Replying to this email means your email address will be shared with the team that works on this product. https://issues.oss-fuzz.com/issues/401056615
Changed access level: Limited visibility → Default access [email protected] added comment #3: This bug has been fixed. It has been opened to the public. _______________________________ Reference Info: 401056615 binutils:fuzz_objdump_safe: Heap-buffer-overflow in _bfd_elf_parse_attributes component: Public Trackers > 1362134 > OSS Fuzz status: Verified reporter: [email protected] assignee: [email protected] verifier: [email protected] cc: [email protected], [email protected], [email protected], and 2 more collaborators: [email protected] type: Vulnerability access level: Default access priority: P2 severity: S2 hotlist: ClusterFuzz-Verified, Reproducible, Stability-Memory-AddressSanitizer retention: Component default Disclosure: Jun 4, 2025 Project: binutils Reported: Mar 6, 2025 Generated by Google IssueTracker notification system. You're receiving this email because you are subscribed to updates on Google IssueTracker issue 401056615 Unsubscribe from this issue.
