CVE-2008-1367

EUVD-2008-1374
gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 87%
Affected Products (NVD)
VendorProductVersion
gnugcc
4.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
glibc
bookworm
2.36-9+deb12u8
fixed
bookworm (security)
2.36-9+deb12u7
fixed
bullseye
2.31-13+deb11u11
fixed
bullseye (security)
2.31-13+deb11u10
fixed
etch
not-affected
sid
2.40-3
fixed
trixie
2.40-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gcc-4.3
dapper
dne
edgy
dne
feisty
dne
gutsy
dne
hardy
dne
glibc
dapper
not-affected
edgy
not-affected
feisty
not-affected
gutsy
not-affected
hardy
not-affected
linux
dapper
dne
edgy
dne
feisty
dne
gutsy
dne
hardy
not-affected
linux-source-2.6.15
dapper
not-affected
edgy
dne
feisty
dne
gutsy
dne
hardy
dne
linux-source-2.6.17
dapper
dne
edgy
not-affected
feisty
dne
gutsy
dne
hardy
dne
linux-source-2.6.20
dapper
dne
edgy
dne
feisty
not-affected
gutsy
dne
hardy
dne
linux-source-2.6.22
dapper
dne
edgy
dne
feisty
dne
gutsy
not-affected
hardy
dne
Common Weakness Enumeration
References