Re: Issue 373568787: binutils:fuzz_nm: Invalid-bool-value in coff_find_nearest_line_with_names

2024-10-15 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/373568787

Changed
Disclosure:   → Jan 13, 2025

___

Reference Info: 373568787 binutils:fuzz_nm: Invalid-bool-value in
coff_find_nearest_line_with_names
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-UndefinedBehaviorSanitizer
retention:  Component default
Disclosure:  Jan 13, 2025
Project:  binutils
Reported:  Oct 15, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 373568787
Unsubscribe from this issue.


Re: Issue 372093895: binutils:fuzz_dlltool: Null-dereference READ in _bfd_mips_elf_symbol_processing

2024-10-15 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/372093895

Changed
access level:  Limited visibility → Default access

___

Reference Info: 372093895 binutils:fuzz_dlltool: Null-dereference READ in
_bfd_mips_elf_symbol_processing
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz-Verified, Reproducible,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Jan 6, 2025
Project:  binutils
Reported:  Oct 8, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 372093895
Unsubscribe from this issue.


Re: Issue 371546806: binutils:fuzz_nm: Null-dereference READ in bfd_hash_lookup

2024-10-15 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/371546806

Changed

pe...@google.com added comment #3:

This bug has been fixed. It has been opened to the public.

___

Reference Info: 371546806 binutils:fuzz_nm: Null-dereference READ in
bfd_hash_lookup
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  ClusterFuzz-Verified, Reproducible, Stability-AFL,
Stability-LibFuzzer, Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Jan 3, 2025
Project:  binutils
Reported:  Oct 5, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 371546806
Unsubscribe from this issue.


Re: Issue 371546806: binutils:fuzz_nm: Null-dereference READ in bfd_hash_lookup

2024-10-15 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/371546806

Changed
access level:  Limited visibility → Default access

___

Reference Info: 371546806 binutils:fuzz_nm: Null-dereference READ in
bfd_hash_lookup
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz-Verified, Reproducible, Stability-AFL,
Stability-LibFuzzer, Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Jan 3, 2025
Project:  binutils
Reported:  Oct 5, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 371546806
Unsubscribe from this issue.


Re: Issue 372093895: binutils:fuzz_dlltool: Null-dereference READ in _bfd_mips_elf_symbol_processing

2024-10-15 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/372093895

Changed

pe...@google.com added comment #3:

This bug has been fixed. It has been opened to the public.

___

Reference Info: 372093895 binutils:fuzz_dlltool: Null-dereference READ in
_bfd_mips_elf_symbol_processing
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  ClusterFuzz-Verified, Reproducible,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Jan 6, 2025
Project:  binutils
Reported:  Oct 8, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 372093895
Unsubscribe from this issue.


Issue 373568787: binutils:fuzz_nm: Invalid-bool-value in coff_find_nearest_line_with_names

2024-10-15 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/373568787

Reference Info: 373568787 binutils:fuzz_nm: Invalid-bool-value in
coff_find_nearest_line_with_names
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-UndefinedBehaviorSanitizer
retention:  Component default
Project:  binutils
Reported:  Oct 15, 2024

87...@developer.gserviceaccount.com added comment #1:
Detailed Report: https://oss-fuzz.com/testcase?key=5847071254446080

Project: binutils
Fuzzing Engine: libFuzzer
Fuzz Target: fuzz_nm
Job Type: libfuzzer_ubsan_binutils
Platform Id: linux

Crash Type: Invalid-bool-value
Crash Address:
Crash State:
  coff_find_nearest_line_with_names
  coff_find_nearest_line
  print_symbol

Sanitizer: undefined (UBSAN)

Regressed:
https://oss-fuzz.com/revisions?job=libfuzzer_ubsan_binutils&range=202410020612:202410030621

Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=5847071254446080

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any
other feedback, please file an issue at
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail
issues are not monitored.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 373568787
Unsubscribe from this issue.


Re: Issue 372093895: binutils:fuzz_dlltool: Null-dereference READ in _bfd_mips_elf_symbol_processing

2024-10-15 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/372093895

Changed
status:  New → Verified
assignee:   → cl...@appspot.gserviceaccount.com
verifier:   → cl...@appspot.gserviceaccount.com

87...@developer.gserviceaccount.com added comment #2:
ClusterFuzz testcase 5911824714760192 is verified as fixed in
https://oss-fuzz.com/revisions?job=honggfuzz_asan_binutils&range=202410070610:202410140640

If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
___

Reference Info: 372093895 binutils:fuzz_dlltool: Null-dereference READ in
_bfd_mips_elf_symbol_processing
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Jan 6, 2025
Project:  binutils
Reported:  Oct 8, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 372093895
Unsubscribe from this issue.


Re: Issue 371546806: binutils:fuzz_nm: Null-dereference READ in bfd_hash_lookup

2024-10-15 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/371546806

Changed
status:  New → Verified
assignee:   → cl...@appspot.gserviceaccount.com
verifier:   → cl...@appspot.gserviceaccount.com

87...@developer.gserviceaccount.com added comment #2:
ClusterFuzz testcase 6081894578454528 is verified as fixed in
https://oss-fuzz.com/revisions?job=afl_asan_binutils&range=202410070610:202410140640

If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
___

Reference Info: 371546806 binutils:fuzz_nm: Null-dereference READ in
bfd_hash_lookup
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-AFL, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Jan 3, 2025
Project:  binutils
Reported:  Oct 5, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 371546806
Unsubscribe from this issue.


Re: Issue 372093895: binutils:fuzz_dlltool: Null-dereference READ in _bfd_mips_elf_symbol_processing

2024-10-08 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/372093895

Changed
Disclosure:   → Jan 6, 2025

___

Reference Info: 372093895 binutils:fuzz_dlltool: Null-dereference READ in
_bfd_mips_elf_symbol_processing
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Jan 6, 2025
Project:  binutils
Reported:  Oct 8, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 372093895
Unsubscribe from this issue.


Re: Issue 371445188: binutils:fuzz_dlltool: Null-dereference READ in scan_open_obj_file

2024-10-04 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/371445188

Changed
Disclosure:   → Jan 2, 2025

___

Reference Info: 371445188 binutils:fuzz_dlltool: Null-dereference READ in
scan_open_obj_file
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Jan 2, 2025
Project:  binutils
Reported:  Oct 4, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 371445188
Unsubscribe from this issue.


Re: Issue 371233016: binutils:fuzz_nm: Null-dereference READ in _bfd_elf_is_local_label_name

2024-10-04 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/371233016

Changed
Disclosure:   → Jan 2, 2025

___

Reference Info: 371233016 binutils:fuzz_nm: Null-dereference READ in
_bfd_elf_is_local_label_name
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Jan 2, 2025
Project:  binutils
Reported:  Oct 4, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 371233016
Unsubscribe from this issue.


Re: Issue 371292575: binutils:fuzz_objdump: Null-dereference READ in _bfd_x86_elf_get_synthetic_symtab

2024-10-04 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/371292575

Changed
Disclosure:   → Jan 2, 2025

___

Reference Info: 371292575 binutils:fuzz_objdump: Null-dereference READ in
_bfd_x86_elf_get_synthetic_symtab
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-AFL, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Jan 2, 2025
Project:  binutils
Reported:  Oct 4, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 371292575
Unsubscribe from this issue.


Issue 371292575: binutils:fuzz_objdump: Null-dereference READ in _bfd_x86_elf_get_synthetic_symtab

2024-10-04 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/371292575

Reference Info: 371292575 binutils:fuzz_objdump: Null-dereference READ in
_bfd_x86_elf_get_synthetic_symtab
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-AFL, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Project:  binutils
Reported:  Oct 4, 2024

87...@developer.gserviceaccount.com added comment #1:
Detailed Report: https://oss-fuzz.com/testcase?key=6386414641545216

Project: binutils
Fuzzing Engine: afl
Fuzz Target: fuzz_objdump
Job Type: afl_asan_binutils
Platform Id: linux

Crash Type: Null-dereference READ
Crash Address: 0x
Crash State:
  _bfd_x86_elf_get_synthetic_symtab
  elf_x86_64_get_synthetic_symtab
  dump_bfd

Sanitizer: address (ASAN)

Regressed:
https://oss-fuzz.com/revisions?job=afl_asan_binutils&range=202410020612:202410030621

Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=6386414641545216

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any
other feedback, please file an issue at
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail
issues are not monitored.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 371292575
Unsubscribe from this issue.


Issue 371233016: binutils:fuzz_nm: Null-dereference READ in _bfd_elf_is_local_label_name

2024-10-04 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/371233016

Reference Info: 371233016 binutils:fuzz_nm: Null-dereference READ in
_bfd_elf_is_local_label_name
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-Memory-AddressSanitizer
retention:  Component default
Project:  binutils
Reported:  Oct 4, 2024

87...@developer.gserviceaccount.com added comment #1:
Detailed Report: https://oss-fuzz.com/testcase?key=5164456113405952

Project: binutils
Fuzzing Engine: honggfuzz
Fuzz Target: fuzz_nm
Job Type: honggfuzz_asan_binutils
Platform Id: linux

Crash Type: Null-dereference READ
Crash Address: 0x
Crash State:
  _bfd_elf_is_local_label_name
  display_rel_file
  display_file

Sanitizer: address (ASAN)

Regressed:
https://oss-fuzz.com/revisions?job=honggfuzz_asan_binutils&range=202410020612:202410030621

Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=5164456113405952

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any
other feedback, please file an issue at
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail
issues are not monitored.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 371233016
Unsubscribe from this issue.


Issue 371445188: binutils:fuzz_dlltool: Null-dereference READ in scan_open_obj_file

2024-10-04 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/371445188

Reference Info: 371445188 binutils:fuzz_dlltool: Null-dereference READ in
scan_open_obj_file
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-Memory-AddressSanitizer
retention:  Component default
Project:  binutils
Reported:  Oct 4, 2024

87...@developer.gserviceaccount.com added comment #1:
Detailed Report: https://oss-fuzz.com/testcase?key=6536855803199488

Project: binutils
Fuzzing Engine: honggfuzz
Fuzz Target: fuzz_dlltool
Job Type: honggfuzz_asan_binutils
Platform Id: linux

Crash Type: Null-dereference READ
Crash Address: 0x
Crash State:
  scan_open_obj_file
  scan_obj_file
  fuzz_dlltool.c

Sanitizer: address (ASAN)

Regressed:
https://oss-fuzz.com/revisions?job=honggfuzz_asan_binutils&range=202410020612:202410030621

Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=6536855803199488

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any
other feedback, please file an issue at
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail
issues are not monitored.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 371445188
Unsubscribe from this issue.


Re: Issue 371292575: binutils:fuzz_objdump: Null-dereference READ in _bfd_x86_elf_get_synthetic_symtab

2024-10-05 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/371292575

Changed
status:  New → Verified
assignee:   → cl...@appspot.gserviceaccount.com
verifier:   → cl...@appspot.gserviceaccount.com

87...@developer.gserviceaccount.com added comment #2:
ClusterFuzz testcase 6386414641545216 is verified as fixed in
https://oss-fuzz.com/revisions?job=afl_asan_binutils&range=202410040633:202410050602

If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
___

Reference Info: 371292575 binutils:fuzz_objdump: Null-dereference READ in
_bfd_x86_elf_get_synthetic_symtab
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-AFL, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Jan 2, 2025
Project:  binutils
Reported:  Oct 4, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 371292575
Unsubscribe from this issue.


Re: Issue 371445188: binutils:fuzz_dlltool: Null-dereference READ in scan_open_obj_file

2024-10-05 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/371445188

Changed
status:  New → Verified
assignee:   → cl...@appspot.gserviceaccount.com
verifier:   → cl...@appspot.gserviceaccount.com

87...@developer.gserviceaccount.com added comment #2:
ClusterFuzz testcase 6536855803199488 is verified as fixed in
https://oss-fuzz.com/revisions?job=honggfuzz_asan_binutils&range=202410040633:202410050602

If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
___

Reference Info: 371445188 binutils:fuzz_dlltool: Null-dereference READ in
scan_open_obj_file
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Jan 2, 2025
Project:  binutils
Reported:  Oct 4, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 371445188
Unsubscribe from this issue.


Issue 372093895: binutils:fuzz_dlltool: Null-dereference READ in _bfd_mips_elf_symbol_processing

2024-10-07 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/372093895

Reference Info: 372093895 binutils:fuzz_dlltool: Null-dereference READ in
_bfd_mips_elf_symbol_processing
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-Memory-AddressSanitizer
retention:  Component default
Project:  binutils
Reported:  Oct 8, 2024

87...@developer.gserviceaccount.com added comment #1:
Detailed Report: https://oss-fuzz.com/testcase?key=5911824714760192

Project: binutils
Fuzzing Engine: honggfuzz
Fuzz Target: fuzz_dlltool
Job Type: honggfuzz_asan_binutils
Platform Id: linux

Crash Type: Null-dereference READ
Crash Address: 0x
Crash State:
  _bfd_mips_elf_symbol_processing
  bfd_elf64_slurp_symbol_table
  _bfd_elf_canonicalize_symtab

Sanitizer: address (ASAN)

Regressed:
https://oss-fuzz.com/revisions?job=honggfuzz_asan_binutils&range=202410020612:202410030621

Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=5911824714760192

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any
other feedback, please file an issue at
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail
issues are not monitored.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 372093895
Unsubscribe from this issue.


Re: Issue 373568787: binutils:fuzz_nm: Invalid-bool-value in coff_find_nearest_line_with_names

2024-10-19 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/373568787

Changed
access level:  Limited visibility → Default access

pe...@google.com added comment #3:

This bug has been fixed. It has been opened to the public.

___

Reference Info: 373568787 binutils:fuzz_nm: Invalid-bool-value in
coff_find_nearest_line_with_names
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz-Verified, Reproducible,
Stability-UndefinedBehaviorSanitizer
retention:  Component default
Disclosure:  Jan 13, 2025
Project:  binutils
Reported:  Oct 15, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 373568787
Unsubscribe from this issue.


Re: Issue 373568787: binutils:fuzz_nm: Invalid-bool-value in coff_find_nearest_line_with_names

2024-10-18 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/373568787

Changed
status:  New → Verified
assignee:   → cl...@appspot.gserviceaccount.com
verifier:   → cl...@appspot.gserviceaccount.com

87...@developer.gserviceaccount.com added comment #2:
ClusterFuzz testcase 5847071254446080 is verified as fixed in
https://oss-fuzz.com/revisions?job=libfuzzer_ubsan_binutils&range=202410160602:202410180646

If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
___

Reference Info: 373568787 binutils:fuzz_nm: Invalid-bool-value in
coff_find_nearest_line_with_names
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-UndefinedBehaviorSanitizer
retention:  Component default
Disclosure:  Jan 13, 2025
Project:  binutils
Reported:  Oct 15, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 373568787
Unsubscribe from this issue.


Re: Issue 371233016: binutils:fuzz_nm: Null-dereference READ in _bfd_elf_is_local_label_name

2024-10-05 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/371233016

Changed
status:  New → Verified
assignee:   → cl...@appspot.gserviceaccount.com
verifier:   → cl...@appspot.gserviceaccount.com

87...@developer.gserviceaccount.com added comment #2:
ClusterFuzz testcase 5164456113405952 is verified as fixed in
https://oss-fuzz.com/revisions?job=honggfuzz_asan_binutils&range=202410040633:202410050602

If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
___

Reference Info: 371233016 binutils:fuzz_nm: Null-dereference READ in
_bfd_elf_is_local_label_name
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Jan 2, 2025
Project:  binutils
Reported:  Oct 4, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 371233016
Unsubscribe from this issue.


Issue 371546806: binutils:fuzz_nm: Null-dereference READ in bfd_hash_lookup

2024-10-05 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/371546806

Reference Info: 371546806 binutils:fuzz_nm: Null-dereference READ in
bfd_hash_lookup
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-AFL, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Project:  binutils
Reported:  Oct 5, 2024

87...@developer.gserviceaccount.com added comment #1:
Detailed Report: https://oss-fuzz.com/testcase?key=6081894578454528

Project: binutils
Fuzzing Engine: afl
Fuzz Target: fuzz_nm
Job Type: afl_asan_binutils
Platform Id: linux

Crash Type: Null-dereference READ
Crash Address: 0x
Crash State:
  bfd_hash_lookup
  _bfd_dwarf2_find_nearest_line_with_alt
  _bfd_elf_find_nearest_line_with_alt

Sanitizer: address (ASAN)

Regressed:
https://oss-fuzz.com/revisions?job=afl_asan_binutils&range=202410020612:202410030621

Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=6081894578454528

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any
other feedback, please file an issue at
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail
issues are not monitored.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 371546806
Unsubscribe from this issue.


Re: Issue 371233016: binutils:fuzz_nm: Null-dereference READ in _bfd_elf_is_local_label_name

2024-10-05 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/371233016

Changed
access level:  Limited visibility → Default access

pe...@google.com added comment #3:

This bug has been fixed. It has been opened to the public.

___

Reference Info: 371233016 binutils:fuzz_nm: Null-dereference READ in
_bfd_elf_is_local_label_name
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz-Verified, Reproducible,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Jan 2, 2025
Project:  binutils
Reported:  Oct 4, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 371233016
Unsubscribe from this issue.


Re: Issue 371445188: binutils:fuzz_dlltool: Null-dereference READ in scan_open_obj_file

2024-10-05 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/371445188

Changed
access level:  Limited visibility → Default access

pe...@google.com added comment #3:

This bug has been fixed. It has been opened to the public.

___

Reference Info: 371445188 binutils:fuzz_dlltool: Null-dereference READ in
scan_open_obj_file
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz-Verified, Reproducible,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Jan 2, 2025
Project:  binutils
Reported:  Oct 4, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 371445188
Unsubscribe from this issue.


Re: Issue 371292575: binutils:fuzz_objdump: Null-dereference READ in _bfd_x86_elf_get_synthetic_symtab

2024-10-05 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/371292575

Changed
access level:  Limited visibility → Default access

pe...@google.com added comment #3:

This bug has been fixed. It has been opened to the public.

___

Reference Info: 371292575 binutils:fuzz_objdump: Null-dereference READ in
_bfd_x86_elf_get_synthetic_symtab
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz-Verified, Reproducible, Stability-AFL,
Stability-LibFuzzer, Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Jan 2, 2025
Project:  binutils
Reported:  Oct 4, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 371292575
Unsubscribe from this issue.


Re: Issue 371546806: binutils:fuzz_nm: Null-dereference READ in bfd_hash_lookup

2024-10-05 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/371546806

Changed
Disclosure:   → Jan 3, 2025

___

Reference Info: 371546806 binutils:fuzz_nm: Null-dereference READ in
bfd_hash_lookup
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-AFL, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Jan 3, 2025
Project:  binutils
Reported:  Oct 5, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 371546806
Unsubscribe from this issue.


Re: Issue 42521563: binutils:fuzz_as: Stack-overflow in operand

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42521563

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42521563 binutils:fuzz_as: Stack-overflow in operand
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer, Unreproducible
retention:  Component default
Disclosure:  May 29, 2023
Project:  binutils
Reported:  Feb 28, 2023


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42521563
Unsubscribe from this issue.


Re: Issue 42522865: binutils:fuzz_as: Direct-leak in xcalloc

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42522865

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42522865 binutils:fuzz_as: Direct-leak in xcalloc
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer, Stability-Memory-LeakSanitizer
retention:  Component default
Disclosure:  Jun 30, 2023
Project:  binutils
Reported:  Apr 1, 2023


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42522865
Unsubscribe from this issue.


Re: Issue 42524981: binutils:fuzz_as: Heap-use-after-free in hash_symbol_entry

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42524981

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42524981 binutils:fuzz_as: Heap-use-after-free in
hash_symbol_entry
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Vulnerability
access level:  Default access
priority:  P2
severity:  S2
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Aug 30, 2023
Project:  binutils
Reported:  Jun 1, 2023


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42524981
Unsubscribe from this issue.


Re: Issue 42513625: binutils:fuzz_nm: Stack-overflow in mmo_get_symbols

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42513625

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42513625 binutils:fuzz_nm: Stack-overflow in mmo_get_symbols
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Stability-Memory-AddressSanitizer,
Unreproducible
retention:  Component default
Disclosure:  Oct 18, 2022
Project:  binutils
Reported:  Jul 20, 2022


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42513625
Unsubscribe from this issue.


Re: Issue 42535200: binutils:fuzz_as: Unexpected-exit in xexit

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42535200

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42535200 binutils:fuzz_as: Unexpected-exit in xexit
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer
retention:  Component default
Disclosure:  Aug 5, 2024
Project:  binutils
Reported:  May 5, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42535200
Unsubscribe from this issue.


Re: Issue 42526384: binutils:fuzz_dwarf: Out-of-memory in fuzz_dwarf

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42526384

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42526384 binutils:fuzz_dwarf: Out-of-memory in fuzz_dwarf
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer
retention:  Component default
Disclosure:  Oct 19, 2023
Project:  binutils
Reported:  Jul 21, 2023


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42526384
Unsubscribe from this issue.


Re: Issue 42504338: binutils:fuzz_strings: Timeout in fuzz_strings

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42504338

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42504338 binutils:fuzz_strings: Timeout in fuzz_strings
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Unreproducible
retention:  Component default
Disclosure:  Feb 9, 2022
Project:  binutils
Reported:  Nov 11, 2021


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42504338
Unsubscribe from this issue.


Re: Issue 42526920: binutils:fuzz_as: Unexpected-exit in xexit

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42526920

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42526920 binutils:fuzz_as: Unexpected-exit in xexit
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer
retention:  Component default
Disclosure:  Nov 6, 2023
Project:  binutils
Reported:  Aug 7, 2023


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42526920
Unsubscribe from this issue.


Re: Issue 42522272: binutils:fuzz_as: Stack-overflow in symbol_clone_if_forward_ref

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42522272

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42522272 binutils:fuzz_as: Stack-overflow in
symbol_clone_if_forward_ref
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Jun 13, 2023
Project:  binutils
Reported:  Mar 15, 2023


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42522272
Unsubscribe from this issue.


Re: Issue 42523001: binutils:fuzz_addr2line: Out-of-memory in fuzz_addr2line

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42523001

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42523001 binutils:fuzz_addr2line: Out-of-memory in
fuzz_addr2line
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer
retention:  Component default
Disclosure:  Jul 4, 2023
Project:  binutils
Reported:  Apr 5, 2023


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42523001
Unsubscribe from this issue.


Re: Issue 42521654: binutils:fuzz_as: Stack-overflow in expr

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42521654

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42521654 binutils:fuzz_as: Stack-overflow in expr
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  May 31, 2023
Project:  binutils
Reported:  Mar 2, 2023


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42521654
Unsubscribe from this issue.


Re: Issue 42523759: binutils:fuzz_as: Unexpected-exit in xexit

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42523759

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42523759 binutils:fuzz_as: Unexpected-exit in xexit
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer
retention:  Component default
Disclosure:  Jul 26, 2023
Project:  binutils
Reported:  Apr 27, 2023


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42523759
Unsubscribe from this issue.


Re: Issue 42521568: binutils:fuzz_as: Timeout in fuzz_as

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42521568

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42521568 binutils:fuzz_as: Timeout in fuzz_as
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer
retention:  Component default
Disclosure:  May 29, 2023
Project:  binutils
Reported:  Feb 28, 2023


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42521568
Unsubscribe from this issue.


Re: Issue 42529636: binutils:fuzz_as: Out-of-memory in fuzz_as

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42529636

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42529636 binutils:fuzz_as: Out-of-memory in fuzz_as
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer
retention:  Component default
Disclosure:  Jan 29, 2024
Project:  binutils
Reported:  Oct 29, 2023


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42529636
Unsubscribe from this issue.


Re: Issue 42532822: binutils:fuzz_objdump_safe: Out-of-memory in fuzz_objdump_safe

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42532822

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42532822 binutils:fuzz_objdump_safe: Out-of-memory in
fuzz_objdump_safe
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible
retention:  Component default
Disclosure:  May 8, 2024
Project:  binutils
Reported:  Feb 8, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42532822
Unsubscribe from this issue.


Re: Issue 42532020: binutils:fuzz_as: Heap-use-after-free in symbol_get_frag

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42532020

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42532020 binutils:fuzz_as: Heap-use-after-free in
symbol_get_frag
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Vulnerability
access level:  Default access
priority:  P2
severity:  S1
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Apr 16, 2024
Project:  binutils
Reported:  Jan 17, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42532020
Unsubscribe from this issue.


Re: Issue 42536007: binutils:fuzz_as: Stack-overflow in snapshot_symbol

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42536007

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42536007 binutils:fuzz_as: Stack-overflow in snapshot_symbol
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Sep 2, 2024
Project:  binutils
Reported:  Jun 4, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42536007
Unsubscribe from this issue.


Re: Issue 42537675: binutils:fuzz_as: Integer-overflow in resolve_symbol_value

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42537675

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42537675 binutils:fuzz_as: Integer-overflow in
resolve_symbol_value
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer,
Stability-UndefinedBehaviorSanitizer
retention:  Component default
Disclosure:  Nov 4, 2024
Project:  binutils
Reported:  Aug 4, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42537675
Unsubscribe from this issue.


Re: Issue 42538350: binutils:fuzz_windres: Null-dereference READ in ubsan_GetStackTrace

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42538350

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42538350 binutils:fuzz_windres: Null-dereference READ in
ubsan_GetStackTrace
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Limited visibility
priority:  P2
severity:  S1
hotlist:  ClusterFuzz, Reproducible, Stability-UndefinedBehaviorSanitizer
retention:  Component default
Disclosure:  Dec 12, 2024
Project:  binutils
Reported:  Sep 13, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42538350
Unsubscribe from this issue.


Re: Issue 42537956: binutils:fuzz_windres: Null-dereference READ in fuzz_windres

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42537956

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42537956 binutils:fuzz_windres: Null-dereference READ in
fuzz_windres
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Default access
priority:  P2
severity:  S1
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible,
Stability-Memory-MemorySanitizer
retention:  Component default
Disclosure:  Nov 14, 2024
Project:  binutils
Reported:  Aug 16, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42537956
Unsubscribe from this issue.


Re: Issue 42537272: binutils:fuzz_nm: Out-of-memory in fuzz_nm

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42537272

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42537272 binutils:fuzz_nm: Out-of-memory in fuzz_nm
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible
retention:  Component default
Disclosure:  Oct 21, 2024
Project:  binutils
Reported:  Jul 21, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42537272
Unsubscribe from this issue.


Re: Issue 42536560: binutils:fuzz_objdump: Timeout in fuzz_objdump

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42536560

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42536560 binutils:fuzz_objdump: Timeout in fuzz_objdump
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer
retention:  Component default
Disclosure:  Sep 25, 2024
Project:  binutils
Reported:  Jun 27, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42536560
Unsubscribe from this issue.


Re: Issue 42532216: binutils:fuzz_objdump_safe: Timeout in fuzz_objdump_safe

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42532216

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42532216 binutils:fuzz_objdump_safe: Timeout in
fuzz_objdump_safe
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer
retention:  Component default
Disclosure:  Apr 22, 2024
Project:  binutils
Reported:  Jan 21, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42532216
Unsubscribe from this issue.


Re: Issue 42536662: binutils:fuzz_as: Use-of-uninitialized-value in output_insn

2024-11-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42536662

Changed
cc (+):  bug-binutils@gnu.org

___

Reference Info: 42536662 binutils:fuzz_as: Use-of-uninitialized-value in
output_insn
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Default access
priority:  P2
severity:  S2
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer,
Stability-Memory-MemorySanitizer
retention:  Component default
Disclosure:  Sep 30, 2024
Project:  binutils
Reported:  Jul 2, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42536662
Unsubscribe from this issue.


Issue 380409703: binutils: Coverage build failure

2024-11-24 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/380409703

Reference Info: 380409703 binutils: Coverage build failure
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
type:  Bug
access level:  Default access
priority:  P4
severity:  S4
retention:  Component default

87...@developer.gserviceaccount.com added comment #1:
The last 3 builds for binutils have been failing.
Build log:
https://oss-fuzz-build-logs.storage.googleapis.com/log-97262ebd-88ca-4a89-a0bc-31a6d6ccd8c6.txt
Build type: coverage

To reproduce locally, please see:
https://google.github.io/oss-fuzz/advanced-topics/reproducing#reproducing-build-failures

**This bug tracker is not being monitored by OSS-Fuzz team.** If you have
any questions, please create an issue at
https://github.com/google/oss-fuzz/issues/new.

**This bug will be automatically closed within a day once it is fixed.**


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 380409703
Unsubscribe from this issue.


Re: Issue 42521563: binutils:fuzz_as: Stack-overflow in operand

2024-11-25 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42521563

Changed
status:  New → Not Reproducible

87...@developer.gserviceaccount.com added comment #7:
ClusterFuzz testcase 6479969347043328 is flaky and no longer crashes, so
closing issue.

If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
___

Reference Info: 42521563 binutils:fuzz_as: Stack-overflow in operand
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Not Reproducible
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer, Unreproducible
retention:  Component default
Disclosure:  May 29, 2023
Project:  binutils
Reported:  Feb 28, 2023


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42521563
Unsubscribe from this issue.


Re: Issue 380409703: binutils: Coverage build failure

2024-12-03 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/380409703

Changed

87...@developer.gserviceaccount.com added comment #2:
Friendly reminder that the build is still failing.
Please try to fix this failure to ensure that fuzzing remains productive.
Latest build log:
https://oss-fuzz-build-logs.storage.googleapis.com/log-cc7b8a24-783d-45aa-b2d6-0896e96e7871.txt

___

Reference Info: 380409703 binutils: Coverage build failure
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
type:  Bug
access level:  Default access
priority:  P4
severity:  S4
retention:  Component default


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 380409703
Unsubscribe from this issue.


Re: Issue 42538350: binutils:fuzz_windres: Null-dereference READ in ubsan_GetStackTrace

2024-12-05 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42538350

Changed

pe...@google.com added comment #5:

This bug is approaching its deadline for being fixed, and will be
automatically derestricted within 7 days. If a fix is planned within 2
weeks after the deadline has passed, a grace extension can be granted.

___

Reference Info: 42538350 binutils:fuzz_windres: Null-dereference READ in
ubsan_GetStackTrace
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Limited visibility
priority:  P2
severity:  S1
hotlist:  ClusterFuzz, Reproducible, Stability-UndefinedBehaviorSanitizer
retention:  Component default
Disclosure:  Dec 12, 2024
Project:  binutils
Reported:  Sep 13, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42538350
Unsubscribe from this issue.


Issue 382804867: binutils:fuzz_as: Stack-overflow in operand

2024-12-08 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/382804867

Reference Info: 382804867 binutils:fuzz_as: Stack-overflow in operand
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Project:  binutils
Reported:  Dec 8, 2024

87...@developer.gserviceaccount.com added comment #1:
Detailed Report: https://oss-fuzz.com/testcase?key=5809034663362560

Project: binutils
Fuzzing Engine: honggfuzz
Fuzz Target: fuzz_as
Job Type: honggfuzz_asan_binutils
Platform Id: linux

Crash Type: Stack-overflow
Crash Address: 0x7ffc1b5bef94
Crash State:
  operand

Sanitizer: address (ASAN)

Regressed:
https://oss-fuzz.com/revisions?job=honggfuzz_asan_binutils&range=202203170611:202203180606

Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=5809034663362560

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any
other feedback, please file an issue at
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail
issues are not monitored.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 382804867
Unsubscribe from this issue.


Re: Issue 380409703: binutils: Coverage build failure

2024-12-09 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/380409703

Changed

87...@developer.gserviceaccount.com added comment #3:
Friendly reminder that the build is still failing.
Please try to fix this failure to ensure that fuzzing remains productive.
Latest build log:
https://oss-fuzz-build-logs.storage.googleapis.com/log-177d54da-8d08-4f7c-b7b8-1ba09100311a.txt

___

Reference Info: 380409703 binutils: Coverage build failure
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
type:  Bug
access level:  Default access
priority:  P4
severity:  S4
retention:  Component default


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 380409703
Unsubscribe from this issue.


Re: Issue 382804867: binutils:fuzz_as: Stack-overflow in operand

2024-12-08 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/382804867

Changed
Disclosure:   → Mar 10, 2025

___

Reference Info: 382804867 binutils:fuzz_as: Stack-overflow in operand
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Mar 10, 2025
Project:  binutils
Reported:  Dec 8, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 382804867
Unsubscribe from this issue.


Re: Issue 385993741: binutils:fuzz_as: Use-of-uninitialized-value in macro_del_f

2024-12-27 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/385993741

Changed
Disclosure:   → Mar 27, 2025

___

Reference Info: 385993741 binutils:fuzz_as: Use-of-uninitialized-value in
macro_del_f
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Limited visibility
priority:  P2
severity:  S2
hotlist:  Reproducible, Stability-LibFuzzer,
Stability-Memory-MemorySanitizer
retention:  Component default
Disclosure:  Mar 27, 2025
Project:  binutils
Reported:  Dec 27, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 385993741
Unsubscribe from this issue.


Re: Issue 385406651: binutils:fuzz_as: Index-out-of-bounds in do_scrub_chars

2024-12-26 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/385406651

Changed
status:  New → Verified
assignee:   → cl...@appspot.gserviceaccount.com
verifier:   → cl...@appspot.gserviceaccount.com

87...@developer.gserviceaccount.com added comment #2:
ClusterFuzz testcase 6188017831706624 is verified as fixed in
https://oss-fuzz.com/revisions?job=libfuzzer_ubsan_binutils&range=202412250604:202412260603

If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
___

Reference Info: 385406651 binutils:fuzz_as: Index-out-of-bounds in
do_scrub_chars
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Limited visibility
priority:  P2
severity:  S2
hotlist:  Reproducible, Stability-LibFuzzer,
Stability-UndefinedBehaviorSanitizer
retention:  Component default
Disclosure:  Mar 24, 2025
Project:  binutils
Reported:  Dec 24, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 385406651
Unsubscribe from this issue.


Issue 385993741: binutils:fuzz_as: Use-of-uninitialized-value in macro_del_f

2024-12-27 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/385993741

Reference Info: 385993741 binutils:fuzz_as: Use-of-uninitialized-value in
macro_del_f
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Limited visibility
priority:  P2
severity:  S2
hotlist:  Reproducible, Stability-LibFuzzer,
Stability-Memory-MemorySanitizer
retention:  Component default
Project:  binutils
Reported:  Dec 27, 2024

87...@developer.gserviceaccount.com added comment #1:
Detailed Report: https://oss-fuzz.com/testcase?key=6754255549038592

Project: binutils
Fuzzing Engine: libFuzzer
Fuzz Target: fuzz_as
Job Type: libfuzzer_msan_binutils
Platform Id: linux

Crash Type: Use-of-uninitialized-value
Crash Address:
Crash State:
  macro_del_f
  htab_delete
  macro_end

Sanitizer: memory (MSAN)

Recommended Security Severity: Medium

Regressed:
https://oss-fuzz.com/revisions?job=libfuzzer_msan_binutils&range=202412181419:202412230607

Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=6754255549038592

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any
other feedback, please file an issue at
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail
issues are not monitored.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 385993741
Unsubscribe from this issue.


Re: Issue 385406651: binutils:fuzz_as: Index-out-of-bounds in do_scrub_chars

2024-12-26 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/385406651

Changed
access level:  Limited visibility → Default access

pe...@google.com added comment #3:

This bug has been fixed. It has been opened to the public.

___

Reference Info: 385406651 binutils:fuzz_as: Index-out-of-bounds in
do_scrub_chars
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Default access
priority:  P2
severity:  S2
hotlist:  ClusterFuzz-Verified, Reproducible, Stability-LibFuzzer,
Stability-UndefinedBehaviorSanitizer
retention:  Component default
Disclosure:  Mar 24, 2025
Project:  binutils
Reported:  Dec 24, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 385406651
Unsubscribe from this issue.


Re: Issue 42536662: binutils:fuzz_as: Use-of-uninitialized-value in output_insn

2024-12-24 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42536662

Changed
status:  New → Verified
assignee:   → cl...@appspot.gserviceaccount.com
verifier:   → cl...@appspot.gserviceaccount.com

87...@developer.gserviceaccount.com added comment #6:
ClusterFuzz testcase 4536948775518208 is verified as fixed in
https://oss-fuzz.com/revisions?job=libfuzzer_msan_binutils&range=202412181419:202412230607

If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
___

Reference Info: 42536662 binutils:fuzz_as: Use-of-uninitialized-value in
output_insn
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Default access
priority:  P2
severity:  S2
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer,
Stability-Memory-MemorySanitizer
retention:  Component default
Disclosure:  Sep 30, 2024
Project:  binutils
Reported:  Jul 2, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42536662
Unsubscribe from this issue.


Re: Issue 42523759: binutils:fuzz_as: Unexpected-exit in xexit

2025-02-05 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42523759

Changed
status:  New → Verified
assignee:   → cl...@appspot.gserviceaccount.com
verifier:   → cl...@appspot.gserviceaccount.com

87...@developer.gserviceaccount.com added comment #6:
ClusterFuzz testcase 6399707244265472 is verified as fixed in
https://oss-fuzz.com/revisions?job=libfuzzer_ubsan_binutils&range=202502030631:202502040623

If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
___

Reference Info: 42523759 binutils:fuzz_as: Unexpected-exit in xexit
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer
retention:  Component default
Disclosure:  Jul 26, 2023
Project:  binutils
Reported:  Apr 27, 2023


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42523759
Unsubscribe from this issue.


Re: Issue 394463498: binutils:fuzz_as: Unexpected-exit in xexit

2025-02-05 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/394463498

Changed
Disclosure:   → May 6, 2025

___

Reference Info: 394463498 binutils:fuzz_as: Unexpected-exit in xexit
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-LibFuzzer
retention:  Component default
Disclosure:  May 6, 2025
Project:  binutils
Reported:  Feb 5, 2025


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 394463498
Unsubscribe from this issue.


Issue 394463498: binutils:fuzz_as: Unexpected-exit in xexit

2025-02-05 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/394463498

Reference Info: 394463498 binutils:fuzz_as: Unexpected-exit in xexit
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-LibFuzzer
retention:  Component default
Project:  binutils
Reported:  Feb 5, 2025

87...@developer.gserviceaccount.com added comment #1:
Detailed Report: https://oss-fuzz.com/testcase?key=4992027454210048

Project: binutils
Fuzzing Engine: libFuzzer
Fuzz Target: fuzz_as
Job Type: libfuzzer_ubsan_binutils
Platform Id: linux

Crash Type: Unexpected-exit
Crash Address:
Crash State:
  xexit
  as_abort
  parse_register

Sanitizer: undefined (UBSAN)

Regressed:
https://oss-fuzz.com/revisions?job=libfuzzer_ubsan_binutils&range=202301110611:202301120617

Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=4992027454210048

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any
other feedback, please file an issue at
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail
issues are not monitored.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 394463498
Unsubscribe from this issue.


Re: Issue 42524981: binutils:fuzz_as: Heap-use-after-free in hash_symbol_entry

2025-02-11 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42524981

Changed
status:  New → Verified
assignee:   → cl...@appspot.gserviceaccount.com
verifier:   → cl...@appspot.gserviceaccount.com

87...@developer.gserviceaccount.com added comment #6:
ClusterFuzz testcase 6268463220654080 is verified as fixed in
https://oss-fuzz.com/revisions?job=libfuzzer_asan_binutils&range=202502090628:202502100630

If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
___

Reference Info: 42524981 binutils:fuzz_as: Heap-use-after-free in
hash_symbol_entry
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Vulnerability
access level:  Default access
priority:  P2
severity:  S2
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Aug 30, 2023
Project:  binutils
Reported:  Jun 1, 2023


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42524981
Unsubscribe from this issue.


Issue 383599617: binutils:fuzz_objdump: Out-of-memory in fuzz_objdump

2024-12-11 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/383599617

Reference Info: 383599617 binutils:fuzz_objdump: Out-of-memory in
fuzz_objdump
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible
retention:  Component default
Project:  binutils
Reported:  Dec 12, 2024

87...@developer.gserviceaccount.com added comment #1:
Detailed Report: https://oss-fuzz.com/testcase?key=4554695649067008

Project: binutils
Fuzzing Engine: libFuzzer
Fuzz Target: fuzz_objdump
Job Type: libfuzzer_asan_binutils
Platform Id: linux

Crash Type: Out-of-memory (exceeds 2560 MB)
Crash Address:
Crash State:
  fuzz_objdump

Sanitizer: address (ASAN)

Regressed:
https://oss-fuzz.com/revisions?job=libfuzzer_asan_binutils&range=202404170611:202404180621

Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=4554695649067008

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any
other feedback, please file an issue at
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail
issues are not monitored.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 383599617
Unsubscribe from this issue.


Re: Issue 383599617: binutils:fuzz_objdump: Out-of-memory in fuzz_objdump

2024-12-12 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/383599617

Changed
Disclosure:   → Mar 12, 2025

___

Reference Info: 383599617 binutils:fuzz_objdump: Out-of-memory in
fuzz_objdump
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible
retention:  Component default
Disclosure:  Mar 12, 2025
Project:  binutils
Reported:  Dec 12, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 383599617
Unsubscribe from this issue.


Re: Issue 42538350: binutils:fuzz_windres: Null-dereference READ in ubsan_GetStackTrace

2024-12-12 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42538350

Changed
access level:  Limited visibility → Default access
hotlist (-):  Deadline-Approaching
hotlist (+):  Deadline-Exceeded

pe...@google.com added comment #6:

This bug has exceeded our disclosure deadline. It has been opened to the
public.

___

Reference Info: 42538350 binutils:fuzz_windres: Null-dereference READ in
ubsan_GetStackTrace
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Default access
priority:  P2
severity:  S1
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible,
Stability-UndefinedBehaviorSanitizer
retention:  Component default
Disclosure:  Dec 12, 2024
Project:  binutils
Reported:  Sep 13, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42538350
Unsubscribe from this issue.


Re: Issue 42537675: binutils:fuzz_as: Integer-overflow in resolve_symbol_value

2024-12-14 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42537675

Changed
status:  New → Verified
assignee:   → cl...@appspot.gserviceaccount.com
verifier:   → cl...@appspot.gserviceaccount.com

87...@developer.gserviceaccount.com added comment #6:
ClusterFuzz testcase 4749140595113984 is verified as fixed in
https://oss-fuzz.com/revisions?job=libfuzzer_ubsan_binutils&range=202412120619:202412142128

If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
___

Reference Info: 42537675 binutils:fuzz_as: Integer-overflow in
resolve_symbol_value
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer,
Stability-UndefinedBehaviorSanitizer
retention:  Component default
Disclosure:  Nov 4, 2024
Project:  binutils
Reported:  Aug 4, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42537675
Unsubscribe from this issue.


Re: Issue 380409703: binutils: Coverage build failure

2024-12-16 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/380409703

Changed

87...@developer.gserviceaccount.com added comment #4:
Friendly reminder that the build is still failing.
Please try to fix this failure to ensure that fuzzing remains productive.
Latest build log:
https://oss-fuzz-build-logs.storage.googleapis.com/log-e65cf992-5dd1-4b70-ac3e-e46c1549cd85.txt

___

Reference Info: 380409703 binutils: Coverage build failure
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
type:  Bug
access level:  Default access
priority:  P4
severity:  S4
retention:  Component default


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 380409703
Unsubscribe from this issue.


Re: Issue 42526920: binutils:fuzz_as: Unexpected-exit in xexit

2025-01-10 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42526920

Changed
status:  New → Verified
assignee:   → cl...@appspot.gserviceaccount.com
verifier:   → cl...@appspot.gserviceaccount.com

87...@developer.gserviceaccount.com added comment #7:
ClusterFuzz testcase 6279437219135488 is verified as fixed in
https://oss-fuzz.com/revisions?job=libfuzzer_ubsan_binutils&range=202501080628:202501090650

If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
___

Reference Info: 42526920 binutils:fuzz_as: Unexpected-exit in xexit
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer
retention:  Component default
Disclosure:  Nov 6, 2023
Project:  binutils
Reported:  Aug 7, 2023


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42526920
Unsubscribe from this issue.


Re: Issue 389333858: binutils:fuzz_as: Unexpected-exit in xexit

2025-01-12 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/389333858

Changed
Disclosure:   → Apr 14, 2025

___

Reference Info: 389333858 binutils:fuzz_as: Unexpected-exit in xexit
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Apr 14, 2025
Project:  binutils
Reported:  Jan 12, 2025


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 389333858
Unsubscribe from this issue.


Issue 389333858: binutils:fuzz_as: Unexpected-exit in xexit

2025-01-12 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/389333858

Reference Info: 389333858 binutils:fuzz_as: Unexpected-exit in xexit
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Project:  binutils
Reported:  Jan 12, 2025

87...@developer.gserviceaccount.com added comment #1:
Detailed Report: https://oss-fuzz.com/testcase?key=6138078061723648

Project: binutils
Fuzzing Engine: libFuzzer
Fuzz Target: fuzz_as
Job Type: libfuzzer_asan_binutils
Platform Id: linux

Crash Type: Unexpected-exit
Crash Address:
Crash State:
  xexit
  xmalloc_failed
  xmalloc

Sanitizer: address (ASAN)

Regressed:
https://oss-fuzz.com/revisions?job=libfuzzer_asan_binutils&range=202206030600:202206040601

Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=6138078061723648

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any
other feedback, please file an issue at
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail
issues are not monitored.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 389333858
Unsubscribe from this issue.


Re: Issue 391962468: binutils:fuzz_nm: Abrt in objalloc_free_block

2025-01-24 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/391962468

Changed
Disclosure:   → Apr 24, 2025

___

Reference Info: 391962468 binutils:fuzz_nm: Abrt in objalloc_free_block
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Apr 24, 2025
Project:  binutils
Reported:  Jan 24, 2025


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 391962468
Unsubscribe from this issue.


Issue 391962468: binutils:fuzz_nm: Abrt in objalloc_free_block

2025-01-24 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/391962468

Reference Info: 391962468 binutils:fuzz_nm: Abrt in objalloc_free_block
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-Memory-AddressSanitizer
retention:  Component default
Project:  binutils
Reported:  Jan 24, 2025

87...@developer.gserviceaccount.com added comment #1:
Detailed Report: https://oss-fuzz.com/testcase?key=6507513003966464

Project: binutils
Fuzzing Engine: libFuzzer
Fuzz Target: fuzz_nm
Job Type: libfuzzer_asan_binutils
Platform Id: linux

Crash Type: Abrt
Crash Address: 0x05390441
Crash State:
  objalloc_free_block
  _bfd_coff_free_cached_info
  _bfd_delete_bfd

Sanitizer: address (ASAN)

Regressed:
https://oss-fuzz.com/revisions?job=libfuzzer_asan_binutils&range=202501230627:202501240617

Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=6507513003966464

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any
other feedback, please file an issue at
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail
issues are not monitored.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 391962468
Unsubscribe from this issue.


Re: Issue 391962468: binutils:fuzz_nm: Abrt in objalloc_free_block

2025-01-25 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/391962468

Changed
status:  New → Verified
assignee:   → cl...@appspot.gserviceaccount.com
verifier:   → cl...@appspot.gserviceaccount.com

87...@developer.gserviceaccount.com added comment #2:
ClusterFuzz testcase 6507513003966464 is verified as fixed in
https://oss-fuzz.com/revisions?job=libfuzzer_asan_binutils&range=202501240617:202501250617

If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
___

Reference Info: 391962468 binutils:fuzz_nm: Abrt in objalloc_free_block
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Apr 24, 2025
Project:  binutils
Reported:  Jan 24, 2025


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 391962468
Unsubscribe from this issue.


Issue 390467759: binutils:fuzz_objcopy: Heap-double-free in fuzz_objcopy.c

2025-01-17 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/390467759

Reference Info: 390467759 binutils:fuzz_objcopy: Heap-double-free in
fuzz_objcopy.c
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Limited visibility
priority:  P2
severity:  S1
hotlist:  Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Project:  binutils
Reported:  Jan 17, 2025

87...@developer.gserviceaccount.com added comment #1:
Detailed Report: https://oss-fuzz.com/testcase?key=6614335023022080

Project: binutils
Fuzzing Engine: libFuzzer
Fuzz Target: fuzz_objcopy
Job Type: libfuzzer_asan_binutils
Platform Id: linux

Crash Type: Heap-double-free
Crash Address: 0x502000d0
Crash State:
  fuzz_objcopy.c
  tekhex_write_object_contents
  bfd_close

Sanitizer: address (ASAN)

Recommended Security Severity: High

Regressed:
https://oss-fuzz.com/revisions?job=libfuzzer_asan_binutils&range=202501160649:202501170634

Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=6614335023022080

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any
other feedback, please file an issue at
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail
issues are not monitored.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 390467759
Unsubscribe from this issue.


Re: Issue 390467759: binutils:fuzz_objcopy: Heap-double-free in fuzz_objcopy.c

2025-01-18 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/390467759

Changed
access level:  Limited visibility → Default access
Disclosure:   → Apr 17, 2025

pe...@google.com added comment #3:

This bug has been fixed. It has been opened to the public.

___

Reference Info: 390467759 binutils:fuzz_objcopy: Heap-double-free in
fuzz_objcopy.c
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Default access
priority:  P2
severity:  S1
hotlist:  ClusterFuzz-Verified, Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Apr 17, 2025
Project:  binutils
Reported:  Jan 17, 2025


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 390467759
Unsubscribe from this issue.


Re: Issue 390465673: binutils:fuzz_objcopy: Abrt in fuzz_objcopy.c

2025-01-18 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/390465673

Changed
access level:  Limited visibility → Default access
Disclosure:   → Apr 17, 2025

pe...@google.com added comment #3:

This bug has been fixed. It has been opened to the public.

___

Reference Info: 390465673 binutils:fuzz_objcopy: Abrt in fuzz_objcopy.c
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz-Verified, Reproducible, Stability-LibFuzzer,
Stability-UndefinedBehaviorSanitizer
retention:  Component default
Disclosure:  Apr 17, 2025
Project:  binutils
Reported:  Jan 17, 2025


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 390465673
Unsubscribe from this issue.


Re: Issue 390467759: binutils:fuzz_objcopy: Heap-double-free in fuzz_objcopy.c

2025-01-18 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/390467759

Changed
status:  New → Verified
assignee:   → cl...@appspot.gserviceaccount.com
verifier:   → cl...@appspot.gserviceaccount.com

87...@developer.gserviceaccount.com added comment #2:
ClusterFuzz testcase 6614335023022080 is verified as fixed in
https://oss-fuzz.com/revisions?job=libfuzzer_asan_binutils&range=202501170634:202501180614

If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
___

Reference Info: 390467759 binutils:fuzz_objcopy: Heap-double-free in
fuzz_objcopy.c
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Limited visibility
priority:  P2
severity:  S1
hotlist:  Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Project:  binutils
Reported:  Jan 17, 2025


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 390467759
Unsubscribe from this issue.


Re: Issue 390465673: binutils:fuzz_objcopy: Abrt in fuzz_objcopy.c

2025-01-18 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/390465673

Changed
status:  New → Verified
assignee:   → cl...@appspot.gserviceaccount.com
verifier:   → cl...@appspot.gserviceaccount.com

87...@developer.gserviceaccount.com added comment #2:
ClusterFuzz testcase 6185252891983872 is verified as fixed in
https://oss-fuzz.com/revisions?job=libfuzzer_ubsan_binutils&range=202501170634:202501180614

If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
___

Reference Info: 390465673 binutils:fuzz_objcopy: Abrt in fuzz_objcopy.c
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-LibFuzzer,
Stability-UndefinedBehaviorSanitizer
retention:  Component default
Project:  binutils
Reported:  Jan 17, 2025


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 390465673
Unsubscribe from this issue.


Issue 390465673: binutils:fuzz_objcopy: Abrt in fuzz_objcopy.c

2025-01-17 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/390465673

Reference Info: 390465673 binutils:fuzz_objcopy: Abrt in fuzz_objcopy.c
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-LibFuzzer,
Stability-UndefinedBehaviorSanitizer
retention:  Component default
Project:  binutils
Reported:  Jan 17, 2025

87...@developer.gserviceaccount.com added comment #1:
Detailed Report: https://oss-fuzz.com/testcase?key=6185252891983872

Project: binutils
Fuzzing Engine: libFuzzer
Fuzz Target: fuzz_objcopy
Job Type: libfuzzer_ubsan_binutils
Platform Id: linux

Crash Type: Abrt
Crash Address: 0x0539039b
Crash State:
  fuzz_objcopy.c

Sanitizer: undefined (UBSAN)

Regressed:
https://oss-fuzz.com/revisions?job=libfuzzer_ubsan_binutils&range=202501160649:202501170634

Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=6185252891983872

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any
other feedback, please file an issue at
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail
issues are not monitored.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 390465673
Unsubscribe from this issue.


Re: Issue 391962468: binutils:fuzz_nm: Abrt in objalloc_free_block

2025-01-25 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/391962468

Changed
access level:  Limited visibility → Default access

pe...@google.com added comment #3:

This bug has been fixed. It has been opened to the public.

___

Reference Info: 391962468 binutils:fuzz_nm: Abrt in objalloc_free_block
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz-Verified, Reproducible,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Apr 24, 2025
Project:  binutils
Reported:  Jan 24, 2025


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 391962468
Unsubscribe from this issue.


Re: Issue 385993741: binutils:fuzz_as: Use-of-uninitialized-value in macro_del_f

2025-01-03 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/385993741

Changed
status:  New → Verified
assignee:   → cl...@appspot.gserviceaccount.com
verifier:   → cl...@appspot.gserviceaccount.com

87...@developer.gserviceaccount.com added comment #2:
ClusterFuzz testcase 6754255549038592 is verified as fixed in
https://oss-fuzz.com/revisions?job=libfuzzer_msan_binutils&range=202501020621:202501030618

If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
___

Reference Info: 385993741 binutils:fuzz_as: Use-of-uninitialized-value in
macro_del_f
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Limited visibility
priority:  P2
severity:  S2
hotlist:  Reproducible, Stability-LibFuzzer,
Stability-Memory-MemorySanitizer
retention:  Component default
Disclosure:  Mar 27, 2025
Project:  binutils
Reported:  Dec 27, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 385993741
Unsubscribe from this issue.


Re: Issue 386713387: binutils:fuzz_objcopy: Heap-use-after-free in bfd_errmsg

2025-01-04 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/386713387

Changed
status:  New → Verified
assignee:   → cl...@appspot.gserviceaccount.com
verifier:   → cl...@appspot.gserviceaccount.com

87...@developer.gserviceaccount.com added comment #2:
ClusterFuzz testcase 4818358834364416 is verified as fixed in
https://oss-fuzz.com/revisions?job=libfuzzer_asan_binutils&range=202501030618:202501040645

If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
___

Reference Info: 386713387 binutils:fuzz_objcopy: Heap-use-after-free in
bfd_errmsg
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Limited visibility
priority:  P2
severity:  S1
hotlist:  Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Apr 3, 2025
Project:  binutils
Reported:  Jan 3, 2025


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 386713387
Unsubscribe from this issue.


Issue 387378117: binutils:fuzz_dlltool: Direct-leak in xmalloc

2025-01-04 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/387378117

Reference Info: 387378117 binutils:fuzz_dlltool: Direct-leak in xmalloc
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer, Stability-Memory-LeakSanitizer
retention:  Component default
Project:  binutils
Reported:  Jan 4, 2025

87...@developer.gserviceaccount.com added comment #1:
Detailed Report: https://oss-fuzz.com/testcase?key=5498030657503232

Project: binutils
Fuzzing Engine: afl
Fuzz Target: fuzz_dlltool
Job Type: afl_asan_binutils
Platform Id: linux

Crash Type: Direct-leak
Crash Address:
Crash State:
  xmalloc
  xmemdup
  yylex

Sanitizer: address (ASAN)

Regressed:
https://oss-fuzz.com/revisions?job=afl_asan_binutils&range=202111060604:202111070608

Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=5498030657503232

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any
other feedback, please file an issue at
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail
issues are not monitored.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 387378117
Unsubscribe from this issue.


Issue 386713387: binutils:fuzz_objcopy: Heap-use-after-free in bfd_errmsg

2025-01-03 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/386713387

Reference Info: 386713387 binutils:fuzz_objcopy: Heap-use-after-free in
bfd_errmsg
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Limited visibility
priority:  P2
severity:  S1
hotlist:  Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Project:  binutils
Reported:  Jan 3, 2025

87...@developer.gserviceaccount.com added comment #1:
Detailed Report: https://oss-fuzz.com/testcase?key=4818358834364416

Project: binutils
Fuzzing Engine: libFuzzer
Fuzz Target: fuzz_objcopy
Job Type: libfuzzer_asan_binutils
Platform Id: linux

Crash Type: Heap-use-after-free READ 8
Crash Address: 0x5120d6c0
Crash State:
  bfd_errmsg
  bfd_nonfatal_message
  copy_file

Sanitizer: address (ASAN)

Recommended Security Severity: High

Regressed:
https://oss-fuzz.com/revisions?job=libfuzzer_asan_binutils&range=202501010658:202501020621

Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=4818358834364416

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any
other feedback, please file an issue at
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail
issues are not monitored.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 386713387
Unsubscribe from this issue.


Re: Issue 386713387: binutils:fuzz_objcopy: Heap-use-after-free in bfd_errmsg

2025-01-03 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/386713387

Changed
Disclosure:   → Apr 3, 2025

___

Reference Info: 386713387 binutils:fuzz_objcopy: Heap-use-after-free in
bfd_errmsg
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Limited visibility
priority:  P2
severity:  S1
hotlist:  Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Apr 3, 2025
Project:  binutils
Reported:  Jan 3, 2025


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 386713387
Unsubscribe from this issue.


Re: Issue 385993741: binutils:fuzz_as: Use-of-uninitialized-value in macro_del_f

2025-01-03 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/385993741

Changed
access level:  Limited visibility → Default access

pe...@google.com added comment #3:

This bug has been fixed. It has been opened to the public.

___

Reference Info: 385993741 binutils:fuzz_as: Use-of-uninitialized-value in
macro_del_f
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Default access
priority:  P2
severity:  S2
hotlist:  ClusterFuzz-Verified, Reproducible, Stability-LibFuzzer,
Stability-Memory-MemorySanitizer
retention:  Component default
Disclosure:  Mar 27, 2025
Project:  binutils
Reported:  Dec 27, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 385993741
Unsubscribe from this issue.


Re: Issue 387378117: binutils:fuzz_dlltool: Direct-leak in xmalloc

2025-01-04 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/387378117

Changed
Disclosure:   → Apr 4, 2025

___

Reference Info: 387378117 binutils:fuzz_dlltool: Direct-leak in xmalloc
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer, Stability-Memory-LeakSanitizer
retention:  Component default
Disclosure:  Apr 4, 2025
Project:  binutils
Reported:  Jan 4, 2025


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 387378117
Unsubscribe from this issue.


Re: Issue 386713387: binutils:fuzz_objcopy: Heap-use-after-free in bfd_errmsg

2025-01-05 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/386713387

Changed
access level:  Limited visibility → Default access

pe...@google.com added comment #3:

This bug has been fixed. It has been opened to the public.

___

Reference Info: 386713387 binutils:fuzz_objcopy: Heap-use-after-free in
bfd_errmsg
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Default access
priority:  P2
severity:  S1
hotlist:  ClusterFuzz-Verified, Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Apr 3, 2025
Project:  binutils
Reported:  Jan 3, 2025


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 386713387
Unsubscribe from this issue.


Issue 385406651: binutils:fuzz_as: Index-out-of-bounds in do_scrub_chars

2024-12-24 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/385406651

Reference Info: 385406651 binutils:fuzz_as: Index-out-of-bounds in
do_scrub_chars
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Limited visibility
priority:  P2
severity:  S2
hotlist:  Reproducible, Stability-LibFuzzer,
Stability-UndefinedBehaviorSanitizer
retention:  Component default
Project:  binutils
Reported:  Dec 24, 2024

87...@developer.gserviceaccount.com added comment #1:
Detailed Report: https://oss-fuzz.com/testcase?key=6188017831706624

Project: binutils
Fuzzing Engine: libFuzzer
Fuzz Target: fuzz_as
Job Type: libfuzzer_ubsan_binutils
Platform Id: linux

Crash Type: Index-out-of-bounds
Crash Address:
Crash State:
  do_scrub_chars
  sb_scrub_and_add_sb
  input_scrub_include_sb

Sanitizer: undefined (UBSAN)

Recommended Security Severity: Medium

Regressed:
https://oss-fuzz.com/revisions?job=libfuzzer_ubsan_binutils&range=202409110604:202409120603

Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=6188017831706624

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any
other feedback, please file an issue at
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail
issues are not monitored.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 385406651
Unsubscribe from this issue.


Re: Issue 385406651: binutils:fuzz_as: Index-out-of-bounds in do_scrub_chars

2024-12-25 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/385406651

Changed
Disclosure:   → Mar 24, 2025

___

Reference Info: 385406651 binutils:fuzz_as: Index-out-of-bounds in
do_scrub_chars
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Limited visibility
priority:  P2
severity:  S2
hotlist:  Reproducible, Stability-LibFuzzer,
Stability-UndefinedBehaviorSanitizer
retention:  Component default
Disclosure:  Mar 24, 2025
Project:  binutils
Reported:  Dec 24, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 385406651
Unsubscribe from this issue.


Re: Issue 380409703: binutils: Coverage build failure

2024-12-23 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/380409703

Changed
status:  New → Verified
assignee:   → cl...@appspot.gserviceaccount.com
verifier:   → cl...@appspot.gserviceaccount.com

87...@developer.gserviceaccount.com added comment #5:
The latest build has succeeded, closing this issue.
___

Reference Info: 380409703 binutils: Coverage build failure
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
type:  Bug
access level:  Default access
priority:  P4
severity:  S4
retention:  Component default


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 380409703
Unsubscribe from this issue.


Re: Issue 388571287: binutils:fuzz_disassemble: Abrt in riscv_disassemble_data

2025-01-10 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/388571287

Changed
Disclosure:   → Apr 9, 2025

___

Reference Info: 388571287 binutils:fuzz_disassemble: Abrt in
riscv_disassemble_data
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Apr 9, 2025
Project:  binutils
Reported:  Jan 9, 2025


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 388571287
Unsubscribe from this issue.


Issue 388571287: binutils:fuzz_disassemble: Abrt in riscv_disassemble_data

2025-01-09 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/388571287

Reference Info: 388571287 binutils:fuzz_disassemble: Abrt in
riscv_disassemble_data
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-Memory-AddressSanitizer
retention:  Component default
Project:  binutils
Reported:  Jan 9, 2025

87...@developer.gserviceaccount.com added comment #1:
Detailed Report: https://oss-fuzz.com/testcase?key=6139480624398336

Project: binutils
Fuzzing Engine: libFuzzer
Fuzz Target: fuzz_disassemble
Job Type: libfuzzer_asan_binutils
Platform Id: linux

Crash Type: Abrt
Crash Address: 0x05390488
Crash State:
  riscv_disassemble_data
  print_insn_riscv
  fuzz_disassemble.c

Sanitizer: address (ASAN)

Regressed:
https://oss-fuzz.com/revisions?job=libfuzzer_asan_binutils&range=202501080628:202501090650

Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=6139480624398336

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any
other feedback, please file an issue at
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail
issues are not monitored.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 388571287
Unsubscribe from this issue.


Re: Issue 42522865: binutils:fuzz_as: Direct-leak in xcalloc

2025-01-02 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42522865

Changed
status:  New → Verified
assignee:   → cl...@appspot.gserviceaccount.com
verifier:   → cl...@appspot.gserviceaccount.com

87...@developer.gserviceaccount.com added comment #6:
ClusterFuzz testcase 5107605721972736 is verified as fixed in
https://oss-fuzz.com/revisions?job=libfuzzer_asan_binutils&range=202501010658:202501020621

If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
___

Reference Info: 42522865 binutils:fuzz_as: Direct-leak in xcalloc
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer, Stability-Memory-LeakSanitizer
retention:  Component default
Disclosure:  Jun 30, 2023
Project:  binutils
Reported:  Apr 1, 2023


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42522865
Unsubscribe from this issue.


Re: Issue 42521654: binutils:fuzz_as: Stack-overflow in expr

2025-01-02 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42521654

Changed
status:  New → Verified
assignee:   → cl...@appspot.gserviceaccount.com
verifier:   → cl...@appspot.gserviceaccount.com

87...@developer.gserviceaccount.com added comment #6:
ClusterFuzz testcase 5591426684813312 is verified as fixed in
https://oss-fuzz.com/revisions?job=libfuzzer_asan_binutils&range=202501010658:202501020621

If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
___

Reference Info: 42521654 binutils:fuzz_as: Stack-overflow in expr
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Bug
access level:  Default access
priority:  P2
severity:  S4
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  May 31, 2023
Project:  binutils
Reported:  Mar 2, 2023


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42521654
Unsubscribe from this issue.


Re: Issue 42532020: binutils:fuzz_as: Heap-use-after-free in symbol_get_frag

2025-01-02 Thread buganizer-system

Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/42532020

Changed
status:  New → Verified
assignee:   → cl...@appspot.gserviceaccount.com
verifier:   → cl...@appspot.gserviceaccount.com

87...@developer.gserviceaccount.com added comment #6:
ClusterFuzz testcase 5748225541734400 is verified as fixed in
https://oss-fuzz.com/revisions?job=libfuzzer_asan_binutils&range=202501010658:202501020621

If this is incorrect, please file a bug on
https://github.com/google/oss-fuzz/issues/new
___

Reference Info: 42532020 binutils:fuzz_as: Heap-use-after-free in
symbol_get_frag
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  mo...@clusterfuzz-external.iam.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 3 more
type:  Vulnerability
access level:  Default access
priority:  P2
severity:  S1
hotlist:  ClusterFuzz, Deadline-Exceeded, Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Apr 16, 2024
Project:  binutils
Reported:  Jan 17, 2024


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 42532020
Unsubscribe from this issue.


  1   2   >