[Bug tools/33005] New: Dynamic Stack Buffer Overflow in eu-unstrip's new_shstrtab Function

2025-05-27 Thread xdcao.cs at gmail dot com
IRMED Severity: normal Priority: P2 Component: tools Assignee: unassigned at sourceware dot org Reporter: xdcao.cs at gmail dot com CC: elfutils-devel at sourceware dot org Target Milestone: --- Summary Dynamic Stack Buffer Overflow in eu-unst

[Bug tools/33006] New: Stack Buffer Overflow in eu-objdump's riscv_disasm Function

2025-05-27 Thread xdcao.cs at gmail dot com
erity: normal Priority: P2 Component: tools Assignee: unassigned at sourceware dot org Reporter: xdcao.cs at gmail dot com CC: elfutils-devel at sourceware dot org Target Milestone: --- Summary Stack Buffer Overflow in eu-objdump's riscv_disas

[Bug tools/33004] New: Stack Buffer Underflow in eu-unstrip's sections_match Function

2025-05-27 Thread xdcao.cs at gmail dot com
erity: normal Priority: P2 Component: tools Assignee: unassigned at sourceware dot org Reporter: xdcao.cs at gmail dot com CC: elfutils-devel at sourceware dot org Target Milestone: --- Summary Stack Buffer Underflow in eu-unstrip's sect

[Bug tools/33003] New: Bus Error Vulnerability in eu-strip due to Invalid Memory Write

2025-05-27 Thread xdcao.cs at gmail dot com
: normal Priority: P2 Component: tools Assignee: unassigned at sourceware dot org Reporter: xdcao.cs at gmail dot com CC: elfutils-devel at sourceware dot org Target Milestone: --- Summary Bus Error Vulnerability in eu-strip due to Invalid

[Bug tools/33004] Stack Buffer Underflow in eu-unstrip's sections_match Function

2025-06-02 Thread xdcao.cs at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=33004 --- Comment #3 from Xudong Cao --- (In reply to Mark Wielaard from comment #2) > Checked in the early exit patch so we don't produce an obscure error message > later. But there is no real bug here. Hi Mark, Thanks for the quick fix! I agree t

[Bug tools/33004] Stack Buffer Underflow in eu-unstrip's sections_match Function

2025-06-02 Thread xdcao.cs at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=33004 --- Comment #5 from Xudong Cao --- ASan rightly flags the cross-object pointer subtraction in sections_match()—disallowed under C11 §6.5.6—because its red-zone poisoning detects the out-of-object access even though the same UB silently passes

[Bug tools/33005] Dynamic Stack Buffer Overflow in eu-unstrip's new_shstrtab Function

2025-06-03 Thread xdcao.cs at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=33005 Xudong Cao changed: What|Removed |Added CC||xdcao.cs at gmail dot com --- Comment

[Bug tools/33006] Stack Buffer Overflow in eu-objdump's riscv_disasm Function

2025-06-03 Thread xdcao.cs at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=33006 --- Comment #3 from Xudong Cao --- (In reply to Aaron Merey from comment #1) > I was not able to reproduce using the given instructions. I also tried > adding LDFLAGS="-fsanitize=address" and ASAN_OPTIONS=detect_leaks=0. > > > As stated in

[Bug tools/33006] Stack Buffer Overflow in eu-objdump's riscv_disasm Function

2025-06-03 Thread xdcao.cs at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=33006 Xudong Cao changed: What|Removed |Added CC||xdcao.cs at gmail dot com --- Comment

[Bug tools/33006] Stack Buffer Overflow in eu-objdump's riscv_disasm Function

2025-06-03 Thread xdcao.cs at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=33006 Xudong Cao changed: What|Removed |Added Resolution|NOTABUG |--- Status|RESOLVED