[Bug ld/32662] ld Out-of-bounds Read in _bfd_generic_link_output_symbols (bfd/linker.c:2211:34)

2025-02-09 Thread swj22 at mails dot tsinghua.edu.cn
https://sourceware.org/bugzilla/show_bug.cgi?id=32662 --- Comment #3 from 孙文举 --- (In reply to Alan Modra from comment #2) > Fixed for 2.45 Thx for your quilcy fixing! -- You are receiving this mail because: You are on the CC list for the bug.

[Bug ld/32663] ld heap-buffer-overflow in cache_bread_1 (bfd/cache.c:355:11)

2025-02-09 Thread swj22 at mails dot tsinghua.edu.cn
https://sourceware.org/bugzilla/show_bug.cgi?id=32663 --- Comment #3 from 孙文举 --- (In reply to Alan Modra from comment #2) > Fixed. This one isn't just something that can only occur with fuzzed input. Thx for your quicly fixing ! -- You are receiving this mail because: You are on the CC list

[Bug ld/32661] ld heap-buffer-overflow in _bfd_elf_gc_mark_rsec (/bfd/elflink.c:14052:13)

2025-02-08 Thread swj22 at mails dot tsinghua.edu.cn
https://sourceware.org/bugzilla/show_bug.cgi?id=32661 孙文举 changed: What|Removed |Added Status|UNCONFIRMED |RESOLVED Resolution|---

[Bug ld/32603] ld segv in bfd_set_format with -w -o XXX and no permissions for XXX

2025-02-08 Thread swj22 at mails dot tsinghua.edu.cn
https://sourceware.org/bugzilla/show_bug.cgi?id=32603 --- Comment #8 from 孙文举 --- *** Bug 32661 has been marked as a duplicate of this bug. *** -- You are receiving this mail because: You are on the CC list for the bug.

[Bug ld/32665] ld buffer-overflow in elf_x86_64_convert_load_reloc (bfd/elf64-x86-64.c:1821)

2025-02-08 Thread swj22 at mails dot tsinghua.edu.cn
https://sourceware.org/bugzilla/show_bug.cgi?id=32665 --- Comment #1 from 孙文举 --- Created attachment 15935 --> https://sourceware.org/bugzilla/attachment.cgi?id=15935&action=edit poc -- You are receiving this mail because: You are on the CC list for the bug.

[Bug ld/32665] New: ld buffer-overflow in elf_x86_64_convert_load_reloc (bfd/elf64-x86-64.c:1821)

2025-02-08 Thread swj22 at mails dot tsinghua.edu.cn
Severity: normal Priority: P2 Component: ld Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone: --- **Description** A segv can occur in ld when using the --version-exports-section option with a

[Bug ld/32664] New: ld buffer-overflow in _bfd_elf_strtab_offset (bfd/elf-strtab.c:292)

2025-02-08 Thread swj22 at mails dot tsinghua.edu.cn
Severity: normal Priority: P2 Component: ld Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone: --- Created attachment 15934 --> https://sourceware.org/bugzilla/attachment.cgi?id=15934&action=e

[Bug ld/32663] New: ld heap-buffer-overflow in cache_bread_1 (bfd/cache.c:355:11)

2025-02-08 Thread swj22 at mails dot tsinghua.edu.cn
: normal Priority: P2 Component: ld Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone: --- Created attachment 15933 --> https://sourceware.org/bugzilla/attachment.cgi?id=15933&action=e

[Bug ld/32662] New: ld Out-of-bounds Read in _bfd_generic_link_output_symbols (bfd/linker.c:2211:34)

2025-02-07 Thread swj22 at mails dot tsinghua.edu.cn
: UNCONFIRMED Severity: normal Priority: P2 Component: ld Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone: --- Created attachment 15932 --> https://sourceware.org/bugzilla/attachment.cgi

[Bug ld/32661] New: ld heap-buffer-overflow in _bfd_elf_gc_mark_rsec (/bfd/elflink.c:14052:13)

2025-02-07 Thread swj22 at mails dot tsinghua.edu.cn
Severity: normal Priority: P2 Component: ld Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone: --- Created attachment 15931 --> https://sourceware.org/bugzilla/attachment.cgi?id=15931&action=e

[Bug ld/32647] New: ld SEGV in elf_orphan_compatible (ld/ldelf.c:2089:40) with --task-link option

2025-02-05 Thread swj22 at mails dot tsinghua.edu.cn
Severity: normal Priority: P2 Component: ld Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone: --- Created attachment 15922 --> https://sourceware.org/bugzilla/attachment.cgi?id=15922&action=e

[Bug ld/32646] New: ld SEGV (illegal read access) in load_symbols (ld/ldlang.c:3061:7) with -w --defsym options

2025-02-05 Thread swj22 at mails dot tsinghua.edu.cn
: UNCONFIRMED Severity: normal Priority: P2 Component: ld Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone: --- Created attachment 15921 --> https://sourceware.org/bugzilla/attachment.cgi?id=15

[Bug ld/32638] ld SEGV in bfd_putl64 (bfd/libbfd.c:989:11)

2025-02-05 Thread swj22 at mails dot tsinghua.edu.cn
https://sourceware.org/bugzilla/show_bug.cgi?id=32638 --- Comment #3 from 孙文举 --- (In reply to Nick Clifton from comment #2) > Fixed. > > There was an assumption in the x86_64 backend of the BFD linker that if > dynamic relocs needed to be created the input file(s) would be well formed. > The c

[Bug ld/32641] ld SEGV (illegal read access) in _bfd_x86_elf_check_relocs (bfd/elfxx-x86.c:980:19) with -w option

2025-02-05 Thread swj22 at mails dot tsinghua.edu.cn
https://sourceware.org/bugzilla/show_bug.cgi?id=32641 --- Comment #3 from 孙文举 --- (In reply to Nick Clifton from comment #2) > Fixed. > > This was another case where the linker's code was assuming that relocations > and symbols were well formed and not checking for possible corruption. > > Note

[Bug ld/32640] ld SEGV in bfd_putl64 (bfd/libbfd.c:989:11) with -w option

2025-02-05 Thread swj22 at mails dot tsinghua.edu.cn
https://sourceware.org/bugzilla/show_bug.cgi?id=32640 --- Comment #2 from 孙文举 --- (In reply to Nick Clifton from comment #1) > This bug has been fixed at some point between the 2.43 and 2.44 releases. > (I did not perform a triage to find exactly which commit fixes the problem). > Anyway the po

[Bug ld/32645] New: ld SEGV (illegal read access) in yylex (ld/ldlex.l:488:26) -w -T options

2025-02-05 Thread swj22 at mails dot tsinghua.edu.cn
Severity: normal Priority: P2 Component: ld Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone: --- Created attachment 15920 --> https://sourceware.org/bugzilla/attachment.cgi?id=15920&action=e

[Bug ld/32644] New: ld SEGV (illegal read access) in bfd_elf_reloc_symbol_deleted_p (bfd/elflink.c:15103:19) --no-undefined --orphan-handling discard -w -r -d options

2025-02-05 Thread swj22 at mails dot tsinghua.edu.cn
-d options Product: binutils Version: 2.43 Status: UNCONFIRMED Severity: normal Priority: P2 Component: ld Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone

[Bug ld/32638] New: ld SEGV in bfd_putl64 (bfd/libbfd.c:989:11)

2025-02-05 Thread swj22 at mails dot tsinghua.edu.cn
Component: ld Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone: --- Created attachment 15914 --> https://sourceware.org/bugzilla/attachment.cgi?id=15914&action=edit poc **Description** A segv can occur in ld (part of b

[Bug ld/32643] New: ld SEGV (illegal read access) in _bfd_elf_gc_mark_rsec (bfd/elflink.c:14031:11) with --gc-sections --no-print-gc-sections -w options

2025-02-05 Thread swj22 at mails dot tsinghua.edu.cn
: binutils Version: 2.43 Status: UNCONFIRMED Severity: normal Priority: P2 Component: ld Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone: --- Created attachment 15918

[Bug ld/32641] New: ld SEGV (illegal read access) in _bfd_x86_elf_check_relocs (bfd/elfxx-x86.c:980:19) with -w option

2025-02-05 Thread swj22 at mails dot tsinghua.edu.cn
Status: UNCONFIRMED Severity: normal Priority: P2 Component: ld Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone: --- Created attachment 15916 --> https://sourceware.org/bugzi

[Bug ld/32642] New: ld SEGV (illegal read access) in _bfd_elf_write_section_eh_frame (bfd/elf-eh-frame.c:2234:29) with --gc-sections --gc-keep-exported option

2025-02-05 Thread swj22 at mails dot tsinghua.edu.cn
option Product: binutils Version: 2.43 Status: UNCONFIRMED Severity: normal Priority: P2 Component: ld Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone

[Bug ld/32640] New: ld SEGV in bfd_putl64 (bfd/libbfd.c:989:11) with -w option

2025-02-05 Thread swj22 at mails dot tsinghua.edu.cn
Priority: P2 Component: ld Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone: --- Created attachment 15915 --> https://sourceware.org/bugzilla/attachment.cgi?id=15915&action=edit poc **Description**

[Bug ld/32636] ld heap-buffer-overflow in _bfd_elf_gc_mark_rsec (bfd/elflink.c:14038:22)

2025-02-05 Thread swj22 at mails dot tsinghua.edu.cn
https://sourceware.org/bugzilla/show_bug.cgi?id=32636 --- Comment #5 from 孙文举 --- (In reply to Nick Clifton from comment #4) > Fixed. > > There was an assumption in the garbage collection code that an external > symbol index would always be valid. This PR demonstrates that that does not > alway

[Bug ld/32636] New: ld heap-buffer-overflow in _bfd_elf_gc_mark_rsec (bfd/elflink.c:14038:22)

2025-02-05 Thread swj22 at mails dot tsinghua.edu.cn
Severity: normal Priority: P2 Component: ld Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone: --- **Description** A heap-buffer-overflow can occur in ld (part of binutils 2.43) when using the -w and --gc

[Bug ld/32636] ld heap-buffer-overflow in _bfd_elf_gc_mark_rsec (bfd/elflink.c:14038:22)

2025-02-05 Thread swj22 at mails dot tsinghua.edu.cn
https://sourceware.org/bugzilla/show_bug.cgi?id=32636 --- Comment #1 from 孙文举 --- Created attachment 15913 --> https://sourceware.org/bugzilla/attachment.cgi?id=15913&action=edit poc -- You are receiving this mail because: You are on the CC list for the bug.

[Bug ld/32635] New: ld heap-buffer-overflow in _bfd_elf_gc_mark_rsec (bfd/elflink.c:14038:22)

2025-02-05 Thread swj22 at mails dot tsinghua.edu.cn
Severity: normal Priority: P2 Component: ld Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone: --- Created attachment 15912 --> https://sourceware.org/bugzilla/attachment.cgi?id=15912&acti

[Bug ld/32603] New: ld segv in bfd_set_format

2025-01-27 Thread swj22 at mails dot tsinghua.edu.cn
Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone: --- **Description** A segmentation fault (SEGV) occurs in the ld command when the -w and -o options are used simultaneously, and the file specified by the -o option either does not

[Bug binutils/32467] nm write memory caught segmentation fault

2025-01-22 Thread swj22 at mails dot tsinghua.edu.cn
https://sourceware.org/bugzilla/show_bug.cgi?id=32467 --- Comment #8 from 孙文举 --- Thank you for bringing this to my attention. I must apologize for not thoroughly reviewing the SECURITY.txt document before proceeding. I now understand that bugs in inspection tools, such as nm, are not considered

[Bug binutils/32467] nm write memory caught segmentation fault

2025-01-21 Thread swj22 at mails dot tsinghua.edu.cn
https://sourceware.org/bugzilla/show_bug.cgi?id=32467 --- Comment #6 from 孙文举 --- CVE-2024-57360 assigned -- You are receiving this mail because: You are on the CC list for the bug.

[Bug binutils/32576] ld memory leak in xmalloc

2025-01-19 Thread swj22 at mails dot tsinghua.edu.cn
https://sourceware.org/bugzilla/show_bug.cgi?id=32576 --- Comment #1 from 孙文举 --- **Step to reproduce** We configured `ld` using `CFLAGS="-g -fsanitize=address" ./configure --prefix=$(pwd)/ ` and build it using `make -j `, and run it with: ``` ./ld -w -- You are receiving this mail becaus

[Bug binutils/32576] New: ld memory leak in xmalloc

2025-01-19 Thread swj22 at mails dot tsinghua.edu.cn
Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone: --- Created attachment 15887 --> https://sourceware.org/bugzilla/attachment.cgi?id=15887&action=edit poc Hello, We are currently working on fuzz testing feature,

[Bug binutils/32560] New: stack-buffer-overflow at objdump disassemble_bytes (objdump.c:3543:34)

2025-01-14 Thread swj22 at mails dot tsinghua.edu.cn
: normal Priority: P2 Component: binutils Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone: --- Created attachment 15882 --> https://sourceware.org/bugzilla/attachment.cgi?id=15882&action=e

[Bug binutils/32556] New: nm address points to the zero page

2025-01-13 Thread swj22 at mails dot tsinghua.edu.cn
: binutils Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone: --- Created attachment 15881 --> https://sourceware.org/bugzilla/attachment.cgi?id=15881&action=edit file to trigger this bug This bug is found by my fuzze

[Bug binutils/32467] nm write memory caught segmentation fault

2024-12-16 Thread swj22 at mails dot tsinghua.edu.cn
https://sourceware.org/bugzilla/show_bug.cgi?id=32467 --- Comment #2 from 孙文举 --- (In reply to Nick Clifton from comment #1) > The problem is the one of the symbols contains an @ character: > > > _ZN1@SerialFOTBuilder12endExtensionERKN10FOTBuilder24CompoundExtensionFlowObj > E > > Because nm

[Bug binutils/32467] New: nm write memory caught segmentation fault

2024-12-16 Thread swj22 at mails dot tsinghua.edu.cn
: binutils Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone: --- Created attachment 15845 --> https://sourceware.org/bugzilla/attachment.cgi?id=15845&action=edit the file triggered the segmentation fault using

[Bug binutils/30513] nm-new hangs infinitly on a special test case.

2023-06-05 Thread swj22 at mails dot tsinghua.edu.cn
https://sourceware.org/bugzilla/show_bug.cgi?id=30513 --- Comment #2 from 孙文举 --- (In reply to Alan Modra from comment #1) > This is a problem demangling the rust symbol _RYODGYODGpe__RYODGpe. > Please report rust demangler bugs to https://gcc.gnu.org/bugzilla/ okey! thx for reply! I report the

[Bug binutils/30513] New: nm-new hangs infinitly on a special test case.

2023-06-05 Thread swj22 at mails dot tsinghua.edu.cn
Component: binutils Assignee: unassigned at sourceware dot org Reporter: swj22 at mails dot tsinghua.edu.cn Target Milestone: --- Created attachment 14917 --> https://sourceware.org/bugzilla/attachment.cgi?id=14917&action=edit the test case ## Write in front , i use