On 27/09/13 01:15, LANGLOIS Olivier PIS -EXT wrote:
> Hi,
> 
> I just checked what was the motivation for this 5th release and I have found:
> 
> http://hmarco.org/bugs/CVE-2013-4788.html
> 
> where it says:
> 
> The vulnerability is caused due to the non initialization to a random value 
> (it is always zero) of the "pointer guard" by the glibc only when generating 
> static compiled executables. Dynamic executables are not affected. Pointer 
> guard is used to mangle the content of sensible pointers (longjmp, signal 
> handlers, etc.), if the pointer guard value is zero (non-initialized) then it 
> is not effective.
> 
> So, out of curiosity, how big is the threat since I am under the impression 
> that almost 100% if not 100% of Arch binaries uses libc.so
>

In short, I am not overly concerned about this.  But fixing the issue
was the right thing to do, so it will not spread any further.

Allan

Reply via email to