This is the mail archive of the
binutils@sourceware.org
mailing list for the binutils project.
Re: vulnerabilities in libbfd (CVE-2014-beats-me)
- From: Pedro Alves <palves at redhat dot com>
- To: Yury Gribov <y dot gribov at samsung dot com>, Nicholas Clifton <nickc at redhat dot com>, "Maciej W. Rozycki" <macro at linux-mips dot org>, Michal Zalewski <lcamtuf at coredump dot cx>
- Cc: bugtraq <bugtraq at securityfocus dot com>, binutils at sourceware dot org, Petr Machata <pmachata at redhat dot com>
- Date: Thu, 30 Oct 2014 14:33:52 +0000
- Subject: Re: vulnerabilities in libbfd (CVE-2014-beats-me)
- Authentication-results: sourceware.org; auth=none
- References: <CALx_OUBq4iRGZNPLdCuqXmehVV=6vhXN3J16ytzM91cFqVSAoQ at mail dot gmail dot com> <alpine dot LFD dot 2 dot 11 dot 1410271451411 dot 3413 at eddie dot linux-mips dot org> <54521A7F dot 4050501 at redhat dot com> <5452389B dot 502 at samsung dot com>
On 10/30/2014 01:09 PM, Yury Gribov wrote:
> On 10/30/2014 02:01 PM, Nicholas Clifton wrote:
>> Hi Maciej, Hi Michal,
>> It is true however that there are still vulnerabilities in libbfd, and I
>> for one would happy to see new bug reports exposing them. I can assure
>> you that any such bug report reaching me will be treated seriously, and
>> will be investigated and fixed as soon as possible.
>
> We could cook a (simple) ELF fuzzer and run it on Binutils with
> AddressSanitizer enabled. Perhaps there is one I'm unaware of?
I've heard of Melkor - an ELF file format fuzzer. See:
https://www.blackhat.com/us-14/arsenal.html#Hernandez
I believe Petr Machata (in CC now) ran this against elfutils, and
it indeed exposed some bugs.
> Traditional fuzzers like afl are necessarily limited for highly
> structured inputs.
Thanks,
Pedro Alves