Comment #2 on issue 44796 by amo...@gmail.com: binutils:fuzz_nm: Stack-overflow
in mmo_get_symbols
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=44796#c2
Won't fix this one. Fuzzed trie parsed by recursion in mmo_get_symbols can be
arbitrarily deep, unless some limit is imposed.
--
Y
Comment #3 on issue 44796 by p.ant...@catenacyber.fr: binutils:fuzz_nm:
Stack-overflow in mmo_get_symbols
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=44796#c3
If you wish, one way to fix this is to use `#ifdef
FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION` to have some limit on recursion
https://sourceware.org/bugzilla/show_bug.cgi?id=28965
H.J. Lu changed:
What|Removed |Added
Status|NEW |RESOLVED
Resolution|---
https://sourceware.org/bugzilla/show_bug.cgi?id=28965
--- Comment #1 from cvs-commit at gcc dot gnu.org ---
The master branch has been updated by H.J. Lu :
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=cac97c41c20c9866baecefbdc53976af1475f0a1
commit cac97c41c20c9866baecefbdc53976af
Updates:
Labels: -restrict-view-commit
Comment #3 on issue 44864 by sheriffbot: binutils:fuzz_objdump:
Heap-buffer-overflow in evax_bfd_print_dst
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=44864#c3
This bug has been fixed. It has been opened to the public.
- Your friendly She
https://sourceware.org/bugzilla/show_bug.cgi?id=28933
--- Comment #2 from Nick Alcock ---
FWIW, I cannot replicate this: not with the x86->ppc cross shown here, nor on
ppc native, nor on ppc64. Nonetheless we should armour against this. I'll see
what I can do...
--
You are receiving this mail b
https://sourceware.org/bugzilla/show_bug.cgi?id=28933
--- Comment #3 from Alan Modra ---
Created attachment 14023
--> https://sourceware.org/bugzilla/attachment.cgi?id=14023&action=edit
testcase object file
I built binutils on an Ubuntu 21.04 amd ryzen 9 box, configured with
CFLAGS="-g -O2 -f
https://sourceware.org/bugzilla/show_bug.cgi?id=28933
--- Comment #4 from Nick Alcock ---
Aha! Yep, that's got it. Thank you, your object file was very helpful. Now to
fix it...
--
You are receiving this mail because:
You are on the CC list for the bug.
https://sourceware.org/bugzilla/show_bug.cgi?id=28933
--- Comment #5 from Nick Alcock ---
This unchecked length is only an overrun in the uncompressed-and-corrupted
foreign-endian CTF case (it's still wrong if the CTF is uncompressed but
native-endian, but it's only used at serialization time, wh
Comment #2 on issue 43790 by amo...@gmail.com: binutils:fuzz_as:
Null-dereference READ in htab_find_slot
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43790#c2
This one is due to an error in the fuzzer. The NULL reference is to
macro_hash. macro_init needs to be called.
--
You recei
https://sourceware.org/bugzilla/show_bug.cgi?id=28977
Bug ID: 28977
Summary: tc-i386.c internal error in parse_register
Product: binutils
Version: 2.39 (HEAD)
Status: NEW
Severity: normal
Priority: P2
Component:
https://sourceware.org/bugzilla/show_bug.cgi?id=28977
Alan Modra changed:
What|Removed |Added
Target||x86_64-linux
--
You are receiving this
https://sourceware.org/bugzilla/show_bug.cgi?id=28977
--- Comment #1 from cvs-commit at gcc dot gnu.org ---
The master branch has been updated by Alan Modra :
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5fac3f02edacfca458f7ee33a87e26e0e332
commit 5fac3f02edacfca458f7ee33a
https://sourceware.org/bugzilla/show_bug.cgi?id=28977
Alan Modra changed:
What|Removed |Added
Resolution|--- |FIXED
Target Milestone|---
14 matches
Mail list logo