bug-binutils
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Bug binutils/30231] New: objdump: SEGV in cgen_bitset_intersect_p


From: youngseok.main at gmail dot com
Subject: [Bug binutils/30231] New: objdump: SEGV in cgen_bitset_intersect_p
Date: Tue, 14 Mar 2023 07:22:49 +0000

https://sourceware.org/bugzilla/show_bug.cgi?id=30231

            Bug ID: 30231
           Summary: objdump: SEGV in cgen_bitset_intersect_p
           Product: binutils
           Version: 2.40
            Status: UNCONFIRMED
          Severity: normal
          Priority: P2
         Component: binutils
          Assignee: unassigned at sourceware dot org
          Reporter: youngseok.main at gmail dot com
  Target Milestone: ---

Created attachment 14750
  --> https://sourceware.org/bugzilla/attachment.cgi?id=14750&action=edit
poc_file used in command input

We found a segmentation violation bug in objdump by fuzzing.

Command to reproduce:
objdump poc_file -D -mc5

poc_file is attached.

Command output:

poc_file:     file format elf32-i386


Disassembly of section .interp:

08048154 <.interp>:

Stack trace:
==13645==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000040 (pc
0x5555564adcd6 bp 0x7fffffffccd0 sp 0x7fffffffccb0 T0)
==13645==The signal is caused by a READ memory access.
==13645==Hint: address points to the zero page.
    #0 0x5555564adcd5 in cgen_bitset_intersect_p
/home/youngseok/latest-subjects/binutils-gdb/opcodes/cgen-bitset.c:137
    #1 0x55555659f57c in mep_cgen_insn_supported
/home/youngseok/latest-subjects/binutils-gdb/opcodes/mep-opc.c:159
    #2 0x55555658e046 in print_insn
/home/youngseok/latest-subjects/binutils-gdb/opcodes/mep-dis.c:1387
    #3 0x55555658ec29 in default_print_insn
/home/youngseok/latest-subjects/binutils-gdb/opcodes/mep-dis.c:1481
    #4 0x55555658a9e9 in mep_print_insn
/home/youngseok/latest-subjects/binutils-gdb/opcodes/mep-dis.c:690
    #5 0x55555658f20a in print_insn_mep
/home/youngseok/latest-subjects/binutils-gdb/opcodes/mep-dis.c:1608
    #6 0x5555563567df in disassemble_bytes objdump.c:3433
    #7 0x55555635a02e in disassemble_section objdump.c:4050
    #8 0x5555568468f1 in bfd_map_over_sections
/home/youngseok/latest-subjects/binutils-gdb/bfd/section.c:1366
    #9 0x55555635afff in disassemble_data objdump.c:4199
    #10 0x555556362a74 in dump_bfd objdump.c:5683
    #11 0x555556362d40 in display_object_bfd objdump.c:5746
    #12 0x555556363089 in display_any_bfd objdump.c:5833
    #13 0x5555563630ff in display_file objdump.c:5854
    #14 0x555556364a8b in main objdump.c:6265
    #15 0x7ffff6844c86 in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
    #16 0x555556348ad9 in _start
(/home/youngseok/latest-subjects/binutils-gdb/binutils/objdump+0xdf4ad9)

*Environment*
- OS: Ubuntu 18.04
- gcc: 7.5.0
- binutils: 2.40.50.20230314

binutils is built it address sanitizer. Here is the build script:
CFLAGS="-fsanitize=address -g -O0" CXXFLAGS="-fsanitize=address -g -O0" \
./configure --enable-targets=all

-- 
You are receiving this mail because:
You are on the CC list for the bug.


reply via email to

[Prev in Thread] Current Thread [Next in Thread]