Hopefully fixed in Hardy.
** Changed in: lha (Ubuntu)
Status: Confirmed => Fix Released
--
lha is broken in gutsy amd64
https://bugs.launchpad.net/bugs/173210
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailin
** Changed in: lha (Debian)
Status: Unknown => Fix Released
--
lha is broken in gutsy amd64
https://bugs.launchpad.net/bugs/173210
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@list
(Hopefully) fixed in lha 1.14i-10.3.
--
lha is broken in gutsy amd64
https://bugs.launchpad.net/bugs/173210
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubu
The security patch 2007-2030 (see for instance
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2030) seems to be quite badly
conceived.
It mixes two things:
- makes sure that some buffers are zero-terminated
- introduces a new fopen for temporary files which includes the O_CREAT and
O_EXCL flags
** Changed in: lha (Ubuntu)
Importance: Undecided => Medium
Status: New => Confirmed
--
lha is broken in gutsy amd64
https://bugs.launchpad.net/bugs/173210
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-bugs m
** Bug watch added: Debian Bug tracker #446236
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446236
** Also affects: lha (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446236
Importance: Unknown
Status: Unknown
--
lha is broken in gutsy amd64
https://bugs.launch