java assert failure: *** buffer overflow detected ***: java terminated

Bug #978743 reported by Benedikt
14
This bug affects 2 people
Affects Status Importance Assigned to Milestone
openjdk-7 (Ubuntu)
Confirmed
Medium
Unassigned

Bug Description

I opened the Arduino IDE. I waited a few seconds and than I started the IDE a second Time. Then both IDE's showed up. I closed one and the crash report appeared! Because of the Buffer Overflow it could be a security Issue.

ProblemType: Crash
DistroRelease: Ubuntu 12.04
Package: openjdk-7-jre-headless 7~u3-2.1-1ubuntu3
ProcVersionSignature: Ubuntu 3.2.0-22.35-generic-pae 3.2.14
Uname: Linux 3.2.0-22-generic-pae i686
NonfreeKernelModules: nvidia
ApportVersion: 2.0.1-0ubuntu1
Architecture: i386
AssertionMessage: *** buffer overflow detected ***: java terminated
Date: Wed Apr 11 10:48:00 2012
EcryptfsInUse: Yes
ExecutablePath: /usr/lib/jvm/java-7-openjdk-i386/jre/bin/java
InstallationMedia: Ubuntu 12.04 LTS "Precise Pangolin" - Beta i386 (20120328)
ProcCmdline: java -Dswing.defaultlaf=com.sun.java.swing.plaf.gtk.GTKLookAndFeel processing.app.Base
ProcEnviron:
 SHELL=/bin/bash
 PATH=(custom, no user)
 LANG=de_DE.UTF-8
Signal: 6
SourcePackage: openjdk-7
StacktraceTop:
 __libc_message (do_abort=2, fmt=0xb76cf1fe "*** %s ***: %s terminated\n") at ../sysdeps/unix/sysv/linux/libc_fatal.c:201
 __GI___fortify_fail (msg=0xb76cf17f "buffer overflow detected") at fortify_fail.c:32
 __GI___chk_fail () at chk_fail.c:29
 _IO_str_chk_overflow (fp=0xb66ef520, c=105) at vsprintf_chk.c:35
 _IO_default_xsputn (f=0xb66ef520, data=0x7dbd87a6, n=27) at genops.c:485
Title: java assert failure: *** buffer overflow detected ***: java terminated
UpgradeStatus: No upgrade log present (probably fresh install)
UserGroups: IntelliJ adm cdrom dialout dip firebird lpadmin plugdev sambashare sudo

Revision history for this message
Benedikt (benedikt-klotz) wrote :
Revision history for this message
Apport retracing service (apport) wrote :

StacktraceTop:
 __libc_message (do_abort=2, fmt=0xb76cf1fe "*** %s ***: %s terminated\n") at ../sysdeps/unix/sysv/linux/libc_fatal.c:201
 __GI___fortify_fail (msg=0xb76cf17f "buffer overflow detected") at fortify_fail.c:32
 __GI___chk_fail () at chk_fail.c:29
 _IO_str_chk_overflow (fp=0xb66ef520, c=105) at vsprintf_chk.c:35
 _IO_default_xsputn (f=0xb66ef520, data=0x7dbd87a6, n=27) at genops.c:485

Revision history for this message
Apport retracing service (apport) wrote : Stacktrace.txt
Revision history for this message
Apport retracing service (apport) wrote : ThreadStacktrace.txt
Changed in openjdk-7 (Ubuntu):
importance: Undecided → Medium
tags: removed: need-i386-retrace
security vulnerability: yes → no
security vulnerability: yes → no
visibility: private → public
visibility: private → public
Revision history for this message
Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in openjdk-7 (Ubuntu):
status: New → Confirmed
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.