[Touch-packages] [Bug 1872560] Re: heap-based buffer overflow in bson.c

2020-04-22 Thread Ubuntu Foundations Team Bug Bot
The attachment "bson-fix-overflow.patch" seems to be a patch. If it isn't, please remove the "patch" flag from the attachment, remove the "patch" tag, and if you are a member of the ~ubuntu-reviewers, unsubscribe the team. [This is an automated message performed by a Launchpad user owned by

[Touch-packages] [Bug 1872560] Re: heap-based buffer overflow in bson.c

2020-04-22 Thread Seong-Joong Kim
I would like to update the contents of 'Attack Scenario'. from: $ python -c "print('A' * 0x + ' : ' + 'B')" > /var/crash/fake.crash to: $ python -c "print('A' * 0xFFFE + ' : ' + 'B')" > /var/crash/fake.crash Segfault can arise when the following requirements are met, as I mentioned

[Touch-packages] [Bug 1872560] Re: heap-based buffer overflow in bson.c

2020-04-22 Thread Seong-Joong Kim
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to whoopsie in Ubuntu. https://bugs.launchpad.net/bugs/1872560 Title: heap-based buffer overflow in bson.c