[arch-general] glibc 2.18-5 question
Allan McRae
allan at archlinux.org
Fri Sep 27 09:36:53 EDT 2013
On 27/09/13 01:15, LANGLOIS Olivier PIS -EXT wrote:
> Hi,
>
> I just checked what was the motivation for this 5th release and I have found:
>
> http://hmarco.org/bugs/CVE-2013-4788.html
>
> where it says:
>
> The vulnerability is caused due to the non initialization to a random value (it is always zero) of the "pointer guard" by the glibc only when generating static compiled executables. Dynamic executables are not affected. Pointer guard is used to mangle the content of sensible pointers (longjmp, signal handlers, etc.), if the pointer guard value is zero (non-initialized) then it is not effective.
>
> So, out of curiosity, how big is the threat since I am under the impression that almost 100% if not 100% of Arch binaries uses libc.so
>
In short, I am not overly concerned about this. But fixing the issue
was the right thing to do, so it will not spread any further.
Allan
More information about the arch-general
mailing list