• CVE-2023-4039

发布时间: 2023年10月13日

修改时间: 2025年1月17日

概要

A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity.

CVSS v3 指标

NVD openEuler
Confidentiality Low Low
Attack Vector Network Network
CVSS评分 4.8 4.8
Attack Complexity High High
Privileges Required None None
Scope Unchanged Unchanged
Integrity Low Low
User Interaction None None
Availability None None

安全公告

公告名 概要 发布时间
KylinSec-SA-2023-2046 gcc security update 2023年10月13日
KylinSec-SA-2025-1249 gcc security update 2025年3月6日

影响产品

产品 状态
KY3.4-4A gcc Fixed
KY3.4-5A gcc Fixed
KY3.5.1 gcc Fixed
KY3.5.2 gcc Fixed
V6 gcc Fixed