This is the mail archive of the glibc-bugs@sourceware.org mailing list for the glibc project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug nptl/16657] Lock elision breaks pthread_mutex_destroy


https://sourceware.org/bugzilla/show_bug.cgi?id=16657

--- Comment #14 from Florian Weimer <fweimer at redhat dot com> ---
(In reply to Rich Felker from comment #13)
> Yes, see comment #5. But if you're asking about security flag, my impression
> was that so far the security flag is only being used where the bug leads
> directly to a security problem more serious than plain DoS.

I was asking about real-world application impact, e.g. "we discovered this bug
because Apache httpd was crashing after processing a certain sequence of
requests" (purely hypothetically speaking).  It's not always easy to draw the
line between a reliability bug which manifests somewhat randomly, and a
denial-of-service vulnerability which can be triggered with some non-negligible
probability (which will approach 1 after a sufficient number of attempts).

-- 
You are receiving this mail because:
You are on the CC list for the bug.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]