Replying to this email means your email address will be shared with the
team that works on this product.
https://issues.oss-fuzz.com/issues/440177309

Reference Info: 440177309 elfutils:fuzz-libdwfl: Use-of-uninitialized-value
in __libelf_read_mmaped_file
component:  Public Trackers > 1362134 > OSS Fuzz
status:  New
reporter:  87...@developer.gserviceaccount.com
cc:  da...@adalogics.com, elfutils-devel@sourceware.org, ev...@gmail.com,
and 1 more
collaborators:  co...@oss-fuzz.com
type:  Vulnerability
access level:  Default access
priority:  P2
severity:  S2
hotlist:  Reproducible, Stability-Memory-MemorySanitizer
retention:  Component default
Project:  elfutils
Reported:  Aug 21, 2025

87...@developer.gserviceaccount.com added comment #1:
Detailed Report: https://oss-fuzz.com/testcase?key=6605030137593856

Project: elfutils
Fuzzing Engine: libFuzzer
Fuzz Target: fuzz-libdwfl
Job Type: libfuzzer_msan_elfutils
Platform Id: linux

Crash Type: Use-of-uninitialized-value
Crash Address:
Crash State:
  __libelf_read_mmaped_file
  read_file
  lock_dup_elf

Sanitizer: memory (MSAN)

Recommended Security Severity: Medium

Regressed:
https://oss-fuzz.com/revisions?job=libfuzzer_msan_elfutils&range=202508201802:202508210000

Reproducer Testcase:
https://oss-fuzz.com/download?testcase_id=6605030137593856

Issue filed automatically.

See https://google.github.io/oss-fuzz/advanced-topics/reproducing for
instructions to reproduce this bug locally.
When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any
stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you need to contact the OSS-Fuzz team with a question, concern, or any
other feedback, please file an issue at
https://github.com/google/oss-fuzz/issues. Comments on individual Monorail
issues are not monitored.


Generated by Google IssueTracker notification system.

Reply via email to