Количество 19
Количество 19

CVE-2023-4039
**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.

CVE-2023-4039
**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.

CVE-2023-4039
**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.

CVE-2023-4039
CVE-2023-4039
**DISPUTED**A failure in the -fstack-protector feature in GCC-based to ...

SUSE-SU-2023:4480-1
Security update for gcc13

SUSE-SU-2023:4458-1
Security update for gcc13

SUSE-SU-2023:4287-2
Security update for gcc13

SUSE-SU-2023:4287-1
Security update for gcc13

SUSE-SU-2023:4162-1
Security update for gcc13

SUSE-SU-2023:3686-1
Security update for gcc7

SUSE-SU-2023:3661-1
Security update for gcc12

SUSE-SU-2023:3640-1
Security update for gcc12
ELSA-2023-28766
ELSA-2023-28766: cross-gcc security update (LOW)
ELSA-2023-28765
ELSA-2023-28765: cross-gcc security update (LOW)

BDU:2023-05920
Уязвимость функции защиты стека набора компиляторов для различных языков программирования GNU Compiler Collection (GCC), позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

ROS-20240911-06
Уязвимость cross-gcc
ELSA-2023-12788
ELSA-2023-12788: gcc security update (LOW)

SUSE-SU-2023:3662-1
Security update for gcc7
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-4039 **DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself. | CVSS3: 4.8 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-4039 **DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself. | 0% Низкий | почти 2 года назад | |
![]() | CVE-2023-4039 **DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself. | CVSS3: 4.8 | 0% Низкий | почти 2 года назад |
![]() | CVSS3: 4.8 | 0% Низкий | почти 2 года назад | |
CVE-2023-4039 **DISPUTED**A failure in the -fstack-protector feature in GCC-based to ... | CVSS3: 4.8 | 0% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:4480-1 Security update for gcc13 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2023:4458-1 Security update for gcc13 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2023:4287-2 Security update for gcc13 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2023:4287-1 Security update for gcc13 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2023:4162-1 Security update for gcc13 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2023:3686-1 Security update for gcc7 | 0% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:3661-1 Security update for gcc12 | 0% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:3640-1 Security update for gcc12 | 0% Низкий | почти 2 года назад | |
ELSA-2023-28766 ELSA-2023-28766: cross-gcc security update (LOW) | почти 2 года назад | |||
ELSA-2023-28765 ELSA-2023-28765: cross-gcc security update (LOW) | почти 2 года назад | |||
![]() | BDU:2023-05920 Уязвимость функции защиты стека набора компиляторов для различных языков программирования GNU Compiler Collection (GCC), позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 4.8 | 0% Низкий | почти 2 года назад |
![]() | ROS-20240911-06 Уязвимость cross-gcc | CVSS3: 4.8 | 0% Низкий | 9 месяцев назад |
ELSA-2023-12788 ELSA-2023-12788: gcc security update (LOW) | почти 2 года назад | |||
![]() | SUSE-SU-2023:3662-1 Security update for gcc7 | почти 2 года назад |
Уязвимостей на страницу