[Bug 333722] Re: zsh killed by stack smashing protection

2011-08-11 Thread Bug Watch Updater
** Changed in: zsh (Debian)
   Status: Unknown => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/333722

Title:
  zsh killed by stack smashing protection

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/zsh/+bug/333722/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 333722] Re: zsh killed by stack smashing protection

2009-04-10 Thread Marc Deslauriers
This is fixed in jaunty. Closing bug.

** Changed in: zsh (Ubuntu)
   Status: Confirmed => Fix Released

-- 
zsh killed by stack smashing protection
https://bugs.launchpad.net/bugs/333722
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 333722] Re: zsh killed by stack smashing protection

2009-04-10 Thread Marc Deslauriers
Fixed in debian's 4.3.9-4

Patch available:

http://www.zsh.org/mla/workers/2009/msg00388.html
http://patch-tracking.debian.net/patch/misc/view/zsh/4.3.9-4/Src/hist.c

-- 
zsh killed by stack smashing protection
https://bugs.launchpad.net/bugs/333722
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 333722] Re: zsh killed by stack smashing protection

2009-03-24 Thread Kees Cook
** Bug watch added: Debian Bug tracker #521108
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521108

** Also affects: zsh (Debian) via
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521108
   Importance: Unknown
   Status: Unknown

-- 
zsh killed by stack smashing protection
https://bugs.launchpad.net/bugs/333722
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 333722] Re: zsh killed by stack smashing protection

2009-03-24 Thread Kees Cook
I've confirmed this (see the duplicates for an apport crash).
Reproducer, just typing:

!

-- 
zsh killed by stack smashing protection
https://bugs.launchpad.net/bugs/333722
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 333722] Re: zsh killed by stack smashing protection

2009-03-24 Thread Kees Cook
** Changed in: zsh (Ubuntu)
   Importance: Undecided => Low

** Changed in: zsh (Ubuntu)
   Status: Incomplete => Confirmed

-- 
zsh killed by stack smashing protection
https://bugs.launchpad.net/bugs/333722
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 333722] Re: zsh killed by stack smashing protection

2009-02-25 Thread DragonK
Well, I took a look at the zsh code and it seems to have a buffer
overflow when expanding the "!" on the command line.

To trigger, just type  "!AA"  (without the quotes) at the zsh
prompt.

If zsh is compiled with stack protection code, the overflow is detected
faster. If not, you need to type lots of A's.

% gdb ./zsh ./core
[...]
Core was generated by `AA'.
Program terminated with signal 11, Segmentation fault.
[New process 23255]
#0  0x41414141 in ?? ()
(gdb) bt
#0  0x41414141 in ?? ()
Cannot access memory at address 0x41414145
(gdb) i r
eax0x   -1
ecx0x0  0
edx0xb7e7d0dc   -1209544484
ebx0x3e91001
esp0xbfc17660   0xbfc17660
ebp0x41414141   0x41414141
esi0x41414141   1094795585
edi0x41414141   1094795585
eip0x41414141   0x41414141
eflags 0x210246 [ PF ZF IF RF ID ]
cs 0x73 115
ss 0x7b 123
ds 0x7b 123
es 0x7b 123
fs 0x0  0
gs 0x33 51

-- 
zsh killed by stack smashing protection
https://bugs.launchpad.net/bugs/333722
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 333722] Re: zsh killed by stack smashing protection

2009-02-24 Thread Ted
Thank you for taking the time to report this bug and helping to make Ubuntu 
better. Please answer these questions:
1. Is this reproducible?
2. If so, what specific steps should we take to recreate this bug? Be as 
detailed as possible.
This will help us to find and resolve the problem.

** Changed in: zsh (Ubuntu)
   Status: New => Incomplete

-- 
zsh killed by stack smashing protection
https://bugs.launchpad.net/bugs/333722
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 333722] Re: zsh killed by stack smashing protection

2009-02-24 Thread DragonK

** Attachment added: "crash_info.txt"
   http://launchpadlibrarian.net/23045707/crash_info.txt

-- 
zsh killed by stack smashing protection
https://bugs.launchpad.net/bugs/333722
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs