bug-binutils
[
Top
][
All Lists
]
Advanced
[
Date Prev
][
Date Next
][
Thread Prev
][
Thread Next
][
Date Index
][
Thread Index
]
Re: Issue 371445188: binutils:fuzz_dlltool: Null-dereference READ in sca
From
:
buganizer-system
Subject
:
Re: Issue 371445188: binutils:fuzz_dlltool: Null-dereference READ in scan_open_obj_file
Date
:
Sat, 05 Oct 2024 03:37:58 -0700
Replying to this email means your email address will be shared with the team that works on this product.
https://issues.oss-fuzz.com/issues/371445188
Changed
status:
New → Verified
assignee:
<none> → cl...@appspot.gserviceaccount.com
verifier:
<none> → cl...@appspot.gserviceaccount.com
87...@developer.gserviceaccount.com added
comment #2
:
ClusterFuzz testcase 6536855803199488 is verified as fixed in
https://oss-fuzz.com/revisions?job=honggfuzz_asan_binutils&range=202410040633:202410050602
If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
_______________________________
Reference Info: 371445188 binutils:fuzz_dlltool: Null-dereference READ in scan_open_obj_file
component:
Public Trackers > 1362134 > OSS Fuzz
status:
Verified
reporter:
87...@developer.gserviceaccount.com
assignee:
cl...@appspot.gserviceaccount.com
verifier:
cl...@appspot.gserviceaccount.com
cc:
am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:
co...@oss-fuzz.com
type:
Bug
access level:
Limited visibility
priority:
P2
severity:
S4
hotlist:
Reproducible
,
Stability-Memory-AddressSanitizer
retention:
Component default
Disclosure:
Jan 2, 2025
Project:
binutils
Reported:
Oct 4, 2024
Generated by Google IssueTracker notification system.
You're receiving this email because you are subscribed to updates on Google IssueTracker issue
371445188
Unsubscribe from this issue.
reply via email to
[Prev in Thread]
Current Thread
[
Next in Thread
]
[Bug binutils/32324] New: Stripping BOLT'ed binaries leads to unwanted behaviour
,
avieira at gcc dot gnu.org
,
2024/10/30
[Bug binutils/32324] Stripping BOLT'ed binaries leads to unwanted behaviour
,
avieira at gcc dot gnu.org
,
2024/10/30
[Bug binutils/32324] Stripping BOLT'ed binaries leads to unwanted behaviour
,
sam at gentoo dot org
,
2024/10/30
Prev by Date:
Re: Issue 371292575: binutils:fuzz_objdump: Null-dereference READ in _bfd_x86_elf_get_synthetic_symtab
Next by Date:
Issue 371546806: binutils:fuzz_nm: Null-dereference READ in bfd_hash_lookup
Previous by thread:
[Bug binutils/32319] New: An error caused by invalid string offset was found in GNU Binutilis 2.30, which allows remote attackers to cause a denial of service (application crash) or potentially has unspecified other impact via an ELF file
Next by thread:
[Bug binutils/32324] Stripping BOLT'ed binaries leads to unwanted behaviour
Index(es):
Date
Thread