CVE-2008-1367
Vulnerability from cvelistv5
Published
2008-03-17 23:00
Modified
2024-08-07 08:17
Severity ?
Summary
gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.
References
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058
cve@mitre.orghttp://gcc.gnu.org/ml/gcc-patches/2008-03/msg00417.html
cve@mitre.orghttp://gcc.gnu.org/ml/gcc-patches/2008-03/msg00428.html
cve@mitre.orghttp://gcc.gnu.org/ml/gcc-patches/2008-03/msg00432.html
cve@mitre.orghttp://gcc.gnu.org/ml/gcc-patches/2008-03/msg00499.html
cve@mitre.orghttp://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e40cd10ccff3d9fbffd57b93780bee4b7b9bff51
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
cve@mitre.orghttp://lists.vmware.com/pipermail/security-announce/2008/000023.html
cve@mitre.orghttp://lkml.org/lkml/2008/3/5/207Exploit
cve@mitre.orghttp://lwn.net/Articles/272048/#Comments
cve@mitre.orghttp://marc.info/?l=git-commits-head&m=120492000901739&w=2
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2008-0508.html
cve@mitre.orghttp://secunia.com/advisories/30110
cve@mitre.orghttp://secunia.com/advisories/30116
cve@mitre.orghttp://secunia.com/advisories/30818
cve@mitre.orghttp://secunia.com/advisories/30850
cve@mitre.orghttp://secunia.com/advisories/30890
cve@mitre.orghttp://secunia.com/advisories/30962
cve@mitre.orghttp://secunia.com/advisories/31246
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2008-0211.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2008-0233.html
cve@mitre.orghttp://www.securityfocus.com/bid/29084
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2222/references
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=437312
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41340
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11108
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058
af854a3a-2127-422b-91ae-364da2661108http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00417.html
af854a3a-2127-422b-91ae-364da2661108http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00428.html
af854a3a-2127-422b-91ae-364da2661108http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00432.html
af854a3a-2127-422b-91ae-364da2661108http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00499.html
af854a3a-2127-422b-91ae-364da2661108http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e40cd10ccff3d9fbffd57b93780bee4b7b9bff51
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://lists.vmware.com/pipermail/security-announce/2008/000023.html
af854a3a-2127-422b-91ae-364da2661108http://lkml.org/lkml/2008/3/5/207Exploit
af854a3a-2127-422b-91ae-364da2661108http://lwn.net/Articles/272048/#Comments
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=git-commits-head&m=120492000901739&w=2
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2008-0508.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30110
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30116
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30818
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30850
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30890
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30962
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31246
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0211.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0233.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/29084
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2222/references
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=437312
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41340
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11108
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:17:34.582Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "30962",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30962"
          },
          {
            "name": "[gcc-patches] 20080307 Re: [PATCH, i386]: Emit cld instruction when stringops are used",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00499.html"
          },
          {
            "name": "[gcc-patches] 20080306 Re: [PATCH, i386]: Emit cld instruction when stringops are used",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00428.html"
          },
          {
            "name": "[gcc-patches] 20080306 Re: [PATCH, i386]: Emit cld instruction when stringops are used",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00432.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058"
          },
          {
            "name": "[linux-kernel] 20080305 Linux doesn\u0027t follow x86/x86-64 ABI wrt direction flag",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lkml.org/lkml/2008/3/5/207"
          },
          {
            "name": "30850",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30850"
          },
          {
            "name": "30116",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30116"
          },
          {
            "name": "RHSA-2008:0233",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0233.html"
          },
          {
            "name": "30110",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30110"
          },
          {
            "name": "SUSE-SA:2008:031",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html"
          },
          {
            "name": "ADV-2008-2222",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2222/references"
          },
          {
            "name": "[git-commits-head] 20080307 x86: clear DF before calling signal handler",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=git-commits-head\u0026m=120492000901739\u0026w=2"
          },
          {
            "name": "29084",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/29084"
          },
          {
            "name": "gcc-cld-dos(41340)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41340"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=437312"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://lwn.net/Articles/272048/#Comments"
          },
          {
            "name": "RHSA-2008:0211",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2008-0211.html"
          },
          {
            "name": "oval:org.mitre.oval:def:11108",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11108"
          },
          {
            "name": "30890",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30890"
          },
          {
            "name": "RHSA-2008:0508",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2008-0508.html"
          },
          {
            "name": "[Security-announce] 20080728 VMSA-2008-00011 Updated ESX service console packages for Samba and vmnix",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.vmware.com/pipermail/security-announce/2008/000023.html"
          },
          {
            "name": "SUSE-SA:2008:030",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e40cd10ccff3d9fbffd57b93780bee4b7b9bff51"
          },
          {
            "name": "31246",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31246"
          },
          {
            "name": "[gcc-patches] 20080306 [PATCH, i386]: Emit cld instruction when stringops are used",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00417.html"
          },
          {
            "name": "30818",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30818"
          },
          {
            "name": "SUSE-SA:2008:032",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "30962",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30962"
        },
        {
          "name": "[gcc-patches] 20080307 Re: [PATCH, i386]: Emit cld instruction when stringops are used",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00499.html"
        },
        {
          "name": "[gcc-patches] 20080306 Re: [PATCH, i386]: Emit cld instruction when stringops are used",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00428.html"
        },
        {
          "name": "[gcc-patches] 20080306 Re: [PATCH, i386]: Emit cld instruction when stringops are used",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00432.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058"
        },
        {
          "name": "[linux-kernel] 20080305 Linux doesn\u0027t follow x86/x86-64 ABI wrt direction flag",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lkml.org/lkml/2008/3/5/207"
        },
        {
          "name": "30850",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30850"
        },
        {
          "name": "30116",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30116"
        },
        {
          "name": "RHSA-2008:0233",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0233.html"
        },
        {
          "name": "30110",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30110"
        },
        {
          "name": "SUSE-SA:2008:031",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html"
        },
        {
          "name": "ADV-2008-2222",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2222/references"
        },
        {
          "name": "[git-commits-head] 20080307 x86: clear DF before calling signal handler",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=git-commits-head\u0026m=120492000901739\u0026w=2"
        },
        {
          "name": "29084",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/29084"
        },
        {
          "name": "gcc-cld-dos(41340)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41340"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=437312"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://lwn.net/Articles/272048/#Comments"
        },
        {
          "name": "RHSA-2008:0211",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2008-0211.html"
        },
        {
          "name": "oval:org.mitre.oval:def:11108",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11108"
        },
        {
          "name": "30890",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30890"
        },
        {
          "name": "RHSA-2008:0508",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2008-0508.html"
        },
        {
          "name": "[Security-announce] 20080728 VMSA-2008-00011 Updated ESX service console packages for Samba and vmnix",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.vmware.com/pipermail/security-announce/2008/000023.html"
        },
        {
          "name": "SUSE-SA:2008:030",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e40cd10ccff3d9fbffd57b93780bee4b7b9bff51"
        },
        {
          "name": "31246",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31246"
        },
        {
          "name": "[gcc-patches] 20080306 [PATCH, i386]: Emit cld instruction when stringops are used",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00417.html"
        },
        {
          "name": "30818",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30818"
        },
        {
          "name": "SUSE-SA:2008:032",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1367",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "30962",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30962"
            },
            {
              "name": "[gcc-patches] 20080307 Re: [PATCH, i386]: Emit cld instruction when stringops are used",
              "refsource": "MLIST",
              "url": "http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00499.html"
            },
            {
              "name": "[gcc-patches] 20080306 Re: [PATCH, i386]: Emit cld instruction when stringops are used",
              "refsource": "MLIST",
              "url": "http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00428.html"
            },
            {
              "name": "[gcc-patches] 20080306 Re: [PATCH, i386]: Emit cld instruction when stringops are used",
              "refsource": "MLIST",
              "url": "http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00432.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058"
            },
            {
              "name": "[linux-kernel] 20080305 Linux doesn\u0027t follow x86/x86-64 ABI wrt direction flag",
              "refsource": "MLIST",
              "url": "http://lkml.org/lkml/2008/3/5/207"
            },
            {
              "name": "30850",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30850"
            },
            {
              "name": "30116",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30116"
            },
            {
              "name": "RHSA-2008:0233",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0233.html"
            },
            {
              "name": "30110",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30110"
            },
            {
              "name": "SUSE-SA:2008:031",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html"
            },
            {
              "name": "ADV-2008-2222",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2222/references"
            },
            {
              "name": "[git-commits-head] 20080307 x86: clear DF before calling signal handler",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=git-commits-head\u0026m=120492000901739\u0026w=2"
            },
            {
              "name": "29084",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/29084"
            },
            {
              "name": "gcc-cld-dos(41340)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41340"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=437312",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=437312"
            },
            {
              "name": "http://lwn.net/Articles/272048/#Comments",
              "refsource": "MISC",
              "url": "http://lwn.net/Articles/272048/#Comments"
            },
            {
              "name": "RHSA-2008:0211",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2008-0211.html"
            },
            {
              "name": "oval:org.mitre.oval:def:11108",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11108"
            },
            {
              "name": "30890",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30890"
            },
            {
              "name": "RHSA-2008:0508",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2008-0508.html"
            },
            {
              "name": "[Security-announce] 20080728 VMSA-2008-00011 Updated ESX service console packages for Samba and vmnix",
              "refsource": "MLIST",
              "url": "http://lists.vmware.com/pipermail/security-announce/2008/000023.html"
            },
            {
              "name": "SUSE-SA:2008:030",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html"
            },
            {
              "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e40cd10ccff3d9fbffd57b93780bee4b7b9bff51",
              "refsource": "CONFIRM",
              "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e40cd10ccff3d9fbffd57b93780bee4b7b9bff51"
            },
            {
              "name": "31246",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31246"
            },
            {
              "name": "[gcc-patches] 20080306 [PATCH, i386]: Emit cld instruction when stringops are used",
              "refsource": "MLIST",
              "url": "http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00417.html"
            },
            {
              "name": "30818",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30818"
            },
            {
              "name": "SUSE-SA:2008:032",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1367",
    "datePublished": "2008-03-17T23:00:00",
    "dateReserved": "2008-03-17T00:00:00",
    "dateUpdated": "2024-08-07T08:17:34.582Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2008-1367\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-03-17T23:44:00.000\",\"lastModified\":\"2024-11-21T00:44:22.930\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.\"},{\"lang\":\"es\",\"value\":\"gcc 4.3.x no genera una instrucci\u00f3n cld mientras compila funciones usadas por cadenas manipuladas como memcpy y memmove en x86 y i386, lo que puede prevenir que el indicador de direcci\u00f3n (DF) sea reseteado en violaci\u00f3n de las convenciones ABI y cause que datos sean copiados en la direcci\u00f3n equivocada durante el manejo de se\u00f1ales en el Kernel de Linux, lo que puede permitir a atacantes remotos dependiendo del contexto provocar corrupciones de memoria. NOTA: Originalmente reportada como consumo de CPU en SBCL\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":true,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gcc:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A7A129-A720-4C4A-AC31-6602897884FA\"}]}]}],\"references\":[{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00417.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00428.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00432.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00499.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e40cd10ccff3d9fbffd57b93780bee4b7b9bff51\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2008/000023.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lkml.org/lkml/2008/3/5/207\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://lwn.net/Articles/272048/#Comments\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=git-commits-head\u0026m=120492000901739\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2008-0508.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/30110\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/30116\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/30818\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/30850\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/30890\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/30962\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/31246\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0211.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0233.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/29084\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2222/references\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=437312\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/41340\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11108\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00417.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00428.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00432.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00499.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e40cd10ccff3d9fbffd57b93780bee4b7b9bff51\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2008/000023.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lkml.org/lkml/2008/3/5/207\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://lwn.net/Articles/272048/#Comments\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=git-commits-head\u0026m=120492000901739\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2008-0508.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30110\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30116\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30818\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30850\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30890\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30962\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31246\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0211.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0233.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/29084\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2222/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=437312\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/41340\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11108\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorComment\":\"Subscription required to access Link 1014774\"}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.