发布时间: 2023年10月13日
修改时间: 2025年1月17日
A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity.
NVD | openEuler | |
---|---|---|
Confidentiality | Low | Low |
Attack Vector | Network | Network |
CVSS评分 | 4.8 | 4.8 |
Attack Complexity | High | High |
Privileges Required | None | None |
Scope | Unchanged | Unchanged |
Integrity | Low | Low |
User Interaction | None | None |
Availability | None | None |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-2046 | gcc security update | 2023年10月13日 |
KylinSec-SA-2025-1249 | gcc security update | 2025年3月6日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | gcc | Fixed |
KY3.4-5A | gcc | Fixed |
KY3.5.1 | gcc | Fixed |
KY3.5.2 | gcc | Fixed |
V6 | gcc | Fixed |