https://sourceware.org/bugzilla/show_bug.cgi?id=28165
Bug ID: 28165 Summary: objdump: global-buffer-overflow on rx_info_to_howto_rela in elf32-rx.c Product: binutils Version: 2.38 (HEAD) Status: UNCONFIRMED Severity: normal Priority: P2 Component: binutils Assignee: unassigned at sourceware dot org Reporter: shaohua.li at inf dot ethz.ch Target Milestone: --- Created attachment 13576 --> https://sourceware.org/bugzilla/attachment.cgi?id=13576&action=edit poc Hi there, I crashed `objdump -S` with a fuzzer. It's global-buffer-overflow as reported by AddressSanitize. - binutils version: 2.38(Head), commit af51804103a08cd1e12edc4f4a30eec2c5c4f9e8 - Compiler: clang12 - Platform: Ubuntu 18.04.5 LTS, x86_64 - Reproduce: run `objdump -S poc` AddressSanitizer report: ==330==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000002fe4450 at pc 0x000001726735 bp 0x7ffc3d23fb30 sp 0x7ffc3d23fb28 READ of size 8 at 0x000002fe4450 thread T0 #0 0x1726734 in rx_info_to_howto_rela /binutils_latest/repo/bfd/elf32-rx.c:319:25 #1 0xcf89b0 in elf_slurp_reloc_table_from_section /binutils_latest/repo/bfd/./elfcode.h:1523:8 #2 0xcf7eee in bfd_elf32_slurp_reloc_table /binutils_latest/repo/bfd/./elfcode.h:1609:11 #3 0xbcf73e in _bfd_elf_canonicalize_reloc /binutils_latest/repo/bfd/elf.c:8577:9 #4 0xae51ab in bfd_canonicalize_reloc /binutils_latest/repo/bfd/bfd.c:1579:10 #5 0x1b4d1ba in bfd_generic_get_relocated_section_contents /binutils_latest/repo/bfd/reloc.c:8406:17 #6 0xae653f in bfd_get_relocated_section_contents /binutils_latest/repo/bfd/bfd.c:2166:10 #7 0xb0fe68 in bfd_simple_get_relocated_section_contents /binutils_latest/repo/bfd/simple.c:298:14 #8 0xcab59c in read_section /binutils_latest/repo/bfd/./dwarf2.c:582:7 #9 0xca8237 in _bfd_dwarf2_slurp_debug_info /binutils_latest/repo/bfd/./dwarf2.c:4737:13 #10 0xcac7c1 in _bfd_dwarf2_find_nearest_line /binutils_latest/repo/bfd/./dwarf2.c:4985:9 #11 0xbd1379 in _bfd_elf_find_nearest_line /binutils_latest/repo/bfd/elf.c:9199:7 #12 0x4e496a in show_line /binutils_latest/repo/binutils/./objdump.c:1784:9 #13 0x4e0b1f in disassemble_bytes /binutils_latest/repo/binutils/./objdump.c:2770:6 #14 0x4dae9a in disassemble_section /binutils_latest/repo/binutils/./objdump.c:3455:4 #15 0xb0e04a in bfd_map_over_sections /binutils_latest/repo/bfd/section.c:1383:5 #16 0x4d1ae0 in disassemble_data /binutils_latest/repo/binutils/./objdump.c:3599:3 #17 0x4cda84 in dump_bfd /binutils_latest/repo/binutils/./objdump.c:5006:5 #18 0x4ccb9f in display_object_bfd /binutils_latest/repo/binutils/./objdump.c:5068:7 #19 0x4ccaa9 in display_any_bfd /binutils_latest/repo/binutils/./objdump.c:5158:5 #20 0x4cc65c in display_file /binutils_latest/repo/binutils/./objdump.c:5179:3 #21 0x4cb063 in main /binutils_latest/repo/binutils/./objdump.c:5529:6 #22 0x7f39a0aad0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #23 0x41c61d in _start (/out_bin/objdump+0x41c61d) 0x000002fe4450 is located 72 bytes to the right of global variable 'rx_elf_howto_table' defined in 'elf32-rx.c:50:25' (0x2fe2d60) of size 5800 SUMMARY: AddressSanitizer: global-buffer-overflow /binutils_latest/repo/bfd/elf32-rx.c:319:25 in rx_info_to_howto_rela Shadow bytes around the buggy address: 0x0000805f4830: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0000805f4840: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0000805f4850: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0000805f4860: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0000805f4870: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0000805f4880: 00 f9 f9 f9 f9 f9 f9 f9 f9 f9[f9]f9 f9 f9 f9 f9 0x0000805f4890: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 0x0000805f48a0: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 0x0000805f48b0: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 0x0000805f48c0: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 0x0000805f48d0: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==330==ABORTING -- You are receiving this mail because: You are on the CC list for the bug.