This was finished in Hardy (8.04).
** This bug is no longer a duplicate of bug 139435
[Security] PIE executables
** Package changed: linux-meta (Ubuntu) => linux (Ubuntu)
** Changed in: linux (Ubuntu)
Status: Confirmed => Fix Released
--
[Security] Heap and PIE randomization
https://
*** This bug is a duplicate of bug 139435 ***
https://bugs.launchpad.net/bugs/139435
I marked the bug as duplicate. It's a similar bug to #139435. On
jaunty, I believe intrepid introduced it (via linux kernel upgrade) all
memory maps are randomized apart from the executable (unless PIE which
Sorry, forgot lkml pointers:
http://lkml.org/lkml/2007/8/8/221
http://lkml.org/lkml/2007/8/22/254
--
[Security] Heap and PIE randomization
https://bugs.launchpad.net/bugs/139436
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
Yes, this is where we're heading. I've been working with some of the
SuSE engineers to test and prepare patches[1] for LKML. For other
details and a test tool, see bug 83895.
** Changed in: linux-meta (Ubuntu)
Importance: Undecided => Wishlist
Status: New => Confirmed
--
[Security] H