Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-1367

Опубликовано: 17 мар. 2008
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.5

Описание

gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

4.3.0-3ubuntu1
edgy

DNE

feisty

DNE

gutsy

DNE

hardy

DNE

upstream

released

4.3.0-2

Показывать по

РелизСтатусПримечание
dapper

not-affected

2.3.6-0ubuntu20
devel

not-affected

2.7-9ubuntu2
edgy

not-affected

2.4-1ubuntu12
feisty

not-affected

2.5-0ubuntu14
gutsy

not-affected

2.6.1-1ubuntu9
hardy

not-affected

2.7-9ubuntu2
upstream

released

2.7-8

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

edgy

DNE

feisty

DNE

gutsy

DNE

hardy

not-affected

upstream

not-affected

2.6.24.4

Показывать по

РелизСтатусПримечание
dapper

not-affected

devel

DNE

edgy

DNE

feisty

DNE

gutsy

DNE

hardy

DNE

upstream

not-affected

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

edgy

not-affected

feisty

DNE

gutsy

DNE

hardy

DNE

upstream

not-affected

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

edgy

DNE

feisty

not-affected

gutsy

DNE

hardy

DNE

upstream

not-affected

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

edgy

DNE

feisty

DNE

gutsy

not-affected

hardy

DNE

upstream

not-affected

Показывать по

Ссылки на источники

EPSS

Процентиль: 87%
0.03396
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
больше 17 лет назад

gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.

nvd
больше 17 лет назад

gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.

debian
больше 17 лет назад

gcc 4.3.x does not generate a cld instruction while compiling function ...

github
около 3 лет назад

gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.

oracle-oval
около 17 лет назад

ELSA-2008-0233: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 87%
0.03396
Низкий

7.5 High

CVSS2