Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/441055980

Reference Info: 441055980 elfutils:fuzz-libdwfl: Heap-buffer-overflow in
gelf_getshdr
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  [email protected]
cc:  [email protected], [email protected], [email protected],
and 1 more
collaborators:  [email protected]
type:  Vulnerability
access level:  Default access
priority:  P2
severity:  S2
hotlist:  Reproducible, Stability-Memory-AddressSanitizer
retention:  Component default
Project:  elfutils
Reported:  Aug 25, 2025

[email protected] added comment #1:
Detailed Report: https://oss-fuzz.com/testcase?key=5433808192339968

Project: elfutils
Fuzzing Engine: libFuzzer
Fuzz Target: fuzz-libdwfl
Job Type: libfuzzer_asan_elfutils
Platform Id: linux

Crash Type: Heap-buffer-overflow READ {*}
Crash Address: 0x516000000bac
Crash State:
  gelf_getshdr
  __libdwfl_elf_address_range
  __libdwfl_report_elf

Sanitizer: address (ASAN)

Recommended Security Severity: Medium

Regressed:
https://oss-fuzz.com/revisions?job=libfuzzer_asan_elfutils&range=202508201802:202508210000

Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=5433808192339968

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any
other feedback, please file an issue at
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail
issues are not monitored.


Generated by Google IssueTracker notification system.

Reply via email to