On 27/09/13 01:15, LANGLOIS Olivier PIS -EXT wrote:
Hi,
I just checked what was the motivation for this 5th release and I have found:
http://hmarco.org/bugs/CVE-2013-4788.html
where it says:
The vulnerability is caused due to the non initialization to a random value (it is always zero) of the "pointer guard" by the glibc only when generating static compiled executables. Dynamic executables are not affected. Pointer guard is used to mangle the content of sensible pointers (longjmp, signal handlers, etc.), if the pointer guard value is zero (non-initialized) then it is not effective.
So, out of curiosity, how big is the threat since I am under the impression that almost 100% if not 100% of Arch binaries uses libc.so
In short, I am not overly concerned about this. But fixing the issue was the right thing to do, so it will not spread any further. Allan