0809
https://unix.stackexchange.com/questions/530524/disable-stack-smashing-detected-unknown-terminated
I'm not running ubuntu, but I don't think that's possible in newer versions of glibc. See this commit.
Short of writing your own stack smashing detector, of course.
You can have a look at the source of the function printing that message:
void
__attribute__ ((noreturn))
__fortify_fail_abort (_Bool need_backtrace, const char *msg)
{
/* The loop is added only to keep gcc happy. Don't pass down
__libc_argv[0] if we aren't doing backtrace since __libc_argv[0]
may point to the corrupted stack. */
while (1)
__libc_message (need_backtrace ? (do_abort | do_backtrace) : do_abort,
"*** %s ***: %s terminated\n",
msg,
(need_backtrace && __libc_argv[0] != NULL
? __libc_argv[0] : "<unknown>"));
}
This function will be called with need_backtrace = False from the __stack_chk_fail, itself called from the stack protector code compiled into the binary.