Self-registration is disabled due to spam issue (mail [email protected] or [email protected] to create an account)
Bug 3392296 - Invalid read in nasm function parse_line, exposed by Address Sanitizer
Summary: Invalid read in nasm function parse_line, exposed by Address Sanitizer
Status: OPEN
Alias: None
Product: NASM
Classification: Unclassified
Component: Assembler (show other bugs)
Version: unspecified
Hardware: All All
: Medium normal
Assignee: Cyrill Gorcunov
URL:
Depends on:
Blocks:
 
Reported: 2014-12-21 01:58 PST by Hanno Boeck
Modified: 2016-06-19 09:06 PDT (History)
2 users (show)

Obtained from:
Generated by: ---
Bug category:
Breaks existing code: ---


Attachments
sample file (15 bytes, application/octet-stream)
2014-12-21 01:58 PST, Hanno Boeck
Details
address sanitizer output (2.04 KB, text/plain)
2014-12-21 01:59 PST, Hanno Boeck
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Hanno Boeck 2014-12-21 01:58:08 PST
Created attachment 411532 [details]
sample file

Attached is a sample file that will expose an invalid memory access in nasm. It can be found when compiling nasm with address sanitizer (./configure CFLAGS="-fsanitize=addres" LDFLAGS="-fsanitize=address"). Affects current git head code.

Found with american fuzzy lop.
Comment 1 Hanno Boeck 2014-12-21 01:59:04 PST
Created attachment 411533 [details]
address sanitizer output