Status: New
Owner: ----
CC: elfut...@sourceware.org, da...@adalogics.com, evv...@gmail.com, 
izz...@google.com 
Labels: ClusterFuzz Stability-Memory-AddressSanitizer Reproducible OS-Linux 
Security_Severity-Medium Engine-honggfuzz Proj-elfutils Reported-2022-03-17
Type: Bug-Security

New issue 45628 by ClusterFuzz-External: elfutils:fuzz-libdwfl: 
Heap-buffer-overflow in strtol
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=45628

Detailed Report: https://oss-fuzz.com/testcase?key=4673586076450816

Project: elfutils
Fuzzing Engine: honggfuzz
Fuzz Target: fuzz-libdwfl
Job Type: honggfuzz_asan_elfutils
Platform Id: linux

Crash Type: Heap-buffer-overflow READ {*}
Crash Address: 0x7fffe2c93000
Crash State:
  strtol
  __libelf_next_arhdr_wrlock
  elf_begin
  
Sanitizer: address (ASAN)

Recommended Security Severity: Medium

Regressed: 
https://oss-fuzz.com/revisions?job=honggfuzz_asan_elfutils&range=202203161800:202203170000

Reproducer Testcase: https://oss-fuzz.com/download?testcase_id=4673586076450816

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for 
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any 
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any other 
feedback, please file an issue at https://github.com/google/oss-fuzz/issues. 
Comments on individual Monorail issues are not monitored.

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.

Reply via email to