From: ClusterFuzz-External via monorail <monorail+v2.382749006@chromium.org>
To: elfutils-devel@sourceware.org
Subject: Issue 56134 in oss-fuzz: elfutils:fuzz-libdwfl: Use-of-uninitialized-value in check_section
Date: Sun, 19 Feb 2023 04:36:44 -0800 [thread overview]
Message-ID: <00000000000096499905f50ccc4e@google.com> (raw)
In-Reply-To: <0=71cc74a7ba1af446b7ed6b9a08b414d9=71ed1158a93bd261e0f438319391130d=oss-fuzz@monorail-prod.appspotmail.com>
[-- Attachment #1: Type: text/plain, Size: 1824 bytes --]
Status: New
Owner: ----
CC: elfut...@sourceware.org, da...@adalogics.com, evv...@gmail.com, izzeem@google.com
Labels: ClusterFuzz Reproducible Stability-Memory-MemorySanitizer Engine-libfuzzer OS-Linux Security_Severity-Medium Proj-elfutils Reported-2023-02-19
Type: Bug-Security
New issue 56134 by ClusterFuzz-External: elfutils:fuzz-libdwfl: Use-of-uninitialized-value in check_section
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=56134
Detailed Report: https://oss-fuzz.com/testcase?key=6724057145147392
Project: elfutils
Fuzzing Engine: libFuzzer
Fuzz Target: fuzz-libdwfl
Job Type: libfuzzer_msan_elfutils
Platform Id: linux
Crash Type: Use-of-uninitialized-value
Crash Address:
Crash State:
check_section
dwarf_begin_elf
load_dw
Sanitizer: memory (MSAN)
Recommended Security Severity: Medium
Regressed: https://oss-fuzz.com/revisions?job=libfuzzer_msan_elfutils&range=202302161800:202302181800
Reproducer Testcase: https://oss-fuzz.com/download?testcase_id=6724057145147392
Issue filed automatically.
See https://google.github.io/oss-fuzz/advanced-topics/reproducing for instructions to reproduce this bug locally.
When you fix this bug, please
* mention the fix revision(s).
* state whether the bug was a short-lived regression or an old bug in any stable releases.
* add any other useful information.
This information can help downstream consumers.
If you need to contact the OSS-Fuzz team with a question, concern, or any other feedback, please file an issue at https://github.com/google/oss-fuzz/issues. Comments on individual Monorail issues are not monitored.
--
You received this message because:
1. You were specifically CC'd on the issue
You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings
Reply to this email to add a comment.
next parent reply other threads:[~2023-02-20 10:02 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <0=71cc74a7ba1af446b7ed6b9a08b414d9=71ed1158a93bd261e0f438319391130d=oss-fuzz@monorail-prod.appspotmail.com>
2023-02-19 12:36 ` ClusterFuzz-External via monorail [this message]
2023-02-19 14:37 ` evv… via monorail
2023-02-19 15:46 ` evv… via monorail
2023-02-21 16:01 ` ClusterFuzz-External via monorail
2023-03-06 16:52 ` ClusterFuzz-External via monorail
2023-03-06 16:52 ` ClusterFuzz-External via monorail
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=00000000000096499905f50ccc4e@google.com \
--to=monorail+v2.382749006@chromium.org \
--cc=elfutils-devel@sourceware.org \
--cc=oss-fuzz@monorail-prod.appspotmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).