I think this is fixed upstream by http://hg.mozilla.org/releases/mozilla-2.0/rev/c5b3d7beca8c#l17.29 . The problem was that struct hentry ended with a single char that was used as a variable-length array, and writing multiple chars into the space allocated for a single char triggered fortify checks (even though there was enough space after the end of the struct). Now it ends with a char[1], which fortify recognizes as represending a flexible array.
-- You received this bug notification because you are a member of Ubuntu Bugs, which is a direct subscriber. https://bugs.launchpad.net/bugs/723830 Title: seamonkey-2.0-bin assert failure: *** buffer overflow detected ***: /usr/lib/seamonkey-2.0.11/seamonkey-2.0-bin terminated -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
