*** This bug is a security vulnerability *** Public security bug reported:
'xsel' crashes when the input length is within a specific range; adds random characters to output. Demo: ben@feynman:~$ perl -we'print "."x4000'|xsel -i;xsel -o|wc -c 4000 ben@feynman:~$ perl -we'print "."x4001'|xsel -i;xsel -o|wc -c 0 ben@feynman:~$ perl -we'print "."x8000'|xsel -i;xsel -o|wc -c 0 ben@feynman:~$ perl -we'print "."x8001'|xsel -i;xsel -o|wc -c 8006 Tested on several different hosts just to make sure. The number of additional characters (i.e., the '8006' returned for an 8001-char input) varies, but all crash in the same way. Best regards, Ben ** Affects: xsel (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1179267 Title: xsel buffer overflow To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xsel/+bug/1179267/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs