Feat: add 7 instances for yara running in Ubuntu 24.04

#3
projects/yara/arvo_11945/crash.log ADDED
@@ -0,0 +1,70 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ INFO: Seed: 171125022
2
+ INFO: Loaded 1 modules (7670 inline 8-bit counters): 7670 [0x9e1c88, 0x9e3a7e),
3
+ INFO: Loaded 1 PC tables (7670 PCs): 7670 [0x744700,0x762660),
4
+ /out/dotnet_fuzzer: Running 1 inputs 1 time(s) each.
5
+ Running: /tmp/poc
6
+ =================================================================
7
+ ==18687==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000000e80 at pc 0x00000057a194 bp 0x7ffc0b208d90 sp 0x7ffc0b208d88
8
+ READ of size 1 at 0x619000000e80 thread T0
9
+ SCARINESS: 12 (1-byte-read-heap-buffer-overflow)
10
+ #0 0x57a193 in dotnet_parse_us /src/yara/libyara/modules/dotnet.c:213:51
11
+ #1 0x581d98 in dotnet_parse_com /src/yara/libyara/modules/dotnet.c:1599:5
12
+ #2 0x5835f5 in dotnet__load /src/yara/libyara/modules/dotnet.c:1716:9
13
+ #3 0x5415a8 in yr_modules_load /src/yara/libyara/modules.c:175:16
14
+ #4 0x5adbb2 in yr_execute_code /src/yara/libyara/exec.c:962:18
15
+ #5 0x54b4ee in yr_scanner_scan_mem_blocks /src/yara/libyara/scanner.c:435:3
16
+ #6 0x547e23 in yr_rules_scan_mem_blocks /src/yara/libyara/rules.c:217:12
17
+ #7 0x548082 in yr_rules_scan_mem /src/yara/libyara/rules.c:267:10
18
+ #8 0x530cd2 in LLVMFuzzerTestOneInput /src/yara/tests/oss-fuzz/dotnet_fuzzer.cc:74:3
19
+ #9 0x60f225 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:571:15
20
+ #10 0x5e4a4d in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
21
+ #11 0x5f0296 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:713:9
22
+ #12 0x5e40cc in main /src/libfuzzer/FuzzerMain.cpp:20:10
23
+ #13 0x7a490853083f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
24
+ #14 0x41d228 in _start (/out/dotnet_fuzzer+0x41d228)
25
+
26
+ DEDUP_TOKEN: dotnet_parse_us--dotnet_parse_com--dotnet__load
27
+ 0x619000000e80 is located 0 bytes to the right of 1024-byte region [0x619000000a80,0x619000000e80)
28
+ allocated by thread T0 here:
29
+ #0 0x52c788 in operator new[](unsigned long) /src/llvm/projects/compiler-rt/lib/asan/asan_new_delete.cc:109
30
+ #1 0x60efd7 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:558:23
31
+ #2 0x5e4a4d in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
32
+ #3 0x5f0296 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:713:9
33
+ #4 0x5e40cc in main /src/libfuzzer/FuzzerMain.cpp:20:10
34
+ #5 0x7a490853083f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
35
+
36
+ DEDUP_TOKEN: operator new[](unsigned long)--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)
37
+ SUMMARY: AddressSanitizer: heap-buffer-overflow /src/yara/libyara/modules/dotnet.c:213:51 in dotnet_parse_us
38
+ Shadow bytes around the buggy address:
39
+ 0x0c327fff8180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
40
+ 0x0c327fff8190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
41
+ 0x0c327fff81a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
42
+ 0x0c327fff81b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
43
+ 0x0c327fff81c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
44
+ =>0x0c327fff81d0:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
45
+ 0x0c327fff81e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
46
+ 0x0c327fff81f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
47
+ 0x0c327fff8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
48
+ 0x0c327fff8210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
49
+ 0x0c327fff8220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
50
+ Shadow byte legend (one shadow byte represents 8 application bytes):
51
+ Addressable: 00
52
+ Partially addressable: 01 02 03 04 05 06 07
53
+ Heap left redzone: fa
54
+ Freed heap region: fd
55
+ Stack left redzone: f1
56
+ Stack mid redzone: f2
57
+ Stack right redzone: f3
58
+ Stack after return: f5
59
+ Stack use after scope: f8
60
+ Global redzone: f9
61
+ Global init order: f6
62
+ Poisoned by user: f7
63
+ Container overflow: fc
64
+ Array cookie: ac
65
+ Intra object redzone: bb
66
+ ASan internal: fe
67
+ Left alloca redzone: ca
68
+ Right alloca redzone: cb
69
+ Shadow gap: cc
70
+ ==18687==ABORTING
projects/yara/arvo_11945/poc.bin ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e0ec1f58fe1a1f37142e537aa2afd2f89bf3b9fc3fd6508ccbb1243e44f2ddd7
3
+ size 1024
projects/yara/arvo_11945/src.tgz ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:70c9daac8338d65939d6b5bb090ba0a139e41c8c30eac8b02058bceb13a9cb4d
3
+ size 743560
projects/yara/arvo_13956/crash.log ADDED
@@ -0,0 +1,70 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ INFO: Seed: 534748400
2
+ INFO: Loaded 1 modules (8140 inline 8-bit counters): 8140 [0x9af190, 0x9b115c),
3
+ INFO: Loaded 1 PC tables (8140 PCs): 8140 [0x70b0b0,0x72ad70),
4
+ /out/elf_fuzzer: Running 1 inputs 1 time(s) each.
5
+ Running: /tmp/poc
6
+ =================================================================
7
+ ==18683==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d000000332 at pc 0x00000052a44f bp 0x7fff5812d900 sp 0x7fff5812d8f8
8
+ READ of size 1 at 0x60d000000332 thread T0
9
+ SCARINESS: 12 (1-byte-read-heap-buffer-overflow)
10
+ #0 0x52a44e in str_table_entry /src/yara/libyara/modules/elf.c:92:7
11
+ #1 0x52fa7a in parse_elf_header_64_be /src/yara/libyara/modules/elf.c:411:1
12
+ #2 0x533afd in elf__load /src/yara/libyara/modules/elf.c:767:13
13
+ #3 0x505334 in yr_modules_load /src/yara/libyara/modules.c:175:16
14
+ #4 0x572a95 in yr_execute_code /src/yara/libyara/exec.c:973:18
15
+ #5 0x50f178 in yr_scanner_scan_mem_blocks /src/yara/libyara/scanner.c:435:3
16
+ #6 0x50bba3 in yr_rules_scan_mem_blocks /src/yara/libyara/rules.c:217:12
17
+ #7 0x50be02 in yr_rules_scan_mem /src/yara/libyara/rules.c:267:10
18
+ #8 0x4f4862 in LLVMFuzzerTestOneInput /src/yara/tests/oss-fuzz/elf_fuzzer.cc:69:3
19
+ #9 0x5ea061 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:529:15
20
+ #10 0x5a999f in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:286:6
21
+ #11 0x5b5673 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:715:9
22
+ #12 0x5a8ff7 in main /src/libfuzzer/FuzzerMain.cpp:19:10
23
+ #13 0x7949256dc83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
24
+ #14 0x41db68 in _start (/out/elf_fuzzer+0x41db68)
25
+
26
+ DEDUP_TOKEN: str_table_entry--parse_elf_header_64_be--elf__load
27
+ 0x60d000000332 is located 0 bytes to the right of 130-byte region [0x60d0000002b0,0x60d000000332)
28
+ allocated by thread T0 here:
29
+ #0 0x4f1348 in operator new[](unsigned long) /src/llvm/projects/compiler-rt/lib/asan/asan_new_delete.cc:108
30
+ #1 0x5e9e5c in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:516:23
31
+ #2 0x5a999f in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:286:6
32
+ #3 0x5b5673 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:715:9
33
+ #4 0x5a8ff7 in main /src/libfuzzer/FuzzerMain.cpp:19:10
34
+ #5 0x7949256dc83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
35
+
36
+ DEDUP_TOKEN: operator new[](unsigned long)--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)
37
+ SUMMARY: AddressSanitizer: heap-buffer-overflow /src/yara/libyara/modules/elf.c:92:7 in str_table_entry
38
+ Shadow bytes around the buggy address:
39
+ 0x0c1a7fff8010: 00 00 00 00 00 00 00 00 00 00 fa fa fa fa fa fa
40
+ 0x0c1a7fff8020: fa fa fd fd fd fd fd fd fd fd fd fd fd fd fd fd
41
+ 0x0c1a7fff8030: fd fd fd fa fa fa fa fa fa fa fa fa 00 00 00 00
42
+ 0x0c1a7fff8040: 00 00 00 00 00 00 00 00 00 00 00 00 02 fa fa fa
43
+ 0x0c1a7fff8050: fa fa fa fa fa fa 00 00 00 00 00 00 00 00 00 00
44
+ =>0x0c1a7fff8060: 00 00 00 00 00 00[02]fa fa fa fa fa fa fa fa fa
45
+ 0x0c1a7fff8070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
46
+ 0x0c1a7fff8080: 00 fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
47
+ 0x0c1a7fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
48
+ 0x0c1a7fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
49
+ 0x0c1a7fff80b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
50
+ Shadow byte legend (one shadow byte represents 8 application bytes):
51
+ Addressable: 00
52
+ Partially addressable: 01 02 03 04 05 06 07
53
+ Heap left redzone: fa
54
+ Freed heap region: fd
55
+ Stack left redzone: f1
56
+ Stack mid redzone: f2
57
+ Stack right redzone: f3
58
+ Stack after return: f5
59
+ Stack use after scope: f8
60
+ Global redzone: f9
61
+ Global init order: f6
62
+ Poisoned by user: f7
63
+ Container overflow: fc
64
+ Array cookie: ac
65
+ Intra object redzone: bb
66
+ ASan internal: fe
67
+ Left alloca redzone: ca
68
+ Right alloca redzone: cb
69
+ Shadow gap: cc
70
+ ==18683==ABORTING
projects/yara/arvo_13956/poc.bin ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:115056e8b50fd05933024dd335c035f7887d4af1f850c7f47e1dbccdfc4e0ddb
3
+ size 130
projects/yara/arvo_13956/src.tgz ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:fd7658cbf7ba4e2ef7d582f0073e3c77200620c862e977dabe22664adf53d77b
3
+ size 749786
projects/yara/arvo_14560/crash.log ADDED
@@ -0,0 +1,72 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ INFO: Seed: 1323430101
2
+ INFO: Loaded 1 modules (8139 inline 8-bit counters): 8139 [0x8f92b0, 0x8fb27b),
3
+ INFO: Loaded 1 PC tables (8139 PCs): 8139 [0x6703b8,0x690068),
4
+ /out/dotnet_fuzzer: Running 1 inputs 1 time(s) each.
5
+ Running: /tmp/poc
6
+ =================================================================
7
+ ==18683==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000000e0b at pc 0x000000530cba bp 0x7ffe7017ac50 sp 0x7ffe7017a418
8
+ READ of size 32 at 0x619000000e0b thread T0
9
+ SCARINESS: 26 (multi-byte-read-heap-buffer-overflow)
10
+ #0 0x530cb9 in __asan_memcpy /src/llvm/projects/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cc:22:3
11
+ #1 0x575df0 in yr_object_set_string /src/yara/libyara/object.c:1094:5
12
+ #2 0x5ac8cc in dotnet_parse_us /src/yara/libyara/modules/dotnet.c:238:7
13
+ #3 0x5b4745 in dotnet_parse_com /src/yara/libyara/modules/dotnet.c:1606:5
14
+ #4 0x5b5fe5 in dotnet__load /src/yara/libyara/modules/dotnet.c:1723:9
15
+ #5 0x573cff in yr_modules_load /src/yara/libyara/modules.c:179:16
16
+ #6 0x5e13d9 in yr_execute_code /src/yara/libyara/exec.c:1004:18
17
+ #7 0x57dc66 in yr_scanner_scan_mem_blocks /src/yara/libyara/scanner.c:439:3
18
+ #8 0x57a5d3 in yr_rules_scan_mem_blocks /src/yara/libyara/rules.c:217:12
19
+ #9 0x57a832 in yr_rules_scan_mem /src/yara/libyara/rules.c:267:10
20
+ #10 0x563212 in LLVMFuzzerTestOneInput /src/yara/tests/oss-fuzz/dotnet_fuzzer.cc:74:3
21
+ #11 0x46b474 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:553:15
22
+ #12 0x456041 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:286:6
23
+ #13 0x45b69a in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:717:9
24
+ #14 0x486882 in main /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
25
+ #15 0x75750393083f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
26
+ #16 0x41e0b8 in _start (/out/dotnet_fuzzer+0x41e0b8)
27
+
28
+ DEDUP_TOKEN: __asan_memcpy--yr_object_set_string--dotnet_parse_us
29
+ 0x619000000e0b is located 0 bytes to the right of 907-byte region [0x619000000a80,0x619000000e0b)
30
+ allocated by thread T0 here:
31
+ #0 0x53189d in malloc /src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:145:3
32
+ #1 0x432827 in operator new(unsigned long) (/out/dotnet_fuzzer+0x432827)
33
+ #2 0x456041 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:286:6
34
+ #3 0x45b69a in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:717:9
35
+ #4 0x486882 in main /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
36
+ #5 0x75750393083f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
37
+
38
+ DEDUP_TOKEN: malloc--operator new(unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)
39
+ SUMMARY: AddressSanitizer: heap-buffer-overflow /src/llvm/projects/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cc:22:3 in __asan_memcpy
40
+ Shadow bytes around the buggy address:
41
+ 0x0c327fff8170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
42
+ 0x0c327fff8180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
43
+ 0x0c327fff8190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
44
+ 0x0c327fff81a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
45
+ 0x0c327fff81b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
46
+ =>0x0c327fff81c0: 00[03]fa fa fa fa fa fa fa fa fa fa fa fa fa fa
47
+ 0x0c327fff81d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
48
+ 0x0c327fff81e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
49
+ 0x0c327fff81f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
50
+ 0x0c327fff8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
51
+ 0x0c327fff8210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
52
+ Shadow byte legend (one shadow byte represents 8 application bytes):
53
+ Addressable: 00
54
+ Partially addressable: 01 02 03 04 05 06 07
55
+ Heap left redzone: fa
56
+ Freed heap region: fd
57
+ Stack left redzone: f1
58
+ Stack mid redzone: f2
59
+ Stack right redzone: f3
60
+ Stack after return: f5
61
+ Stack use after scope: f8
62
+ Global redzone: f9
63
+ Global init order: f6
64
+ Poisoned by user: f7
65
+ Container overflow: fc
66
+ Array cookie: ac
67
+ Intra object redzone: bb
68
+ ASan internal: fe
69
+ Left alloca redzone: ca
70
+ Right alloca redzone: cb
71
+ Shadow gap: cc
72
+ ==18683==ABORTING
projects/yara/arvo_14560/poc.bin ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ab1f47841776514f6ab7496167b88c2d0ae8ff95df6b8ea6c7497d57426bad09
3
+ size 907
projects/yara/arvo_14560/src.tgz ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:eb552884bf3bce8d593d5aaf64384dd46d7ed6442bd70e4e93ceb5b27f9baad9
3
+ size 751851
projects/yara/arvo_14813/crash.log ADDED
@@ -0,0 +1,73 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ INFO: Seed: 1622430913
2
+ INFO: Loaded 1 modules (8171 inline 8-bit counters): 8171 [0x8fd490, 0x8ff47b),
3
+ INFO: Loaded 1 PC tables (8171 PCs): 8171 [0x673c78,0x693b28),
4
+ /out/dotnet_fuzzer: Running 1 inputs 1 time(s) each.
5
+ Running: /tmp/poc
6
+ =================================================================
7
+ ==18682==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61b000000dd7 at pc 0x000000538c4a bp 0x7ffe42183930 sp 0x7ffe421830f8
8
+ READ of size 11 at 0x61b000000dd7 thread T0
9
+ SCARINESS: 26 (multi-byte-read-heap-buffer-overflow)
10
+ #0 0x538c49 in __asan_memcpy /src/llvm/projects/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cc:22:3
11
+ #1 0x57e640 in yr_object_set_string /src/yara/libyara/object.c:1094:5
12
+ #2 0x5b69d9 in dotnet_parse_tilde_2 /src/yara/libyara/modules/dotnet.c:1181:13
13
+ #3 0x5bc566 in dotnet_parse_tilde /src/yara/libyara/modules/dotnet.c:1513:3
14
+ #4 0x5bcdef in dotnet_parse_com /src/yara/libyara/modules/dotnet.c:1600:5
15
+ #5 0x5be6fe in dotnet__load /src/yara/libyara/modules/dotnet.c:1720:9
16
+ #6 0x57c54c in yr_modules_load /src/yara/libyara/modules.c:179:16
17
+ #7 0x5e9c6e in yr_execute_code /src/yara/libyara/exec.c:1030:18
18
+ #8 0x5864d0 in yr_scanner_scan_mem_blocks /src/yara/libyara/scanner.c:442:3
19
+ #9 0x582e53 in yr_rules_scan_mem_blocks /src/yara/libyara/rules.c:217:12
20
+ #10 0x5830b2 in yr_rules_scan_mem /src/yara/libyara/rules.c:267:10
21
+ #11 0x56bae2 in LLVMFuzzerTestOneInput /src/yara/tests/oss-fuzz/dotnet_fuzzer.cc:74:3
22
+ #12 0x473af1 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:553:15
23
+ #13 0x45e431 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:292:6
24
+ #14 0x463fbe in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:775:9
25
+ #15 0x48d562 in main /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
26
+ #16 0x70b9eda7b83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
27
+ #17 0x41e168 in _start (/out/dotnet_fuzzer+0x41e168)
28
+
29
+ DEDUP_TOKEN: __asan_memcpy--yr_object_set_string--dotnet_parse_tilde_2
30
+ 0x61b000000dd7 is located 0 bytes to the right of 1623-byte region [0x61b000000780,0x61b000000dd7)
31
+ allocated by thread T0 here:
32
+ #0 0x53980d in malloc /src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:145:3
33
+ #1 0x432807 in operator new(unsigned long) (/out/dotnet_fuzzer+0x432807)
34
+ #2 0x45e431 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:292:6
35
+ #3 0x463fbe in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:775:9
36
+ #4 0x48d562 in main /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
37
+ #5 0x70b9eda7b83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
38
+
39
+ DEDUP_TOKEN: malloc--operator new(unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)
40
+ SUMMARY: AddressSanitizer: heap-buffer-overflow /src/llvm/projects/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cc:22:3 in __asan_memcpy
41
+ Shadow bytes around the buggy address:
42
+ 0x0c367fff8160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
43
+ 0x0c367fff8170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
44
+ 0x0c367fff8180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
45
+ 0x0c367fff8190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
46
+ 0x0c367fff81a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
47
+ =>0x0c367fff81b0: 00 00 00 00 00 00 00 00 00 00[07]fa fa fa fa fa
48
+ 0x0c367fff81c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
49
+ 0x0c367fff81d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
50
+ 0x0c367fff81e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
51
+ 0x0c367fff81f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
52
+ 0x0c367fff8200: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
53
+ Shadow byte legend (one shadow byte represents 8 application bytes):
54
+ Addressable: 00
55
+ Partially addressable: 01 02 03 04 05 06 07
56
+ Heap left redzone: fa
57
+ Freed heap region: fd
58
+ Stack left redzone: f1
59
+ Stack mid redzone: f2
60
+ Stack right redzone: f3
61
+ Stack after return: f5
62
+ Stack use after scope: f8
63
+ Global redzone: f9
64
+ Global init order: f6
65
+ Poisoned by user: f7
66
+ Container overflow: fc
67
+ Array cookie: ac
68
+ Intra object redzone: bb
69
+ ASan internal: fe
70
+ Left alloca redzone: ca
71
+ Right alloca redzone: cb
72
+ Shadow gap: cc
73
+ ==18682==ABORTING
projects/yara/arvo_14813/poc.bin ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f6859639f148726470372c6a5fe1225ccca6824508640124c8ec27441d6cdac9
3
+ size 1623
projects/yara/arvo_14813/src.tgz ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b1cd703dac5876d8c44c1d5fa902af6acba01c5a9a080ff1e021e306105c91b1
3
+ size 768782
projects/yara/arvo_16448/crash.log ADDED
@@ -0,0 +1,29 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ INFO: Seed: 967326555
2
+ INFO: Loaded 1 modules (9775 inline 8-bit counters): 9775 [0x7c2480, 0x7c4aaf),
3
+ INFO: Loaded 1 PC tables (9775 PCs): 9775 [0x557dd0,0x57e0c0),
4
+ /out/dotnet_fuzzer: Running 1 inputs 1 time(s) each.
5
+ Running: /tmp/poc
6
+ UndefinedBehaviorSanitizer:DEADLYSIGNAL
7
+ ==18864==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x00003de2e000 (pc 0x0000004dcd4f bp 0x7ffe358d0580 sp 0x7ffe358d0270 T18864)
8
+ ==18864==The signal is caused by a READ memory access.
9
+ #0 0x4dcd4e in dotnet_parse_tilde_2 /src/yara/libyara/modules/dotnet/dotnet.c:1022:15
10
+ #1 0x4e0b89 in dotnet_parse_tilde /src/yara/libyara/modules/dotnet/dotnet.c:1562:3
11
+ #2 0x4e10e4 in dotnet_parse_com /src/yara/libyara/modules/dotnet/dotnet.c:1651:5
12
+ #3 0x4e2136 in dotnet__load /src/yara/libyara/modules/dotnet/dotnet.c:1774:9
13
+ #4 0x4bbd00 in yr_modules_load /src/yara/libyara/modules.c:179:16
14
+ #5 0x4f781f in yr_execute_code /src/yara/libyara/exec.c:1276:18
15
+ #6 0x4c0959 in yr_scanner_scan_mem_blocks /src/yara/libyara/scanner.c:441:3
16
+ #7 0x4bf056 in yr_rules_scan_mem_blocks /src/yara/libyara/rules.c:235:12
17
+ #8 0x4bf0e7 in yr_rules_scan_mem /src/yara/libyara/rules.c:285:10
18
+ #9 0x4b459a in LLVMFuzzerTestOneInput /src/yara/tests/oss-fuzz/dotnet_fuzzer.cc:74:3
19
+ #10 0x443711 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:556:15
20
+ #11 0x42e331 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:292:6
21
+ #12 0x433fee in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:774:9
22
+ #13 0x45e162 in main /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
23
+ #14 0x76046c07f83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
24
+ #15 0x4076e8 in _start (/out/dotnet_fuzzer+0x4076e8)
25
+
26
+ DEDUP_TOKEN: dotnet_parse_tilde_2--dotnet_parse_tilde--dotnet_parse_com
27
+ UndefinedBehaviorSanitizer can not provide additional info.
28
+ SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/yara/libyara/modules/dotnet/dotnet.c:1022:15 in dotnet_parse_tilde_2
29
+ ==18864==ABORTING
projects/yara/arvo_16448/poc.bin ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a34c706c30140b159bd318664fb8f38145236b63101edc7a68620391bacc4681
3
+ size 661
projects/yara/arvo_16448/src.tgz ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9261794a9c85a313ed34134263e2c0d18be57a5f91ef206836e8101abe1ad8be
3
+ size 851510
projects/yara/arvo_20800/crash.log ADDED
@@ -0,0 +1,69 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ INFO: Seed: 1827433779
2
+ INFO: Loaded 1 modules (8523 inline 8-bit counters): 8523 [0x8f0110, 0x8f225b),
3
+ INFO: Loaded 1 PC tables (8523 PCs): 8523 [0x665ff8,0x6874a8),
4
+ /out/pe_fuzzer: Running 1 inputs 1 time(s) each.
5
+ Running: /tmp/poc
6
+ =================================================================
7
+ ==19187==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6210000061f9 at pc 0x000000595978 bp 0x7ffc7ff46810 sp 0x7ffc7ff46808
8
+ READ of size 4 at 0x6210000061f9 thread T0
9
+ SCARINESS: 17 (4-byte-read-heap-buffer-overflow)
10
+ #0 0x595977 in pe_parse_debug_directory /src/yara/libyara/modules/pe/pe.c:339:9
11
+ #1 0x591a8b in pe__load /src/yara/libyara/modules/pe/pe.c:3182:9
12
+ #2 0x5654ac in yr_modules_load /src/yara/libyara/modules.c:179:16
13
+ #3 0x5d7a03 in yr_execute_code /src/yara/libyara/exec.c:1278:18
14
+ #4 0x56f6f0 in yr_scanner_scan_mem_blocks /src/yara/libyara/scanner.c:444:3
15
+ #5 0x56c053 in yr_rules_scan_mem_blocks /src/yara/libyara/rules.c:235:12
16
+ #6 0x56c2b2 in yr_rules_scan_mem /src/yara/libyara/rules.c:285:10
17
+ #7 0x5548e2 in LLVMFuzzerTestOneInput /src/yara/tests/oss-fuzz/pe_fuzzer.cc:74:3
18
+ #8 0x45a3b1 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:556:15
19
+ #9 0x444ed1 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:292:6
20
+ #10 0x44ab8e in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:774:9
21
+ #11 0x474ab2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
22
+ #12 0x7eba531ce83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
23
+ #13 0x41e348 in _start (/out/pe_fuzzer+0x41e348)
24
+
25
+ DEDUP_TOKEN: pe_parse_debug_directory--pe__load--yr_modules_load
26
+ 0x6210000061f9 is located 2 bytes to the right of 4343-byte region [0x621000005100,0x6210000061f7)
27
+ allocated by thread T0 here:
28
+ #0 0x521f4d in malloc /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:145:3
29
+ #1 0x4331b7 in operator new(unsigned long) (/out/pe_fuzzer+0x4331b7)
30
+ #2 0x444ed1 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:292:6
31
+ #3 0x44ab8e in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:774:9
32
+ #4 0x474ab2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
33
+ #5 0x7eba531ce83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
34
+
35
+ DEDUP_TOKEN: malloc--operator new(unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)
36
+ SUMMARY: AddressSanitizer: heap-buffer-overflow /src/yara/libyara/modules/pe/pe.c:339:9 in pe_parse_debug_directory
37
+ Shadow bytes around the buggy address:
38
+ 0x0c427fff8be0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
39
+ 0x0c427fff8bf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
40
+ 0x0c427fff8c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
41
+ 0x0c427fff8c10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
42
+ 0x0c427fff8c20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
43
+ =>0x0c427fff8c30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 07[fa]
44
+ 0x0c427fff8c40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
45
+ 0x0c427fff8c50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
46
+ 0x0c427fff8c60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
47
+ 0x0c427fff8c70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
48
+ 0x0c427fff8c80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
49
+ Shadow byte legend (one shadow byte represents 8 application bytes):
50
+ Addressable: 00
51
+ Partially addressable: 01 02 03 04 05 06 07
52
+ Heap left redzone: fa
53
+ Freed heap region: fd
54
+ Stack left redzone: f1
55
+ Stack mid redzone: f2
56
+ Stack right redzone: f3
57
+ Stack after return: f5
58
+ Stack use after scope: f8
59
+ Global redzone: f9
60
+ Global init order: f6
61
+ Poisoned by user: f7
62
+ Container overflow: fc
63
+ Array cookie: ac
64
+ Intra object redzone: bb
65
+ ASan internal: fe
66
+ Left alloca redzone: ca
67
+ Right alloca redzone: cb
68
+ Shadow gap: cc
69
+ ==19187==ABORTING
projects/yara/arvo_20800/poc.bin ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:fc4171946a8bd115c85f451cbd17581746341b2ba1a5f885df0448ba698c34fa
3
+ size 4343
projects/yara/arvo_20800/src.tgz ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f1309e7a79c6b92148420cf2a2bbd7c913c8b08f81f839c9618810b49042b394
3
+ size 867231
projects/yara/arvo_3862/crash.log CHANGED
@@ -1,10 +1,9 @@
1
- mesg: ttyname failed: Inappropriate ioctl for device
2
- INFO: Seed: 2039039830
3
  INFO: Loaded 1 modules (6100 guards): 6100 [0x965580, 0x96b4d0),
4
  /out/pe_fuzzer: Running 1 inputs 1 time(s) each.
5
  Running: /tmp/poc
6
  =================================================================
7
- ==16449==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61d000001260 at pc 0x000000550b38 bp 0x7ffce27bd2d0 sp 0x7ffce27bd2c8
8
  READ of size 2 at 0x61d000001260 thread T0
9
  SCARINESS: 24 (2-byte-read-heap-buffer-overflow-far-from-bounds)
10
  #0 0x550b37 in pe_parse_exports /src/yara/libyara/modules/pe.c:1029:15
@@ -18,7 +17,7 @@ SCARINESS: 24 (2-byte-read-heap-buffer-overflow-far-from-bounds)
18
  #8 0x5ae9d5 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:273:6
19
  #9 0x5ba0a5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:690:9
20
  #10 0x5ae078 in main /src/libfuzzer/FuzzerMain.cpp:20:10
21
- #11 0x7db75fe4b83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
22
  #12 0x41c558 in _start (/out/pe_fuzzer+0x41c558)
23
 
24
  DEDUP_TOKEN: pe_parse_exports--pe__load--yr_modules_load
@@ -29,7 +28,7 @@ allocated by thread T0 here:
29
  #2 0x5ae9d5 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:273:6
30
  #3 0x5ba0a5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:690:9
31
  #4 0x5ae078 in main /src/libfuzzer/FuzzerMain.cpp:20:10
32
- #5 0x7db75fe4b83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
33
 
34
  DEDUP_TOKEN: operator new[](unsigned long)--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)
35
  SUMMARY: AddressSanitizer: heap-buffer-overflow /src/yara/libyara/modules/pe.c:1029:15 in pe_parse_exports
@@ -64,4 +63,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes):
64
  ASan internal: fe
65
  Left alloca redzone: ca
66
  Right alloca redzone: cb
67
- ==16449==ABORTING
 
1
+ INFO: Seed: 1805705695
 
2
  INFO: Loaded 1 modules (6100 guards): 6100 [0x965580, 0x96b4d0),
3
  /out/pe_fuzzer: Running 1 inputs 1 time(s) each.
4
  Running: /tmp/poc
5
  =================================================================
6
+ ==16518==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61d000001260 at pc 0x000000550b38 bp 0x7ffca315f450 sp 0x7ffca315f448
7
  READ of size 2 at 0x61d000001260 thread T0
8
  SCARINESS: 24 (2-byte-read-heap-buffer-overflow-far-from-bounds)
9
  #0 0x550b37 in pe_parse_exports /src/yara/libyara/modules/pe.c:1029:15
 
17
  #8 0x5ae9d5 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:273:6
18
  #9 0x5ba0a5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:690:9
19
  #10 0x5ae078 in main /src/libfuzzer/FuzzerMain.cpp:20:10
20
+ #11 0x7b9f49ac283f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
21
  #12 0x41c558 in _start (/out/pe_fuzzer+0x41c558)
22
 
23
  DEDUP_TOKEN: pe_parse_exports--pe__load--yr_modules_load
 
28
  #2 0x5ae9d5 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:273:6
29
  #3 0x5ba0a5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:690:9
30
  #4 0x5ae078 in main /src/libfuzzer/FuzzerMain.cpp:20:10
31
+ #5 0x7b9f49ac283f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
32
 
33
  DEDUP_TOKEN: operator new[](unsigned long)--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)
34
  SUMMARY: AddressSanitizer: heap-buffer-overflow /src/yara/libyara/modules/pe.c:1029:15 in pe_parse_exports
 
63
  ASan internal: fe
64
  Left alloca redzone: ca
65
  Right alloca redzone: cb
66
+ ==16518==ABORTING
projects/yara/arvo_3862/src.tgz CHANGED
@@ -1,3 +1,3 @@
1
  version https://git-lfs.github.com/spec/v1
2
- oid sha256:1ec97328bc1748f84f4f0ba2c54cfe2312ba3ae39a2ad69cfd51728283487260
3
- size 551690
 
1
  version https://git-lfs.github.com/spec/v1
2
+ oid sha256:39c92714cf9d5ab1db8232835286ca3ea9f0c71fe00344e0415fc6783b6155ef
3
+ size 551479
projects/yara/arvo_3938/crash.log ADDED
@@ -0,0 +1,15 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ INFO: Seed: 2455452425
2
+ INFO: Loaded 1 modules (6196 guards): 6196 [0x77f8f0, 0x7859c0),
3
+ /out/rules_fuzzer: Running 1 inputs 1 time(s) each.
4
+ Running: /tmp/poc
5
+ /src/libfuzzer/FuzzerLoop.cpp:476:13: runtime error: call to function LLVMFuzzerTestOneInput through pointer to incorrect function type 'int (*)(const unsigned char *, unsigned long)'
6
+ /src/yara/tests/oss-fuzz/rules_fuzzer.cc:45: note: LLVMFuzzerTestOneInput defined here
7
+ #0 0x484707 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:476:13
8
+ #1 0x4787ec in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:273:6
9
+ #2 0x47c6d9 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:690:9
10
+ #3 0x4784f8 in main /src/libfuzzer/FuzzerMain.cpp:20:10
11
+ #4 0x75f44d68183f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
12
+ #5 0x406668 in _start (/out/rules_fuzzer+0x406668)
13
+
14
+ DEDUP_TOKEN: fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)--fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long))
15
+ SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior /src/libfuzzer/FuzzerLoop.cpp:476:13 in
projects/yara/arvo_3938/poc.bin ADDED
File without changes
projects/yara/arvo_3938/src.tgz ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6fd33cb46b5922ed77a78cb720c7898474403da846136e56f5c58ef28ad5c5a5
3
+ size 553642
projects/yara/arvo_8903/crash.log ADDED
@@ -0,0 +1,39 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ INFO: Seed: 3508577220
2
+ INFO: Loaded 1 modules (7666 inline 8-bit counters): 7666 [0xafcf68, 0xafed5a),
3
+ INFO: Loaded 1 PC tables (7666 PCs): 7666 [0x875b50,0x893a70),
4
+ /out/dex_fuzzer: Running 1 inputs 1 time(s) each.
5
+ Running: /tmp/poc
6
+ ==18683==WARNING: MemorySanitizer: use-of-uninitialized-value
7
+ #0 0x54893b in read_uleb128 /src/yara/libyara/modules/dex.c:239:11
8
+ #1 0x54ab11 in load_encoded_method /src/yara/libyara/modules/dex.c:513:40
9
+ #2 0x54ee1a in dex_parse /src/yara/libyara/modules/dex.c:1020:25
10
+ #3 0x55126e in dex__load /src/yara/libyara/modules/dex.c:1150:7
11
+ #4 0x4bfa03 in yr_modules_load /src/yara/libyara/modules.c:175:16
12
+ #5 0x587152 in yr_execute_code /src/yara/libyara/exec.c:962:18
13
+ #6 0x4d11a6 in yr_scanner_scan_mem_blocks /src/yara/libyara/scanner.c:435:3
14
+ #7 0x4cb476 in yr_rules_scan_mem_blocks /src/yara/libyara/rules.c:217:12
15
+ #8 0x4cb77f in yr_rules_scan_mem /src/yara/libyara/rules.c:267:10
16
+ #9 0x4a30f1 in LLVMFuzzerTestOneInput /src/yara/tests/oss-fuzz/dex_fuzzer.cc:40:3
17
+ #10 0x62f40b in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:571:15
18
+ #11 0x5e73b6 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
19
+ #12 0x5f81da in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:713:9
20
+ #13 0x5e64e1 in main /src/libfuzzer/FuzzerMain.cpp:20:10
21
+ #14 0x7c70ad64283f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
22
+ #15 0x41f2e8 in _start (/out/dex_fuzzer+0x41f2e8)
23
+
24
+ DEDUP_TOKEN: read_uleb128--load_encoded_method--dex_parse
25
+ Uninitialized value was created by a heap allocation
26
+ #0 0x4a26b4 in operator new[](unsigned long) /src/llvm/projects/compiler-rt/lib/msan/msan_new_delete.cc:48
27
+ #1 0x62f060 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:558:23
28
+ #2 0x5e73b6 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
29
+ #3 0x5f81da in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:713:9
30
+ #4 0x5e64e1 in main /src/libfuzzer/FuzzerMain.cpp:20:10
31
+ #5 0x7c70ad64283f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
32
+
33
+ DEDUP_TOKEN: operator new[](unsigned long)--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)
34
+ SUMMARY: MemorySanitizer: use-of-uninitialized-value /src/yara/libyara/modules/dex.c:239:11 in read_uleb128
35
+ Unique heap origins: 798
36
+ Stack depot allocated bytes: 102584
37
+ Unique origin histories: 18
38
+ History depot allocated bytes: 432
39
+ Exiting
projects/yara/arvo_8903/poc.bin ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:fef9133723bcb320dffa8d6cd6cd7eb430e663c4679eb424458087bdd7068211
3
+ size 513
projects/yara/arvo_8903/src.tgz ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9a0e3eff2d484fa807c70bd72016a7fb98f04333222f83f23abceef059caf564
3
+ size 741128