Is that a regression from intrepid, or cause serious bugs? In
particular, would this have helped to mitigate vulnerabilities which
were discovered/fixed in jaunty?

This does not match the SRU criteria at first sight, so please elaborate
about the impact a bit. The regression potential on this one seems to be
excessively high to me, since it could potentially affect all programs
(and some might do weird tricks with the stack, and got fixed later on
for karmic).

** Changed in: glibc (Ubuntu Jaunty)
       Status: New => Incomplete

-- 
stack protector guard value does not lead with a NULL byte
https://bugs.launchpad.net/bugs/413278
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to