Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/401056615

Changed
access level:  Limited visibility → Default access

pe...@google.com added comment #3:

This bug has been fixed. It has been opened to the public.

_______________________________

Reference Info: 401056615 binutils:fuzz_objdump_safe: Heap-buffer-overflow
in _bfd_elf_parse_attributes
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Default access
priority:  P2
severity:  S2
hotlist:  ClusterFuzz-Verified, Reproducible,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Jun 4, 2025
Project:  binutils
Reported:  Mar 6, 2025


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 401056615
Unsubscribe from this issue.

Reply via email to