Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/449374658

Reference Info: 449374658 binutils:fuzz_dwarf: Integer-overflow in
image_write
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  [email protected]
cc:  [email protected], [email protected], [email protected], and 2 more
collaborators:  [email protected]
type:  Bug
access level:  Limited visibility
priority:  P2
severity:  S4
hotlist:  Reproducible, Stability-UndefinedBehaviorSanitizer
retention:  Component default
Project:  binutils
Reported:  Oct 5, 2025

[email protected] added comment #1:
Detailed Report: https://oss-fuzz.com/testcase?key=4772163858268160

Project: binutils
Fuzzing Engine: libFuzzer
Fuzz Target: fuzz_dwarf
Job Type: libfuzzer_ubsan_binutils
Platform Id: linux

Crash Type: Integer-overflow
Crash Address:
Crash State:
  image_write
  _bfd_vms_slurp_etir
  vms_slurp_debug

Sanitizer: undefined (UBSAN)

Regressed:
https://oss-fuzz.com/revisions?job=libfuzzer_ubsan_binutils&range=202509080610:202510040633

Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=4772163858268160

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any
other feedback, please file an issue at
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail
issues are not monitored.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.


Generated by Google IssueTracker notification system.

Reply via email to