https://sourceware.org/bugzilla/show_bug.cgi?id=24920
Florian Weimer changed:
What|Removed |Added
CC||fweimer at redhat dot com
---
https://sourceware.org/bugzilla/show_bug.cgi?id=24922
Bug ID: 24922
Summary: An out-of-bounds read in pex64_xdata_print_uwd_codes
Product: binutils
Version: 2.33 (HEAD)
Status: UNCONFIRMED
Severity: normal
Priority: P2
https://sourceware.org/bugzilla/show_bug.cgi?id=24921
Bug ID: 24921
Summary: A floating point exception in process_cu_tu_index
Product: binutils
Version: 2.33 (HEAD)
Status: UNCONFIRMED
Severity: normal
Priority: P2
https://sourceware.org/bugzilla/show_bug.cgi?id=24898
--- Comment #5 from Mingi Cho ---
Hi,
I have tested this bug using the binary compiled with "-O3" and ASAN options as
following.
CC=clang-5.0 CFLAGS="-m32 -Wextra -Wno-missing-field-initializers
-fsanitize=address -fno-omit-frame-pointer -g
Dear team,
I found a crash with AFL and used valgrind to run it. Looks like it is
information leakage problem. Detailed information shows below.
Could you possibly fix this issue? It would be very nice if a CVE number can be
assigned to this.
Also a poc is attched to the email.
Best regards,
https://sourceware.org/bugzilla/show_bug.cgi?id=24829
tfx changed:
What|Removed |Added
Status|RESOLVED|REOPENED
Resolution|FIXED
https://sourceware.org/bugzilla/show_bug.cgi?id=24829
tfx changed:
What|Removed |Added
Summary|readelf: interger overflow |readelf: multi interger
|in