682 [0x18f5140, 0x1935742), INFO: Loaded 1 PC tables (263682 PCs): 263682 [0x1935748,0x1d3b768), /out/assimp_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Info, T0: ...
cpp
aa5b41446c446bdf2150094f530e50d9091e79be
https://github.com/assimp/assimp/commit/df9c5cdb9f69e88354a78ca1a4667508c1a2a275
A vulnerability exists in Assimp::MDLImporter::InternReadFile_Quake1 that allows an unknown read, potentially leading to undefined behavior or security issues.
arvo:58502
n132/arvo:58502-vul
/src/hdf5
[ { "end_line": 1560, "function_name": "H5O__chunk_deserialize", "start_line": 1199, "target_file": "/src/hdf5/src/H5Ocache.c" } ]
Heap-buffer-overflow READ {*}
hdf5
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2870204512 INFO: Loaded 1 modules (79474 inline 8-bit counters): 79474 [0x11ba440, 0x11cdab2), INFO: Loaded 1 PC tables (79474 PCs): 79474 [0x11cdab8,0x13041d8), /out/h5_extended_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==========...
c
a0340338e53d4b34127a7e5356b28b1640f9414c
https://github.com/HDFGroup/hdf5/commit/07e94155a7d456d663fe19a38851556117b5e315
null
arvo:58577
n132/arvo:58577-vul
/src/mruby
[ { "end_line": 1251, "function_name": "clear_all_old", "start_line": 1235, "target_file": "/src/mruby/src/gc.c" } ]
Heap-use-after-free READ 4
mruby
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2548017922 INFO: Loaded 1 modules (23888 inline 8-bit counters): 23888 [0x96ea50, 0x9747a0), INFO: Loaded 1 PC tables (23888 PCs): 23888 [0x83ad98,0x898298), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc to_f ! succ! strip t...
c
0bb08718b8cab3d6c63d5762ab2dca5417ddf17c
https://github.com/mruby/mruby/commit/b47c8b738ae3e400ec02269fae9857222218e9d5
null
arvo:58660
n132/arvo:58660-vul
/src/harfbuzz
[ { "end_line": 1060, "function_name": "hb_subset_plan_t::hb_subset_plan_t", "start_line": 949, "target_file": "/src/harfbuzz/src/hb-subset-plan.cc" } ]
UNKNOWN WRITE
harfbuzz
asan
AddressSanitizer:DEADLYSIGNAL ================================================================= ==851==ERROR: AddressSanitizer: SEGV on unknown address 0x62180000517f (pc 0x000000d8ff24 bp 0x7ffcbaa2dee0 sp 0x7ffcbaa2dca0 T0) ==851==The signal is caused by a WRITE memory access. SCARINESS: 30 (wild-addr-write) #0 0...
cpp
5f5660fc5d80a0ce84066206e8e9bad6e20a24d4
https://github.com/harfbuzz/harfbuzz/commit/cda646a598207642721b753ef5abcebb2525f61b
null
arvo:58663
n132/arvo:58663-vul
/src/harfbuzz
[ { "end_line": 1060, "function_name": "hb_subset_plan_t::hb_subset_plan_t", "start_line": 949, "target_file": "/src/harfbuzz/src/hb-subset-plan.cc" } ]
UNKNOWN WRITE
harfbuzz
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3508568606 INFO: Loaded 1 modules (94904 inline 8-bit counters): 94904 [0xebad70, 0xed2028), INFO: Loaded 1 PC tables (94904 PCs): 94904 [0xed2028,0x1044ba8), /out/hb-subset-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitize...
cpp
5f5660fc5d80a0ce84066206e8e9bad6e20a24d4
https://github.com/harfbuzz/harfbuzz/commit/cda646a598207642721b753ef5abcebb2525f61b
null
arvo:58671
n132/arvo:58671-vul
/src/harfbuzz
[ { "end_line": 1060, "function_name": "hb_subset_plan_t::hb_subset_plan_t", "start_line": 949, "target_file": "/src/harfbuzz/src/hb-subset-plan.cc" } ]
UNKNOWN WRITE
harfbuzz
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 4220592216 INFO: Loaded 1 modules (94904 inline 8-bit counters): 94904 [0xebad70, 0xed2028), INFO: Loaded 1 PC tables (94904 PCs): 94904 [0xed2028,0x1044ba8), /out/hb-subset-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitize...
cpp
5f5660fc5d80a0ce84066206e8e9bad6e20a24d4
https://github.com/harfbuzz/harfbuzz/commit/cda646a598207642721b753ef5abcebb2525f61b
null
arvo:58723
n132/arvo:58723-vul
/src/mruby
[ { "end_line": 1251, "function_name": "clear_all_old", "start_line": 1235, "target_file": "/src/mruby/src/gc.c" } ]
Heap-use-after-free READ 1
mruby
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 47706760 INFO: Loaded 1 modules (23888 inline 8-bit counters): 23888 [0x96ea50, 0x9747a0), INFO: Loaded 1 PC tables (23888 PCs): 23888 [0x83ad98,0x898298), /out/mruby_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc [:"(", :"$", :";", :"=...
c
0bb08718b8cab3d6c63d5762ab2dca5417ddf17c
https://github.com/mruby/mruby/commit/b47c8b738ae3e400ec02269fae9857222218e9d5
null
arvo:5873
n132/arvo:5873-vul
/src/bloaty
[ { "end_line": 98, "function_name": "DisassembleFindReferences", "start_line": 48, "target_file": "/src/bloaty/src/disassemble.cc" } ]
Heap-buffer-overflow READ 4
bloaty
asan
INFO: Seed: 1554002161 INFO: Loaded 1 modules (86342 inline 8-bit counters): 86342 [0x169f410, 0x16b4556), INFO: Loaded 1 PC tables (86342 PCs): 86342 [0x11acdb0,0x12fe210), /out/fuzz_target: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==621==...
cpp
a950a61921c3aaaf31e27fad1727a1ddf528df1e
https://github.com/google/bloaty/commit/18384d6c6cbb666d08d08c0dabc4a0d1b7623f6f
null
arvo:58779
n132/arvo:58779-vul
/src/glog
[ { "end_line": 625, "function_name": "ParseNumber", "start_line": 589, "target_file": "/src/glog/src/demangle.cc" } ]
UNKNOWN READ
glog
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3379225824 INFO: Loaded 1 modules (1149 inline 8-bit counters): 1149 [0x6b3a38, 0x6b3eb5), INFO: Loaded 1 PC tables (1149 PCs): 1149 [0x6b3eb8,0x6b8688), /out/fuzz_demangle: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:DEADLY...
cpp
27bf2b2fd396dae160b0449224bc227eb3edbc31
https://github.com/google/glog/commit/7ba2f7bc02cdbab9314f3804c698ec78e20c441e
null
arvo:5878
n132/arvo:5878-vul
/src/openthread
[ { "end_line": 586, "function_name": "Leader::RlocLookup", "start_line": 433, "target_file": "/src/openthread/src/core/thread/network_data_leader_ftd.cpp" } ]
Stack-buffer-overflow READ 2
openthread
asan
INFO: Seed: 3453912439 INFO: Loaded 1 modules (12488 inline 8-bit counters): 12488 [0xa1a9f0, 0xa1dab8), INFO: Loaded 1 PC tables (12488 PCs): 12488 [0x763370,0x793ff0), /out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==15914...
cpp
d0c983f0a4c845cfbbf2808b4e2f7b8a1433af41
https://github.com/openthread/openthread/commit/9ec07205cc17c2de80b06a8b1e181abde4fdbb1e
null
arvo:58832
n132/arvo:58832-vul
/src/wireshark
[ { "end_line": 995, "function_name": "dissect_le_credit_based_connrequest", "start_line": 817, "target_file": "/src/wireshark/epan/dissectors/packet-btl2cap.c" } ]
UNKNOWN READ
wireshark
asan
oss-fuzzshark: disabling: ip oss-fuzzshark: disabling: udplite oss-fuzzshark: disabling: ospf oss-fuzzshark: disabling: bgp oss-fuzzshark: disabling: dhcp oss-fuzzshark: disabling: json oss-fuzzshark: disabling: snort oss-fuzzshark: configured for dissector: udp in table: ip.proto INFO: Running with entropic power sche...
c
1b243050c33e7077f7faf5fd56eb26ecdbb19704
https://github.com/wireshark/wireshark/commit/ba1084daac619e9f342c9b27fa40650fb6ea0c09
A crash occurs in epan/dissectors/packet-btl2cap.c at line 2929 due to keys added to wmem_tree not having exactly the same length.
arvo:58932
n132/arvo:58932-vul
/src/opensc
[ { "end_line": 81, "function_name": "cflex_delete_file", "start_line": 51, "target_file": "/src/opensc/src/pkcs15init/pkcs15-cflex.c" } ]
Stack-buffer-overflow READ 1
opensc
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_pkcs15init ================================================================= ==42091==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fc42912d160 at pc 0x00000054b4fa bp 0x7ffc25874960 sp 0x7ffc25874958 READ of size 1 at 0...
c
6226a625c35923a911d26eacb2b904901bfe24ce
https://github.com/OpenSC/OpenSC/commit/c449a181a6988cc1e8dc8764d23574e48cdc3fa6
A vulnerability exists in pkcs15-cflex where the path length is not checked, which can lead to an underflow.
arvo:59056
n132/arvo:59056-vul
/src/assimp
[ { "end_line": 220, "function_name": "Scope::Scope", "start_line": 179, "target_file": "/src/assimp/code/AssetLib/FBX/FBXParser.cpp" } ]
Invalid-free
assimp
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2856227050 INFO: Loaded 1 modules (243524 inline 8-bit counters): 243524 [0x20856f0, 0x20c0e34), INFO: Loaded 1 PC tables (243524 PCs): 243524 [0x20c0e38,0x2478278), /out/assimp_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc Info, T0: ...
cpp
3a02de4d280d282b31d0a05e54b7ed9b4014a476
https://github.com/assimp/assimp/commit/5c45cdc0adb50e3b169cada0ea5ce0126d04184a
An invalid-free vulnerability exists in Assimp::FBX::Scope::Scope.
arvo:59072
n132/arvo:59072-vul
/src/php-src
[ { "end_line": 2087, "function_name": "concat_function", "start_line": 1940, "target_file": "/src/php-src/Zend/zend_operators.c" } ]
Heap-use-after-free READ 4
php-src
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1756986809 INFO: Loaded 1 modules (147388 inline 8-bit counters): 147388 [0x1b66120, 0x1b8a0dc), INFO: Loaded 1 PC tables (147388 PCs): 147388 [0x1b8a0e0,0x1dc9ca0), /out/php-fuzz-execute: Running 1 inputs 1 time(s) each. Running: /tmp/poc ========...
cpp
5c741644d177d521e35168c63891cb43e018f65b
https://github.com/php/php-src/commit/7790ee8736a316f037c18c436d7d2d7a1118abaf
A use-after-free vulnerability exists in concat_function, which occurs when an out-of-memory error is triggered.
arvo:59148
n132/arvo:59148-vul
/src/binutils-gdb
[ { "end_line": 1471, "function_name": "_bfd_stab_section_find_nearest_line", "start_line": 944, "target_file": "/src/binutils-gdb/bfd/syms.c" } ]
Heap-buffer-overflow READ 1
binutils-gdb
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/fuzz_addr2line BFD: /tmp/libfuzzer.83761: unrecognized storage class 32 for *UND* symbol ` ' BFD: /tmp/libfuzzer.83761: warning: line number table read failed /tmp/libfuzzer.83761: /tmp/libfuzzer.83761: file truncated ??:0 ??:0 =====...
cpp
cb3f0ff4795381fb19e128a85e258149ebed9cd6
https://github.com/bminor/binutils-gdb/commit/0bbd2b1ad0426aee86445cd7f0c86667624da7ca
A vulnerability exists in syms.c within the _bfd_stab_section_find_nearest_line function, where the reloc address sanity check calculation can overflow due to an incomplete fix. The stabsize variable is a non-zero multiple of 12, so stabsize - 4 cannot underflow. This issue can lead to segmentation faults.
arvo:59167
n132/arvo:59167-vul
/src/wireshark
[ { "end_line": 1094, "function_name": "fragment_reassembled_single", "start_line": 1063, "target_file": "/src/wireshark/epan/reassemble.c" } ]
Heap-use-after-free READ 6
wireshark
asan
oss-fuzzshark: disabling: ip oss-fuzzshark: disabling: udplite oss-fuzzshark: disabling: ospf oss-fuzzshark: disabling: bgp oss-fuzzshark: disabling: dhcp oss-fuzzshark: disabling: json oss-fuzzshark: disabling: snort oss-fuzzshark: configured for dissector: udp in table: ip.proto INFO: Running with entropic power sche...
cpp
512557a3284354c188b43feeb044161fc9e9ba8f
https://github.com/wireshark/wireshark/commit/285a4cb39eb3d066103ba4a8976ca46b2ea41bc2
null
arvo:59173
n132/arvo:59173-vul
/src/wireshark
[ { "end_line": 1094, "function_name": "fragment_reassembled_single", "start_line": 1063, "target_file": "/src/wireshark/epan/reassemble.c" } ]
Heap-use-after-free READ 6
wireshark
asan
oss-fuzzshark: disabling: udp oss-fuzzshark: disabling: udplite oss-fuzzshark: disabling: ospf oss-fuzzshark: disabling: bgp oss-fuzzshark: disabling: dhcp oss-fuzzshark: disabling: json oss-fuzzshark: disabling: snort oss-fuzzshark: configured for dissector: ip INFO: Running with entropic power schedule (0xFF, 100). I...
cpp
512557a3284354c188b43feeb044161fc9e9ba8f
https://github.com/wireshark/wireshark/commit/285a4cb39eb3d066103ba4a8976ca46b2ea41bc2
null
arvo:5935
n132/arvo:5935-vul
/src/openthread
[ { "end_line": 888, "function_name": "Leader::AddService", "start_line": 859, "target_file": "/src/openthread/src/core/thread/network_data_leader_ftd.cpp" } ]
Stack-buffer-overflow READ 1
openthread
asan
INFO: Seed: 2459268482 INFO: Loaded 1 modules (12490 inline 8-bit counters): 12490 [0xa1a9f0, 0xa1daba), INFO: Loaded 1 PC tables (12490 PCs): 12490 [0x7633b0,0x794050), /out/ip6-send-fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================================================================= ==15972...
cpp
cc8579fb3f99130f2ce2b1aaf5c1821218b821c0
https://github.com/openthread/openthread/commit/56bf6a79f773419d21e0426915c7b3a3951d1bdf
null
arvo:59390
n132/arvo:59390-vul
/src/mupdf
[ { "end_line": 1347, "function_name": "fz_load_bmp_subimage_count", "start_line": 1306, "target_file": "/src/mupdf/source/fitz/load-bmp.c" } ]
Use-of-uninitialized-value
mupdf
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1688678494 INFO: Loaded 1 modules (160615 inline 8-bit counters): 160615 [0x4268ac1, 0x428fe28), INFO: Loaded 1 PC tables (160615 PCs): 160615 [0x1f2cde0,0x21a0450), /out/pdf_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==910==WARNING...
cpp
57f42f35b5366a5bfa653550f511a1d0a4ba5567
https://github.com/ArtifexSoftware/mupdf/commit/3f3de914a38ef440cf99c4b0c6f0f043c5fdffbe
A vulnerability exists in the BMP array header parsing code where the remaining data size is not checked before parsing in the relevant function. This can lead to out-of-bounds reads or crashes when handling malformed BMP files.
arvo:59428
n132/arvo:59428-vul
/src/libredwg
[ { "end_line": 12130, "function_name": "dxf_blocks_read", "start_line": 11944, "target_file": "/src/libredwg/src/in_dxf.c" } ]
Heap-double-free
libredwg
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1866503614 INFO: Loaded 1 modules (646709 inline 8-bit counters): 646709 [0x529efa0, 0x533cdd5), INFO: Loaded 1 PC tables (646709 PCs): 646709 [0x4615c58,0x4ff3fa8), /out/llvmfuzz: Running 1 inputs 1 time(s) each. Running: /tmp/poc ================...
c
3a37ad736c87393c9f88396f03f0ba69a54fcf9b
https://github.com/LibreDWG/libredwg/commit/b031cfed70f6a9578326cc6b4a07d173eeb1d30d
A double-free vulnerability exists in indxf when handling INVALIDDWG cases. If dxfname is allocated and an import error occurs later, the memory may be freed twice.
arvo:59438
n132/arvo:59438-vul
/src/file
[ { "end_line": 145, "function_name": "simh_parse", "start_line": 109, "target_file": "/src/file/src/is_simh.c" } ]
Use-after-poison READ 4
file
asan
Running LLVMFuzzerInitialize ... continue... ================================================================= ==10957==ERROR: AddressSanitizer: use-after-poison on address 0x7f06884e8803 at pc 0x000000524e3f bp 0x7ffcb9666420 sp 0x7ffcb9666418 READ of size 4 at 0x7f06884e8803 thread T0 SCARINESS: 27 (4-byte-read-use-a...
cpp
010240c20874aa8bebff72645893d64d95de439c
https://github.com/file/file/commit/c7eddddfd5d99821ea52e52e24468b43282c8f90
null
arvo:59457
n132/arvo:59457-vul
/src/openexr
[ { "end_line": 754, "function_name": "LossyDctDecoder_execute", "start_line": 218, "target_file": "/src/openexr/src/lib/OpenEXRCore/internal_dwa_decoder.h" } ]
Heap-buffer-overflow READ 2
openexr
asan
================================================================= ==1502==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x606000000120 at pc 0x000000969718 bp 0x7fffe8e82bd0 sp 0x7fffe8e82bc8 READ of size 2 at 0x606000000120 thread T0 SCARINESS: 14 (2-byte-read-heap-buffer-overflow) #0 0x969717 in LossyD...
cpp
83c57cb4b99e7755dce10262bbb584077a93c2e4
https://github.com/AcademySoftwareFoundation/openexr/commit/54dd0411dd9670cc9ff0daf54d19ad277524a7b9
A corrupt number of DC components stored in the dwa subheader causes a cascade of errors, resulting in out of bounds access. The vulnerability arises from not properly tracking how many DC components have been read and failing to detect when the count is exceeded.
arvo:59532
n132/arvo:59532-vul
/src/lldpd
[ { "end_line": 1339, "function_name": "lldp_decode", "start_line": 593, "target_file": "/src/lldpd/src/daemon/protocols/lldp.c" } ]
Use-of-uninitialized-value
lldpd
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3360325583 INFO: Loaded 1 modules (7662 inline 8-bit counters): 7662 [0x55cd77d74529, 0x55cd77d76317), INFO: Loaded 1 PC tables (7662 PCs): 7662 [0x55cd77d76318,0x55cd77d941f8), /out/fuzz_lldp: Running 1 inputs 1 time(s) each. Running: /tmp/poc ==2...
c
5cf30bef31fc4ece2dc687f6945750d05cebf74e
https://github.com/lldpd/lldpd/commit/83f0eddcfb7fb1d0a825136e3929f8847cd85a62
null
arvo:59543
n132/arvo:59543-vul
/src/libavc
[ { "end_line": 2650, "function_name": "ih264e_process_thread", "start_line": 2520, "target_file": "/src/libavc/encoder/ih264e_process.c" } ]
UNKNOWN READ
libavc
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2598502393 INFO: Loaded 1 modules (8016 inline 8-bit counters): 8016 [0x76fc00, 0x771b50), INFO: Loaded 1 PC tables (8016 PCs): 8016 [0x6f7520,0x716a20), /out/avc_enc_fuzzer: Running 1 inputs 1 time(s) each. Running: /tmp/poc AddressSanitizer:DEADL...
cpp
a75597f2402949d941bdabfd3c52ee8dee4b6a4d
https://github.com/ittiam-systems/libavc/commit/30858f49ad57b9a888e6768b0ae1558e5f895176
A vulnerability exists in libavcenc where, if entropy encoding encounters an error, the rate control (rc) module updates and resets the bitstream context at the end of each row. When rc decides to skip a frame due to vbv overflow, the context is reset and the frame is marked for skip. However, other threads remain unaw...
arvo:59631
n132/arvo:59631-vul
/src/PcapPlusPlus
[ { "end_line": 118, "function_name": "assign", "start_line": 115, "target_file": "/src/PcapPlusPlus/Packet++/header/NflogLayer.h" } ]
UNKNOWN READ
PcapPlusPlus
msan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2962954187 INFO: Loaded 1 modules (27421 inline 8-bit counters): 27421 [0xc0f888, 0xc163a5), INFO: Loaded 1 PC tables (27421 PCs): 27421 [0xc163a8,0xc81578), /out/FuzzTarget: Running 1 inputs 1 time(s) each. Running: /tmp/poc MemorySanitizer:DEADLY...
cpp
843765f594a3d0c494c2c64e5c2b786f02122ccc
https://github.com/seladb/PcapPlusPlus/commit/6986e81f6fa441a56c4effe2bf2f177ca892255e
null
arvo:59650
n132/arvo:59650-vul
/src/PcapPlusPlus
[ { "end_line": 304, "function_name": "getNextTLVRecord", "start_line": 284, "target_file": "/src/PcapPlusPlus/Packet++/header/TLVData.h" } ]
Heap-buffer-overflow READ 4
PcapPlusPlus
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1477831293 INFO: Loaded 1 modules (35878 inline 8-bit counters): 35878 [0xab28e8, 0xabb50e), INFO: Loaded 1 PC tables (35878 PCs): 35878 [0xabb510,0xb47770), /out/FuzzTarget: Running 1 inputs 1 time(s) each. Running: /tmp/poc ======================...
cpp
59bb2d12ec7e0b90b6fc4746da0a44f4dc64825b
https://github.com/seladb/PcapPlusPlus/commit/0725fa175ab2a7cb78a6c48d3b4d113eb7221810
A heap-buffer-overflow (read) vulnerability exists in the TcpLayer::isDataValid function.
arvo:59701
n132/arvo:59701-vul
/src/libxml2
[ { "end_line": 577, "function_name": "xmlParserGrow", "start_line": 536, "target_file": "/src/libxml2/parserInternals.c" } ]
Global-buffer-overflow READ 1
libxml2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 3545818354 INFO: Loaded 1 modules (51774 inline 8-bit counters): 51774 [0x873c510, 0x8748f4e), INFO: Loaded 1 PC tables (51774 PCs): 51774 [0x862e41c,0x869360c), /out/xml: Running 1 inputs 1 time(s) each. Running: /tmp/poc =========================...
c
20f5c73457df065df21bf25aa081a0a4cd028046
https://gitlab.gnome.org/GNOME/libxml2/-/commit/b236b7a588ac2973a057ec578011cdc17c26f16d
null
arvo:59706
n132/arvo:59706-vul
/src/libxml2
[ { "end_line": 577, "function_name": "xmlParserGrow", "start_line": 536, "target_file": "/src/libxml2/parserInternals.c" } ]
Global-buffer-overflow READ {*}
libxml2
asan
Accepting input from '/tmp/poc' Usage for fuzzing: honggfuzz -P [flags] -- /out/xslt ================================================================= ==18177==ERROR: AddressSanitizer: global-buffer-overflow on address 0x00000077c560 at pc 0x00000049efc1 bp 0x7ffc1428f140 sp 0x7ffc1428e910 READ of size 3467 at 0x000000...
c
20f5c73457df065df21bf25aa081a0a4cd028046
https://gitlab.gnome.org/GNOME/libxml2/-/commit/b236b7a588ac2973a057ec578011cdc17c26f16d
null
arvo:59718
n132/arvo:59718-vul
/src/libxml2
[ { "end_line": 577, "function_name": "xmlParserGrow", "start_line": 536, "target_file": "/src/libxml2/parserInternals.c" } ]
Global-buffer-overflow READ 1
libxml2
asan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1789841797 INFO: Loaded 1 modules (51765 inline 8-bit counters): 51765 [0x873c520, 0x8748f55), INFO: Loaded 1 PC tables (51765 PCs): 51765 [0x862e43c,0x86935e4), /out/html: Running 1 inputs 1 time(s) each. Running: /tmp/poc ========================...
c
20f5c73457df065df21bf25aa081a0a4cd028046
https://gitlab.gnome.org/GNOME/libxml2/-/commit/b236b7a588ac2973a057ec578011cdc17c26f16d
null
arvo:59809
n132/arvo:59809-vul
/src/PcapPlusPlus
[ { "end_line": 273, "function_name": "getFirstTLVRecord", "start_line": 260, "target_file": "/src/PcapPlusPlus/Packet++/header/TLVData.h" } ]
UNKNOWN READ
PcapPlusPlus
ubsan
INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 795403120 INFO: Loaded 1 modules (43903 inline 8-bit counters): 43903 [0x908f88, 0x913b07), INFO: Loaded 1 PC tables (43903 PCs): 43903 [0x913b08,0x9bf2f8), /out/FuzzTarget: Running 1 inputs 1 time(s) each. Running: /tmp/poc UndefinedBehaviorSaniti...
cpp
65974d73c33aaede1bf3c18a353ea2209d1912a0
https://github.com/seladb/PcapPlusPlus/commit/59bb2d12ec7e0b90b6fc4746da0a44f4dc64825b
null