Replying to this email means your email address will be shared with the team that works on this product.
https://issues.oss-fuzz.com/issues/386713387Changedaccess level: Limited visibility → Default access
pe...@google.com added comment #3:
This bug has been fixed. It has been opened to the public.
_______________________________
Reference Info: 386713387 binutils:fuzz_objcopy: Heap-use-after-free in bfd_errmsg
component: Public Trackers > 1362134 > OSS Fuzzstatus: Verified
reporter: 87...@developer.gserviceaccount.com
assignee: cl...@appspot.gserviceaccount.com
verifier: cl...@appspot.gserviceaccount.com
cc: am...@gmail.com, bug-binutils@gnu.org, da...@adalogics.com, and 2 more
collaborators: co...@oss-fuzz.com
type: Vulnerability
access level: Default access
priority: P2
severity: S1
hotlist: ClusterFuzz-Verified,
Reproducible,
Stability-LibFuzzer,
Stability-Memory-AddressSanitizerretention: Component default
Disclosure: Apr 3, 2025
Project: binutils
Reported: Jan 3, 2025
Generated by Google IssueTracker notification system.
You're receiving this email because you are subscribed to updates on Google IssueTracker issue 386713387
Unsubscribe from this issue.