On Tue, 22 Apr 2008, Mark Mitchell wrote:

> Chad Dougherty wrote:
> 
> > The vulnerability note has been significantly reworked to focus on the issue
> > of undefined behavior handling in the compiler and the fact that conforming
> > implementations are not required to warn of this condition. I've tried to
> > incorporate many of the valid concerns that were raise on this list in
> > response to the original vulnerability note.
> 
> Thank you for making the update; this is a big improvement.
> 
> However, I'm surprised that only GCC is listed as "vulnerable" at the bottom
> of the page.  We've provided information about a lot of other compilers that
> do the same optimization.  Why is the status for compilers from Microsoft,
> Intel, IBM, etc. listed as "Unknown" instead of "Vulnerable"?
> 
> -- 
> Mark Mitchell
> CodeSourcery
> [EMAIL PROTECTED]
> (650) 331-3385 x713

Additionally, the linked to notes for GCC are reflective of the original 
innaccuracies: 

http://www.kb.cert.org/vuls/id/CRDY-7DWKWM

Vendor Statement
No statement is currently available from the vendor regarding this 
vulnerability.

US-CERT Addendum
Vendors and developers using the GNU C compiler should consider 
downgrading their version of gcc or sticking with versions of the gcc 
compiler (before version 4.1) that do not perform the offending 
optimization. In the case of gcc, it should be emphasized that this is a 
change of behavior in the later versions of the compiler.

Later,
Brad

Reply via email to