Skip to content

Commit 011fab2

Browse files
Fix some typos.
1 parent 77b0d06 commit 011fab2

4 files changed

Lines changed: 4 additions & 4 deletions

File tree

SecurityExploits/Ubuntu/Apport_TOCTOU_get_ignore_dom_CVE-2019-7307/killwhoopsie1.cpp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ int main() {
3030
write_repeated_buffer(crash_fd.get(), "kevwozere", 9, 0x100000000ULL - 16);
3131
// Increase the size of the value by continuing on the next line.
3232
// This causes an integer overflow here:
33-
// http://bazaar.launchpad.net/~daisy-pluckers/whoopsie/trunk/view/698/src/whoopsie.c#L425
33+
// https://bazaar.launchpad.net/~daisy-pluckers/whoopsie/trunk/view/698/src/whoopsie.c#L425
3434
write_or_throw(crash_fd.get(), "\n ", 2);
3535

3636
// Interestingly, if we make `mchunkhdr` exactly 15 bytes long then the

SecurityExploits/Ubuntu/Apport_TOCTOU_get_ignore_dom_CVE-2019-7307/killwhoopsie2.cpp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ int main() {
3838
write_or_throw(crash_fd.get(), "\n", 1);
3939

4040
// Add another value which triggers an integer overflow here:
41-
// http://bazaar.launchpad.net/~daisy-pluckers/whoopsie/trunk/view/698/lib/bson/bson.c#L613
41+
// https://bazaar.launchpad.net/~daisy-pluckers/whoopsie/trunk/view/698/lib/bson/bson.c#L613
4242
// Due to this integer overflow, bson_ensure_space fails to detect that
4343
// more memory needs to be allocated, which leads to a heap buffer
4444
// overflow.

SecurityExploits/Ubuntu/Apport_TOCTOU_get_ignore_dom_CVE-2019-7307/restart_whoopsie.cpp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@ ssize_t Main::runonce() {
131131
// is the number of processes which we expect will be spawned between
132132
// when Apport finishes generating the crash report for the old whoopsie
133133
// and when the new whoopsie starts up. This number is non-deterministic
134-
// because something like 15 /lib/systemd/systemd-udevd processes seeme
134+
// because something like 15 /lib/systemd/systemd-udevd processes seem
135135
// to get forked at exactly the same time as the new whoopsie process is
136136
// started. This means that there is a race between whoopsie and the udev
137137
// processes to get a pid, which means that we cannot completely control

SecurityExploits/Ubuntu/Apport_TOCTOU_get_ignore_dom_CVE-2019-7307/whoopsie_exploit.cpp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -764,7 +764,7 @@ void Main::init_large_crash_file(const int crash_fd) {
764764
write_or_throw(crash_fd, "\n", 1);
765765

766766
// Add another value which triggers an integer overflow here:
767-
// http://bazaar.launchpad.net/~daisy-pluckers/whoopsie/trunk/view/698/lib/bson/bson.c#L613
767+
// https://bazaar.launchpad.net/~daisy-pluckers/whoopsie/trunk/view/698/lib/bson/bson.c#L613
768768
// Due to this integer overflow, bson_ensure_space fails to detect that
769769
// more memory needs to be allocated, which leads to a heap buffer
770770
// overflow.

0 commit comments

Comments
 (0)