登录
注册
开源
企业版
高校版
搜索
帮助中心
使用条款
关于我们
开源
企业版
高校版
私有云
模力方舟
AI 队友
登录
注册
4月29日周三晚 8 点,来看 PocketClaw 直播首秀,从开箱到实操全流程跑通、多场景案例演示、首次版本更新介绍,点击预约~
代码拉取完成,页面将自动刷新
仓库状态说明
捐赠
捐赠前请先登录
取消
前往登录
扫描微信二维码支付
取消
支付完成
支付提示
将跳转至支付宝完成支付
确定
取消
Watch
不关注
关注所有动态
仅关注版本发行动态
关注但不提醒动态
11
Star
3
Fork
78
src-openEuler
/
binutils
关闭
代码
Issues
5
Pull Requests
2
Wiki
统计
流水线
服务
JavaDoc
PHPDoc
质量分析
Jenkins for Gitee
腾讯云托管
腾讯云 Serverless
悬镜安全
阿里云 SAE
Codeblitz
SBOM
开发画像分析
我知道了,不再自动展开
更新失败,请稍后重试!
移除标识
内容风险标识
本任务被
标识为内容中包含有代码安全 Bug 、隐私泄露等敏感信息,仓库外成员不可访问
Heap-buffer-overflow in bfd_getl16
已完成
#I4G4YJ
缺陷
fusiontest
创建于
2021-10-30 15:40
``` ==1503783==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000000df at pc 0x00000055afb2 bp 0x7fff5fce4bb0 sp 0x7fff5fce4ba8 READ of size 1 at 0x6020000000df thread T0 #0 0x55afb1 in bfd_getl16 /src/binutils-gdb/bfd/libbfd.c:601:11 #1 0x9c9830 in _bfd_vms_slurp_egsd /src/binutils-gdb/bfd/vms-alpha.c:1396:18 #2 0x9c8bb2 in _bfd_vms_slurp_object_records /src/binutils-gdb/bfd/vms-alpha.c:2630:10 #3 0x9c28ad in alpha_vms_object_p /src/binutils-gdb/bfd/vms-alpha.c:2836:9 #4 0x5564fb in bfd_check_format_matches /src/binutils-gdb/bfd/format.c:328:14 #5 0x555d22 in bfd_check_format /src/binutils-gdb/bfd/format.c:94:10 #6 0x104541c in bfd_generic_archive_p /src/binutils-gdb/bfd/archive.c:920:8 #7 0x5564fb in bfd_check_format_matches /src/binutils-gdb/bfd/format.c:328:14 #8 0x555d22 in bfd_check_format /src/binutils-gdb/bfd/format.c:94:10 #9 0x555ad8 in LLVMFuzzerTestOneInput /src/binutils-gdb/fuzz/fuzz_bfd.c:61:5 #10 0x45bb83 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:599:15 #11 0x4472f2 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:323:6 #12 0x44cf96 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:856:9 #13 0x4764a2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 #14 0x7f366a614b26 in __libc_start_main (/lib64/libc.so.6+0x25b26) #15 0x4231a9 in _start (/root/oss-fuzz/build/out/binutils/fuzz_bfd+0x4231a9) DEDUP_TOKEN: bfd_getl16--_bfd_vms_slurp_egsd--_bfd_vms_slurp_object_records 0x6020000000df is located 0 bytes to the right of 15-byte region [0x6020000000d0,0x6020000000df) allocated by thread T0 here: #0 0x522ba3 in realloc /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:164:3 #1 0x55aa76 in bfd_realloc /src/binutils-gdb/bfd/libbfd.c:317:9 #2 0x9c8163 in vms_get_remaining_object_record /src/binutils-gdb/bfd/vms-alpha.c:869:22 #3 0x9c2822 in alpha_vms_object_p /src/binutils-gdb/bfd/vms-alpha.c:2827:8 #4 0x5564fb in bfd_check_format_matches /src/binutils-gdb/bfd/format.c:328:14 #5 0x555d22 in bfd_check_format /src/binutils-gdb/bfd/format.c:94:10 #6 0x104541c in bfd_generic_archive_p /src/binutils-gdb/bfd/archive.c:920:8 #7 0x5564fb in bfd_check_format_matches /src/binutils-gdb/bfd/format.c:328:14 #8 0x555d22 in bfd_check_format /src/binutils-gdb/bfd/format.c:94:10 #9 0x555ad8 in LLVMFuzzerTestOneInput /src/binutils-gdb/fuzz/fuzz_bfd.c:61:5 #10 0x45bb83 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:599:15 #11 0x4472f2 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:323:6 #12 0x44cf96 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:856:9 #13 0x4764a2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 #14 0x7f366a614b26 in __libc_start_main (/lib64/libc.so.6+0x25b26) DEDUP_TOKEN: realloc--bfd_realloc--vms_get_remaining_object_record SUMMARY: AddressSanitizer: heap-buffer-overflow /src/binutils-gdb/bfd/libbfd.c:601:11 in bfd_getl16 Shadow bytes around the buggy address: 0x0c047fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff8000: fa fa 00 00 fa fa 00 fa fa fa 00 fa fa fa 00 fa =>0x0c047fff8010: fa fa 01 fa fa fa fd fd fa fa 00[07]fa fa fa fa 0x0c047fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==1503783==ABORTING ```
``` ==1503783==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000000df at pc 0x00000055afb2 bp 0x7fff5fce4bb0 sp 0x7fff5fce4ba8 READ of size 1 at 0x6020000000df thread T0 #0 0x55afb1 in bfd_getl16 /src/binutils-gdb/bfd/libbfd.c:601:11 #1 0x9c9830 in _bfd_vms_slurp_egsd /src/binutils-gdb/bfd/vms-alpha.c:1396:18 #2 0x9c8bb2 in _bfd_vms_slurp_object_records /src/binutils-gdb/bfd/vms-alpha.c:2630:10 #3 0x9c28ad in alpha_vms_object_p /src/binutils-gdb/bfd/vms-alpha.c:2836:9 #4 0x5564fb in bfd_check_format_matches /src/binutils-gdb/bfd/format.c:328:14 #5 0x555d22 in bfd_check_format /src/binutils-gdb/bfd/format.c:94:10 #6 0x104541c in bfd_generic_archive_p /src/binutils-gdb/bfd/archive.c:920:8 #7 0x5564fb in bfd_check_format_matches /src/binutils-gdb/bfd/format.c:328:14 #8 0x555d22 in bfd_check_format /src/binutils-gdb/bfd/format.c:94:10 #9 0x555ad8 in LLVMFuzzerTestOneInput /src/binutils-gdb/fuzz/fuzz_bfd.c:61:5 #10 0x45bb83 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:599:15 #11 0x4472f2 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:323:6 #12 0x44cf96 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:856:9 #13 0x4764a2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 #14 0x7f366a614b26 in __libc_start_main (/lib64/libc.so.6+0x25b26) #15 0x4231a9 in _start (/root/oss-fuzz/build/out/binutils/fuzz_bfd+0x4231a9) DEDUP_TOKEN: bfd_getl16--_bfd_vms_slurp_egsd--_bfd_vms_slurp_object_records 0x6020000000df is located 0 bytes to the right of 15-byte region [0x6020000000d0,0x6020000000df) allocated by thread T0 here: #0 0x522ba3 in realloc /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:164:3 #1 0x55aa76 in bfd_realloc /src/binutils-gdb/bfd/libbfd.c:317:9 #2 0x9c8163 in vms_get_remaining_object_record /src/binutils-gdb/bfd/vms-alpha.c:869:22 #3 0x9c2822 in alpha_vms_object_p /src/binutils-gdb/bfd/vms-alpha.c:2827:8 #4 0x5564fb in bfd_check_format_matches /src/binutils-gdb/bfd/format.c:328:14 #5 0x555d22 in bfd_check_format /src/binutils-gdb/bfd/format.c:94:10 #6 0x104541c in bfd_generic_archive_p /src/binutils-gdb/bfd/archive.c:920:8 #7 0x5564fb in bfd_check_format_matches /src/binutils-gdb/bfd/format.c:328:14 #8 0x555d22 in bfd_check_format /src/binutils-gdb/bfd/format.c:94:10 #9 0x555ad8 in LLVMFuzzerTestOneInput /src/binutils-gdb/fuzz/fuzz_bfd.c:61:5 #10 0x45bb83 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:599:15 #11 0x4472f2 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:323:6 #12 0x44cf96 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:856:9 #13 0x4764a2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 #14 0x7f366a614b26 in __libc_start_main (/lib64/libc.so.6+0x25b26) DEDUP_TOKEN: realloc--bfd_realloc--vms_get_remaining_object_record SUMMARY: AddressSanitizer: heap-buffer-overflow /src/binutils-gdb/bfd/libbfd.c:601:11 in bfd_getl16 Shadow bytes around the buggy address: 0x0c047fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff8000: fa fa 00 00 fa fa 00 fa fa fa 00 fa fa fa 00 fa =>0x0c047fff8010: fa fa 01 fa fa fa fd fd fa fa 00[07]fa fa fa fa 0x0c047fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==1503783==ABORTING ```
附件
fusiontest-testcase-fuzz_bfd-202110280003
(187 Bytes)
下载
fusiontest
2021-10-30 15:40
评论 (
3
)
登录
后才可以发表评论
状态
已完成
待办的
已挂起
修复中
已确认
已完成
已验收
已取消
负责人
未设置
标签
sig/Base-service
未设置
项目
未立项任务
未立项任务
里程碑
openEuler 20.03-LTS-SP1
未关联里程碑
Pull Requests
未关联
未关联
关联的 Pull Requests 被合并后可能会关闭此 issue
分支
未关联
分支 (
-
)
标签 (
-
)
开始日期   -   截止日期
-
置顶选项
不置顶
置顶等级:高
置顶等级:中
置顶等级:低
优先级
不指定
严重
主要
次要
不重要
预计工期
(小时)
参与者(4)
1
https://gitee.com/src-openeuler/binutils.git
git@gitee.com:src-openeuler/binutils.git
src-openeuler
binutils
binutils
点此查找更多帮助
搜索帮助
Git 命令在线学习
如何在 Gitee 导入 GitHub 仓库
Git 仓库基础操作
企业版和社区版功能对比
SSH 公钥设置
如何处理代码冲突
仓库体积过大,如何减小?
如何找回被删除的仓库数据
Gitee 产品配额说明
GitHub仓库快速导入Gitee及同步更新
什么是 Release(发行版)
将 PHP 项目自动发布到 packagist.org
评论
仓库举报
回到顶部
登录提示
该操作需登录 Gitee 帐号,请先登录后再操作。
立即登录
没有帐号,去注册