*** This bug is a security vulnerability ***

Public security bug reported:

'xsel' crashes when the input length is within a specific range; adds
random characters to output. Demo:

ben@feynman:~$ perl -we'print "."x4000'|xsel -i;xsel -o|wc -c
4000
ben@feynman:~$ perl -we'print "."x4001'|xsel -i;xsel -o|wc -c
0
ben@feynman:~$ perl -we'print "."x8000'|xsel -i;xsel -o|wc -c
0
ben@feynman:~$ perl -we'print "."x8001'|xsel -i;xsel -o|wc -c
8006

Tested on several different hosts just to make sure. The number of
additional characters (i.e., the '8006' returned for an 8001-char input)
varies, but all crash in the same way.


Best regards,
Ben

** Affects: xsel (Ubuntu)
     Importance: Undecided
         Status: New

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1179267

Title:
  xsel buffer overflow

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xsel/+bug/1179267/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to