Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2008-1367

Publication date 17 March 2008

Last updated 24 July 2024


Ubuntu priority

gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.

Read the notes from the security team

Status

Package Ubuntu Release Status
gcc-4.3 8.04 LTS hardy Not in release
7.10 gutsy Not in release
7.04 feisty Not in release
6.10 edgy Not in release
6.06 LTS dapper Not in release
glibc 8.04 LTS hardy
Not affected
7.10 gutsy
Not affected
7.04 feisty
Not affected
6.10 edgy
Not affected
6.06 LTS dapper
Not affected
linux 8.04 LTS hardy
Not affected
7.10 gutsy Not in release
7.04 feisty Not in release
6.10 edgy Not in release
6.06 LTS dapper Not in release
linux-source-2.6.15 8.04 LTS hardy Not in release
7.10 gutsy Not in release
7.04 feisty Not in release
6.10 edgy Not in release
6.06 LTS dapper
Not affected
linux-source-2.6.17 8.04 LTS hardy Not in release
7.10 gutsy Not in release
7.04 feisty Not in release
6.10 edgy
Not affected
6.06 LTS dapper Not in release
linux-source-2.6.20 8.04 LTS hardy Not in release
7.10 gutsy Not in release
7.04 feisty
Not affected
6.10 edgy Not in release
6.06 LTS dapper Not in release
linux-source-2.6.22 8.04 LTS hardy Not in release
7.10 gutsy
Not affected
7.04 feisty Not in release
6.10 edgy Not in release
6.06 LTS dapper Not in release

Notes


jdstrand

glibc part should be glibc 2.7-7 only use a low priority, since gcc-4.3 seems to be what is triggering it

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22