The attachment "bson-fix-overflow.patch" seems to be a patch. If it
isn't, please remove the "patch" flag from the attachment, remove the
"patch" tag, and if you are a member of the ~ubuntu-reviewers,
unsubscribe the team.
[This is an automated message performed by a Launchpad user owned by
~bria
I would like to update the contents of 'Attack Scenario'.
from:
$ python -c "print('A' * 0x + ' : ' + 'B')" > /var/crash/fake.crash
to:
$ python -c "print('A' * 0xFFFE + ' : ' + 'B')" > /var/crash/fake.crash
Segfault can arise when the following requirements are met, as I mentioned
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to whoopsie in Ubuntu.
https://bugs.launchpad.net/bugs/1872560
Title:
heap-based buffer overflow in bson.c
S
3 matches
Mail list logo