[Bug 139436] Re: [Security] Heap and PIE randomization

2009-04-17 Thread Kees Cook
This was finished in Hardy (8.04). ** This bug is no longer a duplicate of bug 139435 [Security] PIE executables ** Package changed: linux-meta (Ubuntu) => linux (Ubuntu) ** Changed in: linux (Ubuntu) Status: Confirmed => Fix Released -- [Security] Heap and PIE randomization https://

[Bug 139436] Re: [Security] Heap and PIE randomization

2009-04-06 Thread Stephen Cook
*** This bug is a duplicate of bug 139435 *** https://bugs.launchpad.net/bugs/139435 I marked the bug as duplicate. It's a similar bug to #139435. On jaunty, I believe intrepid introduced it (via linux kernel upgrade) all memory maps are randomized apart from the executable (unless PIE which

[Bug 139436] Re: [Security] Heap and PIE randomization

2007-09-13 Thread Kees Cook
Sorry, forgot lkml pointers: http://lkml.org/lkml/2007/8/8/221 http://lkml.org/lkml/2007/8/22/254 -- [Security] Heap and PIE randomization https://bugs.launchpad.net/bugs/139436 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. --

[Bug 139436] Re: [Security] Heap and PIE randomization

2007-09-13 Thread Kees Cook
Yes, this is where we're heading. I've been working with some of the SuSE engineers to test and prepare patches[1] for LKML. For other details and a test tool, see bug 83895. ** Changed in: linux-meta (Ubuntu) Importance: Undecided => Wishlist Status: New => Confirmed -- [Security] H