Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2008-1367

Published: 17 March 2008

gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.

Notes

AuthorNote
jdstrand
glibc part should be glibc 2.7-7 only
use a low priority, since gcc-4.3 seems to be what is triggering
it

Priority

Low

Status

Package Release Status
gcc-4.3
Launchpad, Ubuntu, Debian
dapper Does not exist

edgy Does not exist

feisty Does not exist

gutsy Does not exist

hardy Does not exist

upstream
Released (4.3.0-2)
glibc
Launchpad, Ubuntu, Debian
dapper Not vulnerable
(2.3.6-0ubuntu20)
edgy Not vulnerable
(2.4-1ubuntu12)
feisty Not vulnerable
(2.5-0ubuntu14)
gutsy Not vulnerable
(2.6.1-1ubuntu9)
hardy Not vulnerable
(2.7-9ubuntu2)
upstream
Released (2.7-8)
linux
Launchpad, Ubuntu, Debian
dapper Does not exist

edgy Does not exist

feisty Does not exist

gutsy Does not exist

hardy Not vulnerable

upstream Not vulnerable
(2.6.24.4)
Patches:
other: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058




linux-source-2.6.15
Launchpad, Ubuntu, Debian
dapper Not vulnerable

edgy Does not exist

feisty Does not exist

gutsy Does not exist

hardy Does not exist

upstream Not vulnerable

Patches:

other: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058



linux-source-2.6.17
Launchpad, Ubuntu, Debian
dapper Does not exist

edgy Not vulnerable

feisty Does not exist

gutsy Does not exist

hardy Does not exist

upstream Not vulnerable

Patches:


other: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058


linux-source-2.6.20
Launchpad, Ubuntu, Debian
dapper Does not exist

edgy Does not exist

feisty Not vulnerable

gutsy Does not exist

hardy Does not exist

upstream Not vulnerable

Patches:



other: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058

linux-source-2.6.22
Launchpad, Ubuntu, Debian
dapper Does not exist

edgy Does not exist

feisty Does not exist

gutsy Not vulnerable

hardy Does not exist

upstream Not vulnerable

Patches:




other: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058