|
From: | youngseok.main at gmail dot com |
Subject: | [Bug binutils/30310] New: null pointer dereference at binutils/opcodes/nfp-dis.c:2691 in init_nfp6000_priv function |
Date: | Tue, 04 Apr 2023 07:31:37 +0000 |
https://sourceware.org/bugzilla/show_bug.cgi?id=30310 Bug ID: 30310 Summary: null pointer dereference at binutils/opcodes/nfp-dis.c:2691 in init_nfp6000_priv function Product: binutils Version: 2.40 Status: UNCONFIRMED Severity: normal Priority: P2 Component: binutils Assignee: unassigned at sourceware dot org Reporter: youngseok.main at gmail dot com Target Milestone: --- Created attachment 14801 --> https://sourceware.org/bugzilla/attachment.cgi?id=14801&action=edit poc_file used in command input Our fuzzer found a new SEGV bug in the latest objdump build. *Command Input* objdump poc_file -S -m nf poc_file is attached. *Command Output* /home/youngseok/data/230327/asan_inter_30_30_shrink5_1_230308/objdump/4_id:000033/poc_file: file format coff-sh BFD: error: /home/youngseok/data/230327/asan_inter_30_30_shrink5_1_230308/objdump/4_id:000033/poc_file() is too large (0x11000000 bytes) /home/youngseok/subjects/latest_asan_install/binutils/bin/objdump: Reading section failed because: file truncated Disassembly of section : 000000009f0408e8 <>: ASAN:DEADLYSIGNAL *Sanitizer Dump* ==26815==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x5555566b3bf5 bp 0x7fffffffd280 sp 0x7fffffffcfd0 T0) ==26815==The signal is caused by a READ memory access. ==26815==Hint: address points to the zero page. #0 0x5555566b3bf4 in init_nfp6000_priv /home/youngseok/subjects/latest_asan_sources/binutils/opcodes/nfp-dis.c:2691 #1 0x5555566b4423 in init_nfp_priv /home/youngseok/subjects/latest_asan_sources/binutils/opcodes/nfp-dis.c:2784 #2 0x5555566b4524 in _print_instrs /home/youngseok/subjects/latest_asan_sources/binutils/opcodes/nfp-dis.c:2801 #3 0x5555566b5562 in print_insn_nfp /home/youngseok/subjects/latest_asan_sources/binutils/opcodes/nfp-dis.c:2971 #4 0x55555635f7df in disassemble_bytes objdump.c:3433 #5 0x55555636302e in disassemble_section objdump.c:4050 #6 0x555556857786 in bfd_map_over_sections /home/youngseok/subjects/latest_asan_sources/binutils/bfd/section.c:1366 #7 0x555556363fff in disassemble_data objdump.c:4199 #8 0x55555636ba74 in dump_bfd objdump.c:5683 #9 0x55555636bd31 in display_object_bfd objdump.c:5744 #10 0x55555636c07a in display_any_bfd objdump.c:5831 #11 0x55555636c0f0 in display_file objdump.c:5852 #12 0x55555636da7c in main objdump.c:6263 #13 0x7ffff6844c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86) #14 0x555556351ad9 in _start (/home/youngseok/subjects/latest_asan_install/binutils/bin/objdump+0xdfdad9) *Environment* - OS: Ubuntu 18.04 - gcc: 7.5.0 - binutils: 2.40.50.20230404 binutils is built it address sanitizer. Here is the build script: CFLAGS="-fsanitize=address -g -O0" CXXFLAGS="-fsanitize=address -g -O0" \ ./configure --enable-targets=all -- You are receiving this mail because: You are on the CC list for the bug.
[Prev in Thread] | Current Thread | [Next in Thread] |