*** This bug is a security vulnerability ***

You have been subscribed to a public security bug by Leonidas S. Barbosa 
(leosilvab):

Error

ProblemType: Crash
DistroRelease: Ubuntu 23.04
Package: clamav-freshclam 0.103.7+dfsg-1ubuntu1
ProcVersionSignature: Ubuntu 5.19.0-29.30-generic 5.19.17
Uname: Linux 5.19.0-29-generic x86_64
NonfreeKernelModules: nvidia_modeset nvidia
ApportVersion: 2.24.0-0ubuntu2
Architecture: amd64
AssertionMessage: *** stack smashing detected ***: terminated
CasperMD5CheckResult: pass
CrashCounter: 1
Date: Wed Jan 25 14:26:46 2023
ExecutablePath: /usr/bin/freshclam
InstallationDate: Installed on 2022-12-29 (26 days ago)
InstallationMedia: Ubuntu 22.10 "Kinetic Kudu" - Release amd64 (20221020)
ProcAttrCurrent: /usr/bin/freshclam (enforce)
ProcCmdline: BOOT_IMAGE=/boot/vmlinuz-5.19.0-29-generic 
root=UUID=4719a9cb-1d2b-400f-9531-79e80c0dd51e ro quiet splash vt.handoff=7
ProcEnviron: Error: [Errno 13] Permission denied: 'environ'
ProcMaps: Error: [Errno 13] Permission denied: 'maps'
Signal: 6
SourcePackage: clamav
StacktraceTop:
 __libc_message (action=action@entry=do_abort, fmt=fmt@entry=0x7f3e0a5b9393 
"*** %s ***: terminated\n") at ../sysdeps/posix/libc_fatal.c:155
 __GI___fortify_fail (msg=msg@entry=0x7f3e0a5b937b "stack smashing detected") 
at ./debug/fortify_fail.c:26
 __stack_chk_fail () at ./debug/stack_chk_fail.c:24
 ?? () from /lib/x86_64-linux-gnu/libclamav.so.9
 ?? ()
Title: freshclam assert failure: *** stack smashing detected ***: terminated
UpgradeStatus: Upgraded to lunar on 2023-01-24 (0 days ago)
UserGroups: N/A
separator:

** Affects: clamav (Ubuntu)
     Importance: Medium
         Status: New


** Tags: amd64 apport-crash lunar
-- 
freshclam assert failure: *** stack smashing detected ***: terminated
https://bugs.launchpad.net/bugs/2003864
You received this bug notification because you are a member of Ubuntu Bugs, 
which is subscribed to the bug report.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to