Sourceware Bugzilla – Attachment 10121 Details for
Bug 21587
global-buffer-overflow in rx_decode_opcode
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
report
9ed130cf25d8df5207cad7fc0de4fc1f.109246746a4907b00292c7837b29f085.txt (text/plain), 3.16 KB, created by
Alexandre Adamski
on 2017-06-13 21:03:38 UTC
(
hide
)
Description:
report
Filename:
MIME Type:
Creator:
Alexandre Adamski
Created:
2017-06-13 21:03:38 UTC
Size:
3.16 KB
patch
obsolete
>/home/neat/testing-elf/binutils-gdb/binutils/objdump: Reading section failed because: File truncated >================================================================= >==5030==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000002910ee4 at pc 0x000000909b70 bp 0x7fffffffd510 sp 0x7fffffffd508 >READ of size 4 at 0x000002910ee4 thread T0 > #0 0x909b6f in rx_disp /home/neat/testing-elf/binutils-gdb/opcodes/rx-decode.opc > #1 0x909b6f in rx_decode_opcode /home/neat/testing-elf/binutils-gdb/opcodes/rx-decode.opc:288 > #2 0x813ec8 in print_insn_rx /home/neat/testing-elf/binutils-gdb/opcodes/rx-dis.c:123:8 > #3 0x523117 in disassemble_bytes /home/neat/testing-elf/binutils-gdb/binutils/./objdump.c:1864:17 > #4 0x523117 in disassemble_section /home/neat/testing-elf/binutils-gdb/binutils/./objdump.c:2309 > #5 0x955da7 in bfd_map_over_sections /home/neat/testing-elf/binutils-gdb/bfd/section.c:1395:5 > #6 0x518d74 in disassemble_data /home/neat/testing-elf/binutils-gdb/binutils/./objdump.c:2445:3 > #7 0x518d74 in dump_bfd /home/neat/testing-elf/binutils-gdb/binutils/./objdump.c:3547 > #8 0x5162b1 in display_any_bfd /home/neat/testing-elf/binutils-gdb/binutils/./objdump.c > #9 0x5158dc in display_file /home/neat/testing-elf/binutils-gdb/binutils/./objdump.c:3714:3 > #10 0x5158dc in main /home/neat/testing-elf/binutils-gdb/binutils/./objdump.c:4016 > #11 0x7ffff6f12b44 in __libc_start_main /build/glibc-KShDyh/glibc-2.19/csu/libc-start.c:287 > #12 0x41d5fb in _start (/home/neat/testing-elf/binutils-gdb/binutils/objdump+0x41d5fb) > >0x000002910ee4 is located 0 bytes to the right of global variable 'PSCALE' defined in 'rx-decode.opc:89:12' (0x2910ec0) of size 36 >SUMMARY: AddressSanitizer: global-buffer-overflow /home/neat/testing-elf/binutils-gdb/opcodes/rx-decode.opc in rx_disp >Shadow bytes around the buggy address: > 0x00008051a180: 00 00 03 f9 f9 f9 f9 f9 00 00 03 f9 f9 f9 f9 f9 > 0x00008051a190: 00 00 04 f9 f9 f9 f9 f9 00 07 f9 f9 f9 f9 f9 f9 > 0x00008051a1a0: 00 07 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 > 0x00008051a1b0: 00 07 f9 f9 f9 f9 f9 f9 00 06 f9 f9 f9 f9 f9 f9 > 0x00008051a1c0: 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 >=>0x00008051a1d0: 00 00 f9 f9 f9 f9 f9 f9 00 00 00 00[04]f9 f9 f9 > 0x00008051a1e0: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 > 0x00008051a1f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 0x00008051a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 0x00008051a210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 0x00008051a220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >Shadow byte legend (one shadow byte represents 8 application bytes): > Addressable: 00 > Partially addressable: 01 02 03 04 05 06 07 > Heap left redzone: fa > Freed heap region: fd > Stack left redzone: f1 > Stack mid redzone: f2 > Stack right redzone: f3 > Stack after return: f5 > Stack use after scope: f8 > Global redzone: f9 > Global init order: f6 > Poisoned by user: f7 > Container overflow: fc > Array cookie: ac > Intra object redzone: bb > ASan internal: fe > Left alloca redzone: ca > Right alloca redzone: cb >==5030==ABORTING
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 21587
:
10120
| 10121