Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/386713387

Changed
access level:  Limited visibility → Default access

pe...@google.com added comment #3:

This bug has been fixed. It has been opened to the public.

_______________________________

Reference Info: 386713387 binutils:fuzz_objcopy: Heap-use-after-free in
bfd_errmsg
component:  Public Trackers > 1362134 > OSS Fuzz
status:  Verified
reporter:  87...@developer.gserviceaccount.com
assignee:  cl...@appspot.gserviceaccount.com
verifier:  cl...@appspot.gserviceaccount.com
cc:  am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Default access
priority:  P2
severity:  S1
hotlist:  ClusterFuzz-Verified, Reproducible, Stability-LibFuzzer,
Stability-Memory-AddressSanitizer
retention:  Component default
Disclosure:  Apr 3, 2025
Project:  binutils
Reported:  Jan 3, 2025


Generated by Google IssueTracker notification system.

You're receiving this email because you are subscribed to updates on Google
IssueTracker issue 386713387
Unsubscribe from this issue.

Reply via email to