From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 4936 invoked by alias); 18 Feb 2015 14:45:00 -0000 Mailing-List: contact glibc-bugs-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: glibc-bugs-owner@sourceware.org Received: (qmail 4842 invoked by uid 48); 18 Feb 2015 14:44:57 -0000 From: "fweimer at redhat dot com" To: glibc-bugs@sourceware.org Subject: [Bug nptl/16657] Lock elision breaks pthread_mutex_destroy Date: Wed, 18 Feb 2015 14:45:00 -0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: glibc X-Bugzilla-Component: nptl X-Bugzilla-Version: 2.18 X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: fweimer at redhat dot com X-Bugzilla-Status: RESOLVED X-Bugzilla-Priority: P2 X-Bugzilla-Assigned-To: unassigned at sourceware dot org X-Bugzilla-Target-Milestone: 2.21 X-Bugzilla-Flags: security- X-Bugzilla-Changed-Fields: flagtypes.name Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: http://sourceware.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-SW-Source: 2015-02/txt/msg00240.txt.bz2 https://sourceware.org/bugzilla/show_bug.cgi?id=16657 Florian Weimer changed: What |Removed |Added ---------------------------------------------------------------------------- Flags| |security- --- Comment #39 from Florian Weimer --- (In reply to Florian Weimer from comment #14) > (In reply to Rich Felker from comment #13) > > Yes, see comment #5. But if you're asking about security flag, my impression > > was that so far the security flag is only being used where the bug leads > > directly to a security problem more serious than plain DoS. > > I was asking about real-world application impact, e.g. "we discovered this > bug because Apache httpd was crashing after processing a certain sequence of > requests" (purely hypothetically speaking). It's not always easy to draw > the line between a reliability bug which manifests somewhat randomly, and a > denial-of-service vulnerability which can be triggered with some > non-negligible probability (which will approach 1 after a sufficient number > of attempts). No security impact has been reported, so I'm flagging this as security-. -- You are receiving this mail because: You are on the CC list for the bug.