Upstream information

CVE-2008-1367 at MITRE

Description

gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.5
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entries: 369911 [RESOLVED / FIXED], 372038 [RESOLVED / DUPLICATE]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
Novell Linux Desktop 9 for x86
  • kernel-bigsmp >= 2.6.5-7.312
  • kernel-default >= 2.6.5-7.312
  • kernel-smp >= 2.6.5-7.312
  • kernel-source >= 2.6.5-7.312
  • kernel-syms >= 2.6.5-7.312
sles9-nld.x86
sles9-oes.x86
YOU Patch Nr: 12181
Open Enterprise Server
  • kernel-bigsmp >= 2.6.5-7.312
  • kernel-debug >= 2.6.5-7.312
  • kernel-default >= 2.6.5-7.312
  • kernel-smp >= 2.6.5-7.312
  • kernel-source >= 2.6.5-7.312
  • kernel-syms >= 2.6.5-7.312
  • kernel-um >= 2.6.5-7.312
  • kernel-xen >= 2.6.5-7.312
  • kernel-xenpae >= 2.6.5-7.312
  • um-host-install-initrd >= 1.0-48.27
  • um-host-kernel >= 2.6.5-7.312
sles9-nld.x86
sles9-oes.x86
YOU Patch Nr: 12181
Novell Linux Desktop 9 for x86_64
  • kernel-default >= 2.6.5-7.312
  • kernel-smp >= 2.6.5-7.312
  • kernel-source >= 2.6.5-7.312
  • kernel-syms >= 2.6.5-7.312
sles9-nld.x86-64
YOU Patch Nr: 12183