Is that a regression from intrepid, or cause serious bugs? In particular, would this have helped to mitigate vulnerabilities which were discovered/fixed in jaunty?
This does not match the SRU criteria at first sight, so please elaborate about the impact a bit. The regression potential on this one seems to be excessively high to me, since it could potentially affect all programs (and some might do weird tricks with the stack, and got fixed later on for karmic). ** Changed in: glibc (Ubuntu Jaunty) Status: New => Incomplete -- stack protector guard value does not lead with a NULL byte https://bugs.launchpad.net/bugs/413278 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs