This bug was fixed in the package liblockfile - 1.09-3ubuntu0.1
---------------
liblockfile (1.09-3ubuntu0.1) precise-proposed; urgency=low
* debian/patches/fix-buffer-overflows.patch: Fix buffer overflows when
building strings
- Protect against overflows caused by long hostnames (LP: #941968)
- Protect against overflows caused by large PID numbers (LP: #1011477)
-- Adam Gandelman <[email protected]> Thu, 20 Jun 2013 12:37:10 -0700
** Changed in: liblockfile (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1011477
Title:
[SRU] liblockfile buffer overflow with high pid numbers
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/liblockfile/+bug/1011477/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs