I think this is fixed upstream by
http://hg.mozilla.org/releases/mozilla-2.0/rev/c5b3d7beca8c#l17.29 .
The problem was that struct hentry ended with a single char that was
used as a variable-length array, and writing multiple chars into the
space allocated for a single char triggered fortify checks (even though
there was enough space after the end of the struct).  Now it ends with a
char[1], which fortify recognizes as represending a flexible array.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is a direct subscriber.
https://bugs.launchpad.net/bugs/723830

Title:
  seamonkey-2.0-bin assert failure: *** buffer overflow detected ***:
  /usr/lib/seamonkey-2.0.11/seamonkey-2.0-bin terminated

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to