Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/476501089

Changed
access level:  Limited visibility → Default access
Disclosure:  <none> → Apr 20, 2026

[email protected] added comment #3:

This bug has been fixed. It has been opened to the public.

_______________________________

Reference Info: 476501089 binutils:fuzz_objdump_safe: Heap-buffer-overflow
in image_write
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  [email protected]
assignee:  [email protected]
verifier:  [email protected]
cc:  [email protected], [email protected], [email protected], and 2 more
collaborators:  [email protected]
type:  Vulnerability
access level:  Default access
priority:  P2
severity:  S2
hotlist:  ClusterFuzz-Verified, Reproducible,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Apr 20, 2026
Project:  binutils
Reported:  Jan 19, 2026


Generated by Google IssueTracker notification system.

Reply via email to