Conversation

predictions: the script kiddies will figure out that there are other SUID freedesktop.org softwares which use GLib. the distros which install my execve(2) patch will sleep happy at night, the ones who don't will spend the next few weeks playing whack a mole.
3
67
Size overflow has a lot of false positives due to or intended or unintended but benign integer overflows and could cause DoS issues but you know what you're getting when you choose to enable it. If you're using RBAC or enforcing MPROTECT/TPE you also know what you're getting.
1
Doesn't really break much unless you ask for it by enforcing that programs can't execute dynamically generated code in-memory (MPROTECT) or the similar guarantees provided by TPE for storage. There are only a few minor changes which can break programs doing very strange things.
1
I can think of a few cases where they change how Linux APIs work such as the setxid feature which primarily just makes setuid, etc. POSIX compliant in the kernel instead of requiring libc, etc. to hack around it. Fixes issues like this past 9 year bug:
1
Technically breaks Linux API compatibility and I once found a program which was broken by it. They changed the feature to work around it though. I totally forget the details. Android Runtime was also broken by PaX stack mapping changes but upstream broke it a similar way later.