As an attacker, I can gain control of the process through shell commands or through stack overflows, so if shell command access is "by design", stack overflows are no worse (from a security perspective). This is absolutely a bug, since the process will crash due to the stack protector checks, but I don't see how it's a security issue.
-- bwbasic buffer overflow in variable assignments https://bugs.launchpad.net/bugs/424597 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
