[Bug binutils/24243] readelf: heap buffer overflow in process_mips_specific

2019-02-28 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24243

--- Comment #3 from spinpx  ---
CVE-2019-9077

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
bug-binutils mailing list
bug-binutils@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-binutils


[Bug binutils/24236] size: Heap buffer overflow in _bfd_archive_64_bit_slurp_armap

2019-02-28 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24236

--- Comment #4 from spinpx  ---
CVE-2019-9075

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
bug-binutils mailing list
bug-binutils@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-binutils


[Bug binutils/24235] objdump: Read memory violation in libbfd.c

2019-02-28 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24235

--- Comment #5 from spinpx  ---
CVE-2019-9074

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
bug-binutils mailing list
bug-binutils@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-binutils


[Bug binutils/24247] New: readelf: heap buffer overflow in unw_decode_p2_p5

2019-02-20 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24247

Bug ID: 24247
   Summary: readelf: heap buffer overflow in unw_decode_p2_p5
   Product: binutils
   Version: 2.33 (HEAD)
Status: UNCONFIRMED
  Severity: normal
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: spinpx at gmail dot com
  Target Milestone: ---

Created attachment 11627
  --> https://sourceware.org/bugzilla/attachment.cgi?id=11627=edit
Heap buffer overflow input

- Intel Xeon Gold 5118 processors and 256 GB memory
- Linux n18-065-139 4.19.0-1-amd64 #1 SMP Debian 4.19.12-1 (2018-12-22) x86_64
GNU/Linux
- clang version 4.0.0 (tags/RELEASE_400/final)
- version: commit c72e75a64030b0f6535a80481f37968ad55c333a (Feb 19 2019)
- run: readelf -a input_file


...
   
P5:frgr_mem(grmask=[r4,r5,r7],frmask=[f2,f5,f16,f17,f19,f20,f23,f24,f25,f27,f28,f31])
   
P5:frgr_mem(grmask=[r4,r5,r7],frmask=[f2,f5,f16,f17,f19,f20,f23,f24,f25,f27,f28,f31])
   
P5:frgr_mem(grmask=[r4,r5,r7],frmask=[f2,f5,f16,f17,f19,f20,f23,f24,f25,f27,f28,f31])
   
P5:frgr_mem(grmask=[r4,r5,r7],frmask=[f2,f5,f16,f17,f19,=
==673002==ERROR: AddressSanitizer: heap-buffer-overflow on address
0x61d01d01 at pc 0x005856b7 bp 0x7fffeb4b1650 sp 0x7fffeb4b1648
READ of size 1 at 0x61d01d01 thread T0
#0 0x5856b6 in unw_decode_p2_p5
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/unwind-ia64.c:770:15
#1 0x58430c in unw_decode
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/unwind-ia64.c:1072:10
#2 0x55fe61 in dump_ia64_unwind
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:7519:7
#3 0x5533a5 in ia64_process_unwind
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:7814:6
#4 0x51a1c6 in process_unwind
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:9338:14
#5 0x505b0d in process_object
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19275:9
#6 0x4f547d in process_file
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19715:13
#7 0x4f3ec8 in main
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19774:11
#8 0x7f0aa0d1209a in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x2409a)
#9 0x41d4b9 in _start
(/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/readelf+0x41d4b9)

0x61d01d01 is located 0 bytes to the right of 2177-byte region
[0x61d01480,0x61d01d01)
allocated by thread T0 here:
#0 0x4c41ac in malloc
/scratch/llvm/clang-4/xenial/final/llvm.src/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:66:3
#1 0x4f179f in get_data
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:426:9
#2 0x552ff6 in ia64_process_unwind
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:7796:33
#3 0x51a1c6 in process_unwind
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:9338:14
#4 0x505b0d in process_object
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19275:9
#5 0x4f547d in process_file
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19715:13
#6 0x4f3ec8 in main
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19774:11
#7 0x7f0aa0d1209a in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x2409a)

SUMMARY: AddressSanitizer: heap-buffer-overflow
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/unwind-ia64.c:770:15
in unw_decode_p2_p5
Shadow bytes around the buggy address:
  0x0c3a7fff8350: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c3a7fff8360: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c3a7fff8370: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c3a7fff8380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c3a7fff8390: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c3a7fff83a0:[01]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c3a7fff83b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c3a7fff83c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c3a7fff83d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c3a7fff83e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c3a7fff83f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:   00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:   fa
  Freed heap region:   fd
  Stack left redzone:  f1
  Stack mid redzone:   f2
  Stack right redzone: f3
  Stack after return:  f5
  Stack use after scope:   f8
  Global redzone:  f9
  Global init order:   

[Bug binutils/24246] New: readelf: heap buffer overflow in print_stapsdt_note

2019-02-20 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24246

Bug ID: 24246
   Summary: readelf: heap buffer overflow in print_stapsdt_note
   Product: binutils
   Version: 2.33 (HEAD)
Status: UNCONFIRMED
  Severity: normal
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: spinpx at gmail dot com
  Target Milestone: ---

Created attachment 11626
  --> https://sourceware.org/bugzilla/attachment.cgi?id=11626=edit
Heap buffer overflow input

- Intel Xeon Gold 5118 processors and 256 GB memory
- Linux n18-065-139 4.19.0-1-amd64 #1 SMP Debian 4.19.12-1 (2018-12-22) x86_64
GNU/Linux
- clang version 4.0.0 (tags/RELEASE_400/final)
- version: commit c72e75a64030b0f6535a80481f37968ad55c333a (Feb 19 2019)
- run: readelf -a input_file


ELF Header:
  Magic:   7f 45 4c 46 01 01 01 f4 00 00 00 00 00 00 00 00 
  Class: ELF32
  Data:  2's complement, little endian
  Version:   1 (current)
  OS/ABI:
  ABI Version:   0
  Type:  CORE (Core file)
  Machine:   : 0x7303
  Version:   0x73706174
  Entry point address:   0x8047464
  Start of program headers:  52 (bytes into file)
  Start of section headers:  164 (bytes into file)
  Flags: 0x0
  Size of this header:   52 (bytes)
  Size of program headers:   32 (bytes)
  Number of program headers: 6
  Size of section headers:   0 (bytes)
  Number of section headers: 4096
  Section header string table index: 0
readelf: Error: Section headers are not available!
=
==661418==ERROR: AddressSanitizer: heap-buffer-overflow on address
0x6120014d at pc 0x0042f615 bp 0x7ffe1629dfd0 sp 0x7ffe1629d778
READ of size 1 at 0x6120014d thread T0
#0 0x42f614 in __interceptor_strlen
/scratch/llvm/clang-4/xenial/final/llvm.src/projects/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:284:5
#1 0x5707b5 in print_stapsdt_note
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:17879:11
#2 0x56c175 in process_note
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18583:12
#3 0x56a944 in process_notes_at
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18769:13
#4 0x5693a9 in process_corefile_note_segments
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18799:8
#5 0x524202 in process_notes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18944:12
#6 0x505c9d in process_object
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19303:9
#7 0x4f547d in process_file
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19715:13
#8 0x4f3ec8 in main
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19774:11
#9 0x7ff3f4b7809a in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x2409a)
#10 0x41d4b9 in _start
(/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/readelf+0x41d4b9)

0x6120014d is located 0 bytes to the right of 269-byte region
[0x61200040,0x6120014d)
allocated by thread T0 here:
#0 0x4c41ac in malloc
/scratch/llvm/clang-4/xenial/final/llvm.src/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:66:3
#1 0x4f179f in get_data
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:426:9
#2 0x56965e in process_notes_at
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18635:36
#3 0x5693a9 in process_corefile_note_segments
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18799:8
#4 0x524202 in process_notes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18944:12
#5 0x505c9d in process_object
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19303:9
#6 0x4f547d in process_file
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19715:13
#7 0x4f3ec8 in main
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19774:11
#8 0x7ff3f4b7809a in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x2409a)

SUMMARY: AddressSanitizer: heap-buffer-overflow
/scratch/llvm/clang-4/xenial/final/llvm.src/projects/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:284:5
in __interceptor_strlen
Shadow bytes around the buggy address:
  0x0c247fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c247fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c247fff7ff0:

[Bug binutils/24245] New: readelf: heap buffer overflow in print_ia64_vms_note

2019-02-20 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24245

Bug ID: 24245
   Summary: readelf: heap buffer overflow in print_ia64_vms_note
   Product: binutils
   Version: 2.33 (HEAD)
Status: UNCONFIRMED
  Severity: normal
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: spinpx at gmail dot com
  Target Milestone: ---

Created attachment 11625
  --> https://sourceware.org/bugzilla/attachment.cgi?id=11625=edit
heap buffer overflow input

- Intel Xeon Gold 5118 processors and 256 GB memory
- Linux n18-065-139 4.19.0-1-amd64 #1 SMP Debian 4.19.12-1 (2018-12-22) x86_64
GNU/Linux
- clang version 4.0.0 (tags/RELEASE_400/final)
- version: commit c72e75a64030b0f6535a80481f37968ad55c333a (Feb 19 2019)
- run: readelf -a input_file

ELF Header:
  Magic:   7f 45 4c 46 02 00 00 00 05 00 00 e5 ff 10 00 00 
  Class: ELF64
  Data:  none
  Version:   0
  OS/ABI:UNIX - System V
  ABI Version:   5
  Type:  CORE (Core file)
  Machine:   AArch64
  Version:   0x190
  Entry point address:   0x8049080
  Start of program headers:  12 (bytes into file)
  Start of section headers:  -1945836514000764928 (bytes into file)
  Flags: 0xff0b
  Size of this header:   65535 (bytes)
  Size of program headers:   255 (bytes)
  Number of program headers: 6
  Size of section headers:   0 (bytes)
  Number of section headers: 32884
  Section header string table index: 2052
readelf: Error: Section headers are not available!
readelf: Warning: The e_phentsize field in the ELF header is larger than the
size of an ELF program header
=
==457681==ERROR: AddressSanitizer: heap-buffer-overflow on address
0x61200141 at pc 0x00441291 bp 0x7fff0c19ab60 sp 0x7fff0c19a2d0
READ of size 1 at 0x61200141 thread T0
#0 0x441290 in printf_common(void*, char const*, __va_list_tag*)
/scratch/llvm/clang-4/xenial/final/llvm.src/projects/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors_format.inc:544:9
#1 0x442c55 in __interceptor_vprintf
/scratch/llvm/clang-4/xenial/final/llvm.src/projects/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:1388:1
#2 0x442c55 in __interceptor_printf
/scratch/llvm/clang-4/xenial/final/llvm.src/projects/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:1434
#3 0x56f2a8 in print_ia64_vms_note
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:17950:11
#4 0x56c09f in process_note
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18579:12
#5 0x56a944 in process_notes_at
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18769:13
#6 0x5693a9 in process_corefile_note_segments
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18799:8
#7 0x524202 in process_notes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18944:12
#8 0x505c9d in process_object
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19303:9
#9 0x505363 in process_archive
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19623:17
#10 0x4f538f in process_file
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19698:13
#11 0x4f3ec8 in main
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19774:11
#12 0x7f20eec1209a in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x2409a)
#13 0x41d4b9 in _start
(/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/readelf+0x41d4b9)

0x61200141 is located 0 bytes to the right of 257-byte region
[0x61200040,0x61200141)
allocated by thread T0 here:
#0 0x4c41ac in malloc
/scratch/llvm/clang-4/xenial/final/llvm.src/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:66:3
#1 0x4f179f in get_data
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:426:9
#2 0x56965e in process_notes_at
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18635:36
#3 0x5693a9 in process_corefile_note_segments
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18799:8
#4 0x524202 in process_notes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18944:12
#5 0x505c9d in process_object
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19303:9
#6 0x505363 in process_archive
/mnt/raid/user/chenpeng/FuzzingBench/binut

[Bug binutils/24244] New: readelf: heap buffer overflow in unw_decode_uleb128

2019-02-20 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24244

Bug ID: 24244
   Summary: readelf: heap buffer overflow in unw_decode_uleb128
   Product: binutils
   Version: 2.33 (HEAD)
Status: UNCONFIRMED
  Severity: normal
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: spinpx at gmail dot com
  Target Milestone: ---

Created attachment 11624
  --> https://sourceware.org/bugzilla/attachment.cgi?id=11624=edit
Heap buffer overflow input

- Intel Xeon Gold 5118 processors and 256 GB memory
- Linux n18-065-139 4.19.0-1-amd64 #1 SMP Debian 4.19.12-1 (2018-12-22) x86_64
GNU/Linux
- clang version 4.0.0 (tags/RELEASE_400/final)
- version: commit c72e75a64030b0f6535a80481f37968ad55c333a (Feb 19 2019)
- run: readelf -a input_file

- asan_report:
ELF Header:
  Magic:   7f 45 4c 46 01 01 01 00 00 00 00 00 00 00 00 00 
  Class: ELF32
  Data:  2's complement, little endian
  Version:   1 (current)
  OS/ABI:UNIX - System V
  ABI Version:   0
  Type:  EXEC (Executable file)
  Machine:   Intel IA-64
  Version:   0x1
  Entry point address:   0x8048074
  Start of program headers:  52 (bytes into file)
  Start of section headers:  164 (bytes into file)
  Flags: 0x0
  Size of this header:   52 (bytes)
  Size of program headers:   32 (bytes)
  Number of program headers: 2
  Size of section headers:   40 (bytes)
  Number of section headers: 4
  Section header string table index: 3
readelf: Warning: Section 1 has an out of range sh_link value of 512
readelf: Error: Section 3 has invalid sh_entsize of 
readelf: Error: (Using the expected size of 16 for the rest of this dump)

Section Headers:
  [Nr] Name  TypeAddr OffSize   ES Flg Lk Inf
Al
  [ 0] .IA_64.unwind_inf NULL 00 64 100  0 
 0 4294967268
  [ 1] nd_info   PROGBITS08048081 67 0c 00  AX 512   0 
4
readelf: Warning: section 1: sh_link value of 512 is larger than the number of
sections
  [ 2] o IA_64_UNWIND00049000 00 0c 00  WA  0   0
570425348
readelf: Warning: [ 3]: Link field (0) should index a string section.
=
==427698==ERROR: AddressSanitizer: heap-buffer-overflow on address
0x60b03225 at pc 0x005871b5 bp 0x7ffdc2270470 sp 0x7ffdc2270468
READ of size 1 at 0x60b03225 thread T0
#0 0x5871b4 in unw_decode_uleb128
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/unwind-ia64.c:553:14
#1 0x58464f in unw_decode_r2
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/unwind-ia64.c:674:10
#2 0x58430c in unw_decode
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/unwind-ia64.c:1072:10
#3 0x55fe61 in dump_ia64_unwind
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:7519:7
#4 0x5533a5 in ia64_process_unwind
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:7814:6
#5 0x51a1c6 in process_unwind
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:9338:14
#6 0x505b0d in process_object
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19275:9
#7 0x4f547d in process_file
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19715:13
#8 0x4f3ec8 in main
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19774:11
#9 0x7fa6d20d609a in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x2409a)
#10 0x41d4b9 in _start
(/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/readelf+0x41d4b9)

0x60b03225 is located 0 bytes to the right of 101-byte region
[0x60b031c0,0x60b03225)
allocated by thread T0 here:
#0 0x4c41ac in malloc
/scratch/llvm/clang-4/xenial/final/llvm.src/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:66:3
#1 0x4f179f in get_data
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:426:9
#2 0x552ff6 in ia64_process_unwind
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:7796:33
#3 0x51a1c6 in process_unwind
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:9338:14
#4 0x505b0d in process_object
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19275:9
#5 0x4f547d in process_file
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19715:13
#6 0x4f3ec8 in main
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binut

[Bug binutils/24243] New: readelf: heap buffer overflow in process_mips_specific

2019-02-20 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24243

Bug ID: 24243
   Summary: readelf: heap buffer overflow in process_mips_specific
   Product: binutils
   Version: 2.33 (HEAD)
Status: UNCONFIRMED
  Severity: normal
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: spinpx at gmail dot com
  Target Milestone: ---

Created attachment 11623
  --> https://sourceware.org/bugzilla/attachment.cgi?id=11623=edit
Heap buffer overflow input

- Intel Xeon Gold 5118 processors and 256 GB memory
- Linux n18-065-139 4.19.0-1-amd64 #1 SMP Debian 4.19.12-1 (2018-12-22) x86_64
GNU/Linux
- clang version 4.0.0 (tags/RELEASE_400/final)
- version: commit c72e75a64030b0f6535a80481f37968ad55c333a (Feb 19 2019)
- run: readelf -a input_file

- asan_report:
ELF Header:
  Magic:   7f 45 4c 46 01 01 01 00 00 2d 00 00 00 00 00 00 
  Class: ELF32
  Data:  2's complement, little endian
  Version:   1 (current)
  OS/ABI:UNIX - System V
  ABI Version:   0
  Type:  EXEC (Executable file)
  Machine:   MIPS R3000
  Version:   0x1
  Entry point address:   0x7029
  Start of program headers:  52 (bytes into file)
  Start of section headers:  164 (bytes into file)
  Flags: 0x0
  Size of this header:   52 (bytes)
  Size of program headers:   32 (bytes)
  Number of program headers: 2
  Size of section headers:   40 (bytes)
  Number of section headers: 4
  Section header string table index: 3
readelf: Warning: Section 1 has an out of range sh_link value of 127

Section Headers:
  [Nr] Name  TypeAddr OffSize   ES Flg Lk Inf
Al
  [ 0]   NULL1000 00 00 00  0   0 
0
  [ 1] .text MIPS_OPTIONS08048074 74 01 00  AX 127   0 
4
readelf: Warning: section 1: sh_link value of 127 is larger than the number of
sections
  [ 2] .data LOUSER+0x5dff00 0800 80 0d 00 WADop  0
57087  4
  [ 3] .shstrtab STRTAB   8c 17 00  0   0 
1
Key to Flags:
  W (write), A (alloc), X (execute), M (merge), S (strings), I (info),
  L (link order), O (extra OS processing required), G (group), T (TLS),
  C (compressed), x (unknown), o (OS specific), E (exclude),
  p (processor specific)

There are no section groups in this file.

Program Headers:
  Type   Offset   VirtAddr   PhysAddr   FileSiz MemSiz  Flg Align
  DYNAMIC0x00 0x08048000 0x08048000 0x00090 0x00080 R E 0x1000
readelf: Error: no .dynamic section in the dynamic segment
  LOAD   0x1780 0x08049080 0x08049080 0xc 0xc RW  0x1000

 Section to Segment mapping:
  Segment Sections...
   00 .text 
   01 
  TagType Name/Value
 0x464c457f (: 464c457f)0x10101
 0x2d00 (: 2d00)0x0
 0x00080002 (: 80002)   0x1
 0x7029 (MIPS_OPTIONS)   0x34
 0x00a4 (: a4)  0x0
 0x00200034 (: 200034)  0x280002
 0x00030004 (: 30004)   0x2
 0x (NULL)   0x8048000

There are no relocations in this file.

The decoding of unwind sections for machine type MIPS R3000 is not currently
supported.

No version information found in this file.
readelf: Warning: Virtual address 0x34 not located in any PT_LOAD segment.
=
==395575==ERROR: AddressSanitizer: heap-buffer-overflow on address
0x602000f1 at pc 0x0057a23d bp 0x7fff14a78db0 sp 0x7fff14a78da8
WRITE of size 1 at 0x602000f1 thread T0
#0 0x57a23c in process_mips_specific
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:16211:21
#1 0x5255f7 in process_arch_specific
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18994:14
#2 0x505ccf in process_object
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19309:9
#3 0x4f547d in process_file
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19715:13
#4 0x4f3ec8 in main
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19774:11
#5 0x7f8ee3f4709a in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x2409a)
#6 0x41d4b9 in _start
(/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/readelf+0x41d4b9)

0x602000f1 is located 0 bytes to the right of 1-byte region
[0x602000f0,0x602000f1)
allocated by thread T0 here:
#0 0x4c41ac in malloc
/scratch/llvm/clang-4/xenial/final/llvm.src/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:66:3
   

[Bug binutils/24242] New: readelf: heap buffer overflow in byte_get_little_endian

2019-02-19 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24242

Bug ID: 24242
   Summary: readelf: heap buffer overflow in
byte_get_little_endian
   Product: binutils
   Version: 2.33 (HEAD)
Status: UNCONFIRMED
  Severity: normal
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: spinpx at gmail dot com
  Target Milestone: ---

Created attachment 11622
  --> https://sourceware.org/bugzilla/attachment.cgi?id=11622=edit
Heap buffer overflow input

- Intel Xeon Gold 5118 processors and 256 GB memory
- Linux n18-065-139 4.19.0-1-amd64 #1 SMP Debian 4.19.12-1 (2018-12-22) x86_64
GNU/Linux
- clang version 4.0.0 (tags/RELEASE_400/final)
- version: commit c72e75a64030b0f6535a80481f37968ad55c333a (Feb 19 2019)
- run: readelf -a input_file

- asan_report:
ELF Header:
  Magic:   7f 45 4c 46 01 01 01 00 00 00 00 00 34 00 20 e9 
  Class: ELF32
  Data:  2's complement, little endian
  Version:   1 (current)
  OS/ABI:UNIX - System V
  ABI Version:   0
  Type:  EXEC (Executable file)
  Machine:   Intel IA-64
  Version:   0xee01
  Entry point address:   0x8048074
  Start of program headers:  52 (bytes into file)
  Start of section headers:  164 (bytes into file)
  Flags: 0xde00, 32-bit
  Size of this header:   51 (bytes)
  Size of program headers:   32 (bytes)
  Number of program headers: 2
  Size of section headers:   40 (bytes)
  Number of section headers: 4
  Section header string table index: 3
readelf: Error: Reading 160 bytes extends past end of file for section headers
readelf: Error: Section headers are not available!
=
==328304==ERROR: AddressSanitizer: heap-buffer-overflow on address
0x60d000c1 at pc 0x005dd1d6 bp 0x7ffc427f3900 sp 0x7ffc427f38f8
READ of size 1 at 0x60d000c1 thread T0
#0 0x5dd1d5 in byte_get_little_endian
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/elfcomm.c:210:22
#1 0x56f778 in print_ia64_vms_note
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:17982:24
#2 0x56c09f in process_note
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18579:12
#3 0x56a944 in process_notes_at
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18769:13
#4 0x5693a9 in process_corefile_note_segments
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18799:8
#5 0x5691c6 in process_note_sections
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18927:12
#6 0x524199 in process_notes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18940:12
#7 0x505c9d in process_object
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19303:9
#8 0x4f547d in process_file
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19715:13
#9 0x4f3ec8 in main
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19774:11
#10 0x7fe5604f009a in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x2409a)
#11 0x41d4b9 in _start
(/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/readelf+0x41d4b9)

0x60d000c1 is located 0 bytes to the right of 129-byte region
[0x60d00040,0x60d000c1)
allocated by thread T0 here:
#0 0x4c41ac in malloc
/scratch/llvm/clang-4/xenial/final/llvm.src/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:66:3
#1 0x4f179f in get_data
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:426:9
#2 0x56965e in process_notes_at
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18635:36
#3 0x5693a9 in process_corefile_note_segments
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18799:8
#4 0x5691c6 in process_note_sections
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18927:12
#5 0x524199 in process_notes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:18940:12
#6 0x505c9d in process_object
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19303:9
#7 0x4f547d in process_file
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19715:13
#8 0x4f3ec8 in main
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/readelf.c:19774:11
#9 0x7fe5604f009a in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x2409a)

SUMMARY: AddressSanitizer: h

[Bug binutils/24233] objdump: Out of memory in libbfd.c

2019-02-19 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24233

--- Comment #4 from spinpx  ---
size can also trigger this:
https://sourceware.org/bugzilla/show_bug.cgi?id=24238

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
bug-binutils mailing list
bug-binutils@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-binutils


[Bug binutils/24238] New: size: Out of memory in libbfd

2019-02-19 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24238

Bug ID: 24238
   Summary: size: Out of memory in libbfd
   Product: binutils
   Version: 2.33 (HEAD)
Status: UNCONFIRMED
  Severity: normal
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: spinpx at gmail dot com
  Target Milestone: ---

Created attachment 11620
  --> https://sourceware.org/bugzilla/attachment.cgi?id=11620=edit
OOM input

size also has the OOM issue described in
https://sourceware.org/bugzilla/show_bug.cgi?id=24233


- Intel Xeon Gold 5118 processors and 256 GB memory
- Linux n18-065-139 4.19.0-1-amd64 #1 SMP Debian 4.19.12-1 (2018-12-22) x86_64
GNU/Linux
- clang version 4.0.0 (tags/RELEASE_400/final)
- version: commit c72e75a64030b0f6535a80481f37968ad55c333a (Feb 19 2019)
- run: size input_file


==1671718==ERROR: AddressSanitizer failed to allocate 0xf8
(1099511103488) bytes of LargeMmapAllocator (error code: 12)
==1671718==Process memory map follows:
0x0040-0x0041d000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/size
0x0041d000-0x008b3000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/size
0x008b3000-0x00987000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/size
0x00988000-0x00989000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/size
0x00989000-0x009e8000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/size
0x009e8000-0x01654000   
0x7fff7000-0x8fff7000   
0x8fff7000-0x02008fff7000   
0x02008fff7000-0x10007fff8000   
0x6000-0x6020   
0x6020-0x6021   
0x6021-0x602e   
0x602e-0x602e0001   
0x602e0001-0x6030   
0x6030-0x6031   
0x6031-0x603e   
0x603e-0x603e0001   
0x603e0001-0x6040   
0x6040-0x6041   
0x6041-0x604e   
0x604e-0x604e0001   
0x604e0001-0x6070   
0x6070-0x6071   
0x6071-0x607e   
0x607e-0x607e0001   
0x607e0001-0x6080   
0x6080-0x6081   
0x6081-0x608e   
0x608e-0x608e0001   
0x608e0001-0x60b0   
0x60b0-0x60b1   
0x60b1-0x60be   
0x60be-0x60be0001   
0x60be0001-0x60c0   
0x60c0-0x60c1   
0x60c1-0x60ce   
0x60ce-0x60ce0001   
0x60ce0001-0x60f0   
0x60f0-0x60f1   
0x60f1-0x60fe   
0x60fe-0x60fe0001   
0x60fe0001-0x6100   
0x6100-0x6101   
0x6101-0x610e   
0x610e-0x610e0001   
0x610e0001-0x6110   
0x6110-0x6111   
0x6111-0x611e   
0x611e-0x611e0001   
0x611e0001-0x6120   
0x6120-0x6121   
0x6121-0x612e   
0x612e-0x612e0001   
0x612e0001-0x6140   
0x6140-0x6141   
0x6141-0x614e   
0x614e-0x614e0001   
0x614e0001-0x6160   
0x6160-0x6161   
0x6161-0x616e   
0x616e-0x616e0001   
0x616e0001-0x6180   
0x6180-0x6181   
0x6181-0x618e   
0x618e-0x618e0001   
0x618e0001-0x61a0   
0x61a0-0x61a1   
0x61a1-0x61ae   
0x61ae-0x61ae0001   
0x61ae0001-0x61d0   
0x61d0-0x61d1   
0x61d1-0x61de   
0x61de-0x61de0001   
0x61de0001-0x61f0   
0x61f0-0x61f1   
0x61f1-0x61fe   
0x61fe-0x61fe0001   
0x61fe0001-0x6210   
0x6210-0x6211   
0x6211-0x621e   
0x621e-0x621e0001   
0x621e0001-0x6240   
0x6240-0x6241   
0x6241-0x624e   
0x624e-0x624e0001   
0x624e0001-0x6400   
0x6400-0x64003000   
0x7f1585c66

[Bug binutils/24232] objdump: Out of memory in objalloc.c

2019-02-19 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24232

--- Comment #4 from spinpx  ---
Related issue: https://sourceware.org/bugzilla/show_bug.cgi?id=24237

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
bug-binutils mailing list
bug-binutils@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-binutils


[Bug binutils/24237] size: Out of memory in objalloc.c

2019-02-19 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24237

--- Comment #1 from spinpx  ---
Created attachment 11619
  --> https://sourceware.org/bugzilla/attachment.cgi?id=11619=edit
OOM input

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
bug-binutils mailing list
bug-binutils@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-binutils


[Bug binutils/24237] New: size: Out of memory in objalloc.c

2019-02-19 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24237

Bug ID: 24237
   Summary: size: Out of memory in objalloc.c
   Product: binutils
   Version: 2.33 (HEAD)
Status: UNCONFIRMED
  Severity: normal
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: spinpx at gmail dot com
  Target Milestone: ---

size also has the OOM issue described in
https://sourceware.org/bugzilla/show_bug.cgi?id=24232

If the issue it in a library shared with nm and size and if other program use
it,  it will cause DOS attacks.

- Intel Xeon Gold 5118 processors and 256 GB memory
- Linux n18-065-139 4.19.0-1-amd64 #1 SMP Debian 4.19.12-1 (2018-12-22) x86_64
GNU/Linux
- clang version 4.0.0 (tags/RELEASE_400/final)
- version: commit c72e75a64030b0f6535a80481f37968ad55c333a (Feb 19 2019)
- run: size input_file


==1601289==ERROR: AddressSanitizer failed to allocate 0xfe01363000
(1090942021632) bytes of LargeMmapAllocator (error code: 12)
==1601289==Process memory map follows:
0x0040-0x0041d000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/size
0x0041d000-0x008b3000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/size
0x008b3000-0x00987000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/size
0x00988000-0x00989000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/size
0x00989000-0x009e8000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/size
0x009e8000-0x01654000   
0x7fff7000-0x8fff7000   
0x8fff7000-0x02008fff7000   
0x02008fff7000-0x10007fff8000   
0x6000-0x6020   
0x6020-0x6021   
0x6021-0x602e   
0x602e-0x602e0001   
0x602e0001-0x6030   
0x6030-0x6031   
0x6031-0x603e   
0x603e-0x603e0001   
0x603e0001-0x6040   
0x6040-0x6041   
0x6041-0x604e   
0x604e-0x604e0001   
0x604e0001-0x6060   
0x6060-0x6061   
0x6061-0x606e   
0x606e-0x606e0001   
0x606e0001-0x6070   
0x6070-0x6071   
0x6071-0x607e   
0x607e-0x607e0001   
0x607e0001-0x6080   
0x6080-0x6081   
0x6081-0x608e   
0x608e-0x608e0001   
0x608e0001-0x60b0   
0x60b0-0x60b1   
0x60b1-0x60be   
0x60be-0x60be0001   
0x60be0001-0x60c0   
0x60c0-0x60c1   
0x60c1-0x60ce   
0x60ce-0x60ce0001   
0x60ce0001-0x60f0   
0x60f0-0x60f1   
0x60f1-0x60fe   
0x60fe-0x60fe0001   
0x60fe0001-0x6100   
0x6100-0x6101   
0x6101-0x610e   
0x610e-0x610e0001   
0x610e0001-0x6110   
0x6110-0x6111   
0x6111-0x611e   
0x611e-0x611e0001   
0x611e0001-0x6120   
0x6120-0x6121   
0x6121-0x612e   
0x612e-0x612e0001   
0x612e0001-0x6140   
0x6140-0x6141   
0x6141-0x614e   
0x614e-0x614e0001   
0x614e0001-0x6160   
0x6160-0x6161   
0x6161-0x616e   
0x616e-0x616e0001   
0x616e0001-0x6180   
0x6180-0x6181   
0x6181-0x618e   
0x618e-0x618e0001   
0x618e0001-0x6190   
0x6190-0x6191   
0x6191-0x619e   
0x619e-0x619e0001   
0x619e0001-0x61a0   
0x61a0-0x61a1   
0x61a1-0x61ae   
0x61ae-0x61ae0001   
0x61ae0001-0x61b0   
0x61b0-0x61b1   
0x61b1-0x61be   
0x61be-0x61be0001   
0x61be0001-0x61d0   
0x61d0-0x61d1   
0x61d1-0x61de   
0x61de-0x61de0001   
0x61de0001-0x61f0   
0x61f0-0x61f1   
0x61f1

[Bug binutils/24236] size: Heap buffer overflow in _bfd_archive_64_bit_slurp_armap

2019-02-19 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24236

--- Comment #1 from spinpx  ---
Created attachment 11618
  --> https://sourceware.org/bugzilla/attachment.cgi?id=11618=edit
input triggers the bug

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
bug-binutils mailing list
bug-binutils@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-binutils


[Bug binutils/24236] New: size: Heap buffer overflow in _bfd_archive_64_bit_slurp_armap

2019-02-19 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24236

Bug ID: 24236
   Summary: size: Heap buffer overflow in
_bfd_archive_64_bit_slurp_armap
   Product: binutils
   Version: 2.33 (HEAD)
Status: UNCONFIRMED
  Severity: normal
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: spinpx at gmail dot com
  Target Milestone: ---

- Intel Xeon Gold 5118 processors and 256 GB memory
- Linux n18-065-139 4.19.0-1-amd64 #1 SMP Debian 4.19.12-1 (2018-12-22) x86_64
GNU/Linux
- clang version 4.0.0 (tags/RELEASE_400/final)
- version: commit c72e75a64030b0f6535a80481f37968ad55c333a (Feb 19 2019)
- run: size input_file

- Exploitable:
Description: Heap error
Short description: HeapError (10/22)
Hash: 0ab5d0005e74fc041576aa73a2a94770.f78de5a987638de0bf17f6470949c81d
Exploitability Classification: EXPLOITABLE
Explanation: The target's backtrace indicates that libc has detected a heap
error or that the target was executing a heap function when it stopped. This
could be due to heap corruption, passing a bad pointer to a heap function such
as free(), etc. Since heap errors might include buffer overflows,
use-after-free situations, etc. they are generally considered exploitable.
Other tags: AbortSignal (20/22)

- stack:
#0  __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50
#1  0x7fb7ebcef535 in __GI_abort () at abort.c:79
#2  0x7fb7ebd46778 in __libc_message (action=action@entry=do_abort,
fmt=fmt@entry=0x7fb7ebe5128d \"%s\\n\") at ../sysdeps/posix/libc_fatal.c:181
#3  0x7fb7ebd4ce6a in malloc_printerr (str=str@entry=0x7fb7ebe53018
\"double free or corruption (!prev)\") at malloc.c:5341
#4  0x7fb7ebd4e98c in _int_free (av=0x7fb7ebe88c40 ,
p=0xc49ac0, have_lock=) at malloc.c:4309
#5  0x005b6a64 in objalloc_free (o=0xc46780) at
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/objalloc.c:187
#6  0x004227f9 in _bfd_delete_bfd (abfd=0xc46660) at
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/bfd/opncls.c:126
#7  bfd_close_all_done (abfd=0xc46660) at
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/bfd/opncls.c:773
#8  0x004225e8 in bfd_close (abfd=0xc46660) at
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/bfd/opncls.c:735"
#9  0x004043dd in display_file (filename=0x7ffceb73e23b
\"/mnt/raid/user/chenpeng/FuzzingBench/size/crashes_matryoshka_cmin_crash/id:00-crash_2\")
at
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/size.c:409
#10 0x00403cc5 in main (argc=, argv=0x7fb7ebd048bb
<__GI_raise+267>) at
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/size.c:241"

- asan report:
==1423785==ERROR: AddressSanitizer: heap-buffer-overflow on address
0x62104e78 at pc 0x007f787c bp 0x7511d170 sp 0x7511d168
WRITE of size 1 at 0x62104e78 thread T0
#0 0x7f787b in _bfd_archive_64_bit_slurp_armap
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/bfd/archive64.c:126:15
#1 0x4fcfd6 in bfd_slurp_armap
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/bfd/archive.c:1152:14
#2 0x4fc895 in bfd_generic_archive_p
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/bfd/archive.c:875:8
#3 0x5207e5 in bfd_check_format_matches
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/bfd/format.c:315:14
#4 0x51f82e in bfd_check_format
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/bfd/format.c:94:10
#5 0x4f1eb5 in display_file
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/size.c:431:7
#6 0x4f1aa5 in main
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/size.c:260:7
#7 0x7f0399a5209a in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x2409a)
#8 0x41d5e9 in _start
(/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/size+0x41d5e9)

0x62104e78 is located 0 bytes to the right of 4472-byte region
[0x62103d00,0x62104e78)
allocated by thread T0 here:
#0 0x4c42dc in malloc
/scratch/llvm/clang-4/xenial/final/llvm.src/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:66:3
#1 0x8affb0 in _objalloc_alloc
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/objalloc.c:143:22
#2 0x52e450 in bfd_alloc
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/bfd/opncls.c:949:9
#3 0x52c5cc in bfd_zalloc
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/bfd/opncls.c:998:9
#4 0x7f74c7 in _bfd_archive_64_bit_slurp_armap
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/bfd/archive64.c:98:39
#5 0x4fcfd6 in bfd_slurp_armap
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/bfd/archive.c:1152:14
#6 0x4fc895 in bfd_generic_archive_p
/mnt/raid/user/chenpeng/FuzzingBench/binutils/bi

[Bug binutils/24233] objdump: Out of memory in libbfd.c

2019-02-19 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24233

--- Comment #3 from spinpx  ---
(In reply to Alan Modra from comment #2)
> The testcase has a VERDEFS section claiming to be 0xff7f00 in size.  I
> suppose we should inform the user that they hit an out-of-memory here rather
> than just silently ignoring the failure.

Agree.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
bug-binutils mailing list
bug-binutils@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-binutils


[Bug binutils/24235] New: objdump: Read memory violation in libbfd.c

2019-02-19 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24235

Bug ID: 24235
   Summary: objdump: Read memory violation in libbfd.c
   Product: binutils
   Version: 2.33 (HEAD)
Status: UNCONFIRMED
  Severity: normal
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: spinpx at gmail dot com
  Target Milestone: ---

Created attachment 11617
  --> https://sourceware.org/bugzilla/attachment.cgi?id=11617=edit
the input triggers the bug

- Intel Xeon Gold 5118 processors and 256 GB memory
- Linux n18-065-139 4.19.0-1-amd64 #1 SMP Debian 4.19.12-1 (2018-12-22) x86_64
GNU/Linux
- clang version 4.0.0 (tags/RELEASE_400/final)
- version: commit c72e75a64030b0f6535a80481f37968ad55c333a (Feb 19 2019)
- run objdump -x input_file

- asan report
==1161627==ERROR: AddressSanitizer: SEGV on unknown address 0x613000bbe0fe (pc
0x00607197 bp 0x7ffcfa7de560 sp 0x7ffcfa7de500 T0)
==1161627==The signal is caused by a READ memory access.
#0 0x607196 in bfd_getl32
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/bfd/libbfd.c:695:7
#1 0x896b30 in pex64_get_runtime_function
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/bfd/pei-x86_64.c:94:26
#2 0x88f222 in pex64_bfd_print_pdata_section
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/bfd/pei-x86_64.c:730:5
#3 0x88d555 in pex64_bfd_print_pdata
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/bfd/pei-x86_64.c:794:12
#4 0x8c3894 in _bfd_pex64_print_private_bfd_data_common
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/binutils-gdb/bfd/pex64igen.c:2911:5
#5 0x895d94 in pe_print_private_bfd_data
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/bfd/peicode.h:336:8
#6 0x4f65d5 in dump_bfd_private_header
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/objdump.c:3181:3
#7 0x4f51f9 in dump_bfd
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/objdump.c:3782:5
#8 0x4f4c71 in display_object_bfd
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/objdump.c:3883:7
#9 0x4f4b67 in display_any_bfd
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/objdump.c:3973:5
#10 0x4f424a in display_file
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/objdump.c:3994:3
#11 0x4f3ab0 in main
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/binutils/objdump.c:4304:6
#12 0x7f659f6c409a in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x2409a)
#13 0x41d639 in _start
(/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/objdump+0x41d639)

AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/bfd/libbfd.c:695:7
in bfd_getl32
==1161627==ABORTING


- Exploitable
Description: Access violation on source operand
Short description: SourceAv (19/22)
Hash: bafff732c614888210a0d11ed0439a22.5360e10ba1488dec3bada789cf815760
Exploitability Classification: UNKNOWN
"Explanation: The target crashed on an access violation at an address matching
the source operand of the current instruction. This likely indicates a read
access violation.
Other tags: AccessViolation (21/22)

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
bug-binutils mailing list
bug-binutils@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-binutils


[Bug binutils/24234] objdump: Out of memory in xmalloc.c

2019-02-19 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24234

--- Comment #1 from spinpx  ---
Also report on https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89398

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
bug-binutils mailing list
bug-binutils@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-binutils


[Bug binutils/24234] New: objdump: Out of memory in xmalloc.c

2019-02-19 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24234

Bug ID: 24234
   Summary: objdump: Out of memory in xmalloc.c
   Product: binutils
   Version: 2.33 (HEAD)
Status: UNCONFIRMED
  Severity: normal
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: spinpx at gmail dot com
  Target Milestone: ---

Created attachment 11616
  --> https://sourceware.org/bugzilla/attachment.cgi?id=11616=edit
inputs trigger the bugs

- Intel Xeon Gold 5118 processors and 256 GB memory
- Linux n18-065-139 4.19.0-1-amd64 #1 SMP Debian 4.19.12-1 (2018-12-22) x86_64
GNU/Linux
- clang version 4.0.0 (tags/RELEASE_400/final)
- version: commit c72e75a64030b0f6535a80481f37968ad55c333a (Feb 19 2019)
- run objdump -x input_file

- asan report

==1247614==ERROR: AddressSanitizer failed to allocate 0x552000
(365072228352) bytes of LargeMmapAllocator (error code: 12)
==1247614==Process memory map follows:
0x0040-0x0041d000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/objdump
0x0041d000-0x00996000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/objdump
0x00996000-0x00bc9000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/objdump
0x00bca000-0x00bcb000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/objdump
0x00bcb000-0x00c78000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/objdump
0x00c78000-0x018e9000   
0x7fff7000-0x8fff7000   
0x8fff7000-0x02008fff7000   
0x02008fff7000-0x10007fff8000   
0x6000-0x6020   
0x6020-0x6021   
0x6021-0x602e   
0x602e-0x602e0001   
0x602e0001-0x6030   
0x6030-0x6031   
0x6031-0x603e   
0x603e-0x603e0001   
0x603e0001-0x6040   
0x6040-0x6041   
0x6041-0x604e   
0x604e-0x604e0001   
0x604e0001-0x6060   
0x6060-0x6061   
0x6061-0x606e   
0x606e-0x606e0001   
0x606e0001-0x6070   
0x6070-0x6071   
0x6071-0x607e   
0x607e-0x607e0001   
0x607e0001-0x6080   
0x6080-0x6081   
0x6081-0x608e   
0x608e-0x608e0001   
0x608e0001-0x60b0   
0x60b0-0x60b1   
0x60b1-0x60be   
0x60be-0x60be0001   
0x60be0001-0x60c0   
0x60c0-0x60c1   
0x60c1-0x60ce   
0x60ce-0x60ce0001   
0x60ce0001-0x60f0   
0x60f0-0x60f1   
0x60f1-0x60fe   
0x60fe-0x60fe0001   
0x60fe0001-0x6100   
0x6100-0x6101   
0x6101-0x610e   
0x610e-0x610e0001   
0x610e0001-0x6110   
0x6110-0x6111   
0x6111-0x611e   
0x611e-0x611e0001   
0x611e0001-0x6120   
0x6120-0x6121   
0x6121-0x612e   
0x612e-0x612e0001   
0x612e0001-0x6140   
0x6140-0x6141   
0x6141-0x614e   
0x614e-0x614e0001   
0x614e0001-0x6160   
0x6160-0x6161   
0x6161-0x616e   
0x616e-0x616e0001   
0x616e0001-0x6180   
0x6180-0x6181   
0x6181-0x618e   
0x618e-0x618e0001   
0x618e0001-0x6190   
0x6190-0x6191   
0x6191-0x619e   
0x619e-0x619e0001   
0x619e0001-0x61a0   
0x61a0-0x61a1   
0x61a1-0x61ae   
0x61ae-0x61ae0001   
0x61ae0001-0x61b0   
0x61b0-0x61b1   
0x61b1-0x61be   
0x61be-0x61be0001   
0x61be0001-0x61d0   
0x61d0-0x61d1   
0x61d1-0x61de   
0x61de-0x61de0001   
0x61de0001-0x61f0   
0x61f0-0x61f1   
0x61f1-0x61fe   
0x61fe0

[Bug binutils/24233] New: objdump: Out of memory in libbfd.c

2019-02-19 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24233

Bug ID: 24233
   Summary: objdump: Out of memory in libbfd.c
   Product: binutils
   Version: 2.33 (HEAD)
Status: UNCONFIRMED
  Severity: normal
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: spinpx at gmail dot com
  Target Milestone: ---

Created attachment 11615
  --> https://sourceware.org/bugzilla/attachment.cgi?id=11615=edit
inputs that trigger bugs

- Intel Xeon Gold 5118 processors and 256 GB memory
- Linux n18-065-139 4.19.0-1-amd64 #1 SMP Debian 4.19.12-1 (2018-12-22) x86_64
GNU/Linux
- clang version 4.0.0 (tags/RELEASE_400/final)
- version: commit c72e75a64030b0f6535a80481f37968ad55c333a (Feb 19 2019)
- run objdump -x input_file

- asan report
==1243005==ERROR: AddressSanitizer failed to allocate 0xffa000
(1099511603200) bytes of LargeMmapAllocator (error code: 12)
==1243005==Process memory map follows:
0x0040-0x0041d000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/objdump
0x0041d000-0x00996000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/objdump
0x00996000-0x00bc9000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/objdump
0x00bca000-0x00bcb000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/objdump
0x00bcb000-0x00c78000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/objdump
0x00c78000-0x018e9000   
0x7fff7000-0x8fff7000   
0x8fff7000-0x02008fff7000   
0x02008fff7000-0x10007fff8000   
0x6000-0x6020   
0x6020-0x6021   
0x6021-0x602e   
0x602e-0x602e0001   
0x602e0001-0x6030   
0x6030-0x6031   
0x6031-0x603e   
0x603e-0x603e0001   
0x603e0001-0x6040   
0x6040-0x6041   
0x6041-0x604e   
0x604e-0x604e0001   
0x604e0001-0x6060   
0x6060-0x6061   
0x6061-0x606e   
0x606e-0x606e0001   
0x606e0001-0x6070   
0x6070-0x6071   
0x6071-0x607e   
0x607e-0x607e0001   
0x607e0001-0x6080   
0x6080-0x6081   
0x6081-0x608e   
0x608e-0x608e0001   
0x608e0001-0x60b0   
0x60b0-0x60b1   
0x60b1-0x60be   
0x60be-0x60be0001   
0x60be0001-0x60c0   
0x60c0-0x60c1   
0x60c1-0x60ce   
0x60ce-0x60ce0001   
0x60ce0001-0x60f0   
0x60f0-0x60f1   
0x60f1-0x60fe   
0x60fe-0x60fe0001   
0x60fe0001-0x6100   
0x6100-0x6101   
0x6101-0x610e   
0x610e-0x610e0001   
0x610e0001-0x6110   
0x6110-0x6111   
0x6111-0x611e   
0x611e-0x611e0001   
0x611e0001-0x6120   
0x6120-0x6121   
0x6121-0x612e   
0x612e-0x612e0001   
0x612e0001-0x6140   
0x6140-0x6141   
0x6141-0x614e   
0x614e-0x614e0001   
0x614e0001-0x6160   
0x6160-0x6161   
0x6161-0x616e   
0x616e-0x616e0001   
0x616e0001-0x6180   
0x6180-0x6181   
0x6181-0x618e   
0x618e-0x618e0001   
0x618e0001-0x6190   
0x6190-0x6191   
0x6191-0x619e   
0x619e-0x619e0001   
0x619e0001-0x61a0   
0x61a0-0x61a1   
0x61a1-0x61ae   
0x61ae-0x61ae0001   
0x61ae0001-0x61b0   
0x61b0-0x61b1   
0x61b1-0x61be   
0x61be-0x61be0001   
0x61be0001-0x61d0   
0x61d0-0x61d1   
0x61d1-0x61de   
0x61de-0x61de0001   
0x61de0001-0x61f0   
0x61f0-0x61f1   
0x61f1-0x61fe   
0x61fe0

[Bug binutils/24232] objdump: Out of memory in objalloc.c

2019-02-19 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24232

--- Comment #1 from spinpx  ---
Also report on https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89396

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
bug-binutils mailing list
bug-binutils@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-binutils


[Bug binutils/24232] New: objdump: Out of memory in objalloc.c

2019-02-19 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24232

Bug ID: 24232
   Summary: objdump: Out of memory in objalloc.c
   Product: binutils
   Version: 2.33 (HEAD)
Status: UNCONFIRMED
  Severity: normal
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: spinpx at gmail dot com
  Target Milestone: ---

- Intel Xeon Gold 5118 processors and 256 GB memory
- Linux n18-065-139 4.19.0-1-amd64 #1 SMP Debian 4.19.12-1 (2018-12-22) x86_64
GNU/Linux
- clang version 4.0.0 (tags/RELEASE_400/final)
- version: commit c72e75a64030b0f6535a80481f37968ad55c333a (Feb 19 2019)
- run objdump -x input_file

- asan report
==1221228==ERROR: AddressSanitizer failed to allocate 0xc0e4e83000
(828474142720) bytes of LargeMmapAllocator (error code: 12)
==1221228==Process memory map follows:
0x0040-0x0041d000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/objdump
0x0041d000-0x00996000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/objdump
0x00996000-0x00bc9000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/objdump
0x00bca000-0x00bcb000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/objdump
0x00bcb000-0x00c78000  
/mnt/raid/user/chenpeng/FuzzingBench/build/asan/install/bin/objdump
0x00c78000-0x018e9000   
0x7fff7000-0x8fff7000   
0x8fff7000-0x02008fff7000   
0x02008fff7000-0x10007fff8000   
0x6000-0x6020   
0x6020-0x6021   
0x6021-0x602e   
0x602e-0x602e0001   
0x602e0001-0x6030   
0x6030-0x6031   
0x6031-0x603e   
0x603e-0x603e0001   
0x603e0001-0x6040   
0x6040-0x6041   
0x6041-0x604e   
0x604e-0x604e0001   
0x604e0001-0x6060   
0x6060-0x6061   
0x6061-0x606e   
0x606e-0x606e0001   
0x606e0001-0x6070   
0x6070-0x6071   
0x6071-0x607e   
0x607e-0x607e0001   
0x607e0001-0x6080   
0x6080-0x6081   
0x6081-0x608e   
0x608e-0x608e0001   
0x608e0001-0x60b0   
0x60b0-0x60b1   
0x60b1-0x60be   
0x60be-0x60be0001   
0x60be0001-0x60c0   
0x60c0-0x60c1   
0x60c1-0x60ce   
0x60ce-0x60ce0001   
0x60ce0001-0x60f0   
0x60f0-0x60f1   
0x60f1-0x60fe   
0x60fe-0x60fe0001   
0x60fe0001-0x6100   
0x6100-0x6101   
0x6101-0x610e   
0x610e-0x610e0001   
0x610e0001-0x6110   
0x6110-0x6111   
0x6111-0x611e   
0x611e-0x611e0001   
0x611e0001-0x6120   
0x6120-0x6121   
0x6121-0x612e   
0x612e-0x612e0001   
0x612e0001-0x6140   
0x6140-0x6141   
0x6141-0x614e   
0x614e-0x614e0001   
0x614e0001-0x6160   
0x6160-0x6161   
0x6161-0x616e   
0x616e-0x616e0001   
0x616e0001-0x6180   
0x6180-0x6181   
0x6181-0x618e   
0x618e-0x618e0001   
0x618e0001-0x6190   
0x6190-0x6191   
0x6191-0x619e   
0x619e-0x619e0001   
0x619e0001-0x61a0   
0x61a0-0x61a1   
0x61a1-0x61ae   
0x61ae-0x61ae0001   
0x61ae0001-0x61b0   
0x61b0-0x61b1   
0x61b1-0x61be   
0x61be-0x61be0001   
0x61be0001-0x61d0   
0x61d0-0x61d1   
0x61d1-0x61de   
0x61de-0x61de0001   
0x61de0001-0x61f0   
0x61f0-0x61f1   
0x61f1-0x61fe   
0x61fe-0x61fe0001   
0x61fe0001-0x6210   
0x6210-0x6211   
0x6211

[Bug binutils/24227] nm: stack overflow

2019-02-19 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24227

--- Comment #4 from spinpx  ---
It can be reproduced in commit c72e75a64030b0f6535a80481f37968ad55c333a (Feb 19
2019)

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
bug-binutils mailing list
bug-binutils@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-binutils


[Bug binutils/24227] nm: stack overflow

2019-02-19 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24227

--- Comment #3 from spinpx  ---
report on gcc: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
bug-binutils mailing list
bug-binutils@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-binutils


[Bug binutils/24229] nm: heap buffer overflow

2019-02-19 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24229

--- Comment #2 from spinpx  ---
report on gcc: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
bug-binutils mailing list
bug-binutils@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-binutils


[Bug binutils/24227] New: nm: stack overflow

2019-02-18 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24227

Bug ID: 24227
   Summary: nm: stack overflow
   Product: binutils
   Version: 2.33 (HEAD)
Status: UNCONFIRMED
  Severity: critical
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: spinpx at gmail dot com
  Target Milestone: ---

- Intel Xeon Gold 5118 processors and 256 GB memory
- Linux n18-065-139 4.19.0-1-amd64 #1 SMP Debian 4.19.12-1 (2018-12-22) x86_64
GNU/Linux
- clang version 4.0.0 (tags/RELEASE_400/final)
- version: commit commit 388a192d73df7439bf375d8b8042bb53a6be9c60
- run: nm -C input_file   (We attached the inputs that trigger the bug)
- asan report:
==1992137==ERROR: AddressSanitizer: stack-overflow on address 0x7ffc986fff68
(pc 0x008975c5 bp 0x7ffc987000a0 sp 0x7ffc986fff70 T0)
#0 0x8975c4 in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4149:7
#1 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#2 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#3 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#4 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#5 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#6 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#7 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#8 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#9 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#10 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#11 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#12 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#13 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#14 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#15 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#16 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#17 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#18 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#19 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#20 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#21 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#22 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#23 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#24 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#25 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#26 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#27 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#28 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#29 0x89762f in d_count_templates_scopes
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:4151:7
#30 0x89762f in d_count_templates_scopes
/mnt/raid/user

[Bug binutils/24229] nm: heap buffer overflow

2019-02-18 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24229

spinpx  changed:

   What|Removed |Added

   Severity|normal  |critical

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
bug-binutils mailing list
bug-binutils@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-binutils


[Bug binutils/24227] nm: stack overflow

2019-02-18 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24227

--- Comment #1 from Peng Chen  ---
Created attachment 11611
  --> https://sourceware.org/bugzilla/attachment.cgi?id=11611=edit
Inputs trigger the bug

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
bug-binutils mailing list
bug-binutils@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-binutils


[Bug binutils/24229] New: nm: heap buffer overflow

2019-02-18 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=24229

Bug ID: 24229
   Summary: nm: heap buffer overflow
   Product: binutils
   Version: 2.33 (HEAD)
Status: UNCONFIRMED
  Severity: normal
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: spinpx at gmail dot com
  Target Milestone: ---

Created attachment 11612
  --> https://sourceware.org/bugzilla/attachment.cgi?id=11612=edit
inputs that trigger bugs

- Intel Xeon Gold 5118 processors and 256 GB memory
- Linux n18-065-139 4.19.0-1-amd64 #1 SMP Debian 4.19.12-1 (2018-12-22) x86_64
GNU/Linux
- clang version 4.0.0 (tags/RELEASE_400/final)
- version: commit commit 388a192d73df7439bf375d8b8042bb53a6be9c60
- run: nm -C input_file   (We attached the inputs that trigger the bug)
- asan report:
==2003322==ERROR: AddressSanitizer: heap-buffer-overflow on address
0x60e000d8 at pc 0x008957c6 bp 0x7ffdf2e36340 sp 0x7ffdf2e36338
READ of size 1 at 0x60e000d8 thread T0
#0 0x8957c5 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3356:12
#1 0x896370 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3449:16
#2 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#3 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#4 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#5 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#6 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#7 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#8 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#9 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#10 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#11 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#12 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#13 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#14 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#15 0x896370 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3449:16
#16 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#17 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#18 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#19 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#20 0x896370 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3449:16
#21 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#22 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#23 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#24 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#25 0x89610c in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3416:18
#26 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#27 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#28 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#29 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#30 0x896210 in d_expression_1
/mnt/raid/user/chenpeng/FuzzingBench/binutils/binutils-gdb/libiberty/cp-demangle.c:3438:15
#31 0x896210 in d_expression_1
/

[Bug binutils/22858] Crashes found by fuzzer

2018-02-21 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=22858

--- Comment #3 from Peng Chen  ---
I really found them crash in 2.29 in my PC.
Have you limit the memory? use "ulimit -Sv 50".
They won't trigger crash with unlimited memory.
But, you know, they must be available in limited memory. 

test options:
nm -C {input}
objdump -x {input}
size {input}

I just ran my fuzzer 5 hours with one core.. I will run it more in future.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
bug-binutils mailing list
bug-binutils@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-binutils


[Bug binutils/22858] Crashes found by fuzzer

2018-02-17 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=22858

Peng Chen  changed:

   What|Removed |Added

 CC||spinpx at gmail dot com

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
bug-binutils mailing list
bug-binutils@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-binutils


[Bug binutils/22858] New: Crashes found by fuzzer

2018-02-17 Thread spinpx at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=22858

Bug ID: 22858
   Summary: Crashes found by fuzzer
   Product: binutils
   Version: 2.29
Status: UNCONFIRMED
  Severity: normal
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: spinpx at gmail dot com
  Target Milestone: ---

Created attachment 10830
  --> https://sourceware.org/bugzilla/attachment.cgi?id=10830=edit
Input of crashes and analysis

Hi,

I found some crashes in binutils by my developed fuzzer. They are found in nm,
objdump and size program. They are 117 unique inputs in total. Each input has
their unique program trace. Also, I did a simple analysis for these crashes. I
attach the inputs triggering crashes and the report of my analysis for them
(log.json and log_unique.json). 

Environment: Ubuntu16.04 64bit, and "ulimit -Sv 50"(The bug can't be
trigger in unlimted memory..).

-- 
You are receiving this mail because:
You are on the CC list for the bug.
___
bug-binutils mailing list
bug-binutils@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-binutils