I would like to update the contents of 'Attack Scenario'. from: $ python -c "print('A' * 0xFFFFFFFF + ' : ' + 'B')" > /var/crash/fake.crash
to: $ python -c "print('A' * 0xFFFFFFFE + ' : ' + 'B')" > /var/crash/fake.crash Segfault can arise when the following requirements are met, as I mentioned above. - length of ‘value’ in .crash file => 0 < {length of ‘value’} < 1024 - length of ‘key’ in .crash file => UINT32_MAX - {length of ‘value’} - 7 < {length of ‘key’} < UINT32_MAX Please check this issue. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1872560 Title: heap-based buffer overflow in bson.c To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/whoopsie/+bug/1872560/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs