seamonkey-2.0-bin assert failure: *** buffer overflow detected ***: /usr/lib/seamonkey-2.0.11/seamonkey-2.0-bin terminated
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Hunspell |
Unknown
|
Unknown
|
|||
SeaMonkey |
Invalid
|
Critical
|
|||
seamonkey (Ubuntu) |
Fix Released
|
Medium
|
Unassigned |
Bug Description
Binary package hint: seamonkey
Seamonkey has consistently crashed since I started using the Alpha builds in the 11.04 series. Previous versions of Seamonkey with Kubuntu or Xubuntu were quite reliable; since Alpha testing, even accessing a few Web pages has been difficult. Looks like a buffer overflow is the culprit. Until the debugger came up, I had no diagnostic information to provide; otherwise I would have sent it in much sooner.
ProblemType: Crash
DistroRelease: Ubuntu 11.04
Package: seamonkey-browser 2.0.11+
ProcVersionSign
Uname: Linux 2.6.38-4-generic i686
NonfreeKernelMo
Architecture: i386
AssertionMessage: *** buffer overflow detected ***: /usr/lib/
Date: Wed Feb 23 12:16:55 2011
ExecutablePath: /usr/lib/
InstallationMedia: Kubuntu 11.04 "Natty Narwhal" - Alpha i386 (20110202)
ProcCmdline: /usr/lib/
ProcEnviron:
LANG=en_US.UTF-8
SHELL=/bin/bash
Signal: 6
SourcePackage: seamonkey
StacktraceTop:
__kernel_vsyscall ()
raise () from /lib/libc.so.6
abort () from /lib/libc.so.6
?? () from /lib/libc.so.6
__fortify_fail () from /lib/libc.so.6
Title: seamonkey-2.0-bin assert failure: *** buffer overflow detected ***: /usr/lib/
UserGroups: adm admin cdrom dialout lpadmin plugdev sambashare
security vulnerability: | yes → no |
visibility: | private → public |
tags: | added: patch |
Changed in seamonkey (Ubuntu): | |
status: | Incomplete → Confirmed |
Changed in seamonkey: | |
importance: | Unknown → Critical |
status: | Unknown → Invalid |
StacktraceTop: sysdeps/ unix/sysv/ linux/raise. c:64 unix/sysv/ linux/libc_ fatal.c: 189
__kernel_vsyscall ()
raise (sig=6) at ../nptl/
abort () at abort.c:92
__libc_message (do_abort=2, fmt=0x6c382a "*** %s ***: %s terminated\n") at ../sysdeps/
__fortify_fail (msg=0x6c37ab "buffer overflow detected") at fortify_fail.c:32