跳转到帖子

Huawei EulerOS: CVE-2023-4039: gcc security update

recommended_posts

发布于
  • Members

Huawei EulerOS: CVE-2023-4039: gcc security update

Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
09/13/2023
Created
01/30/2024
Added
01/29/2024
Modified
01/28/2025

Description

**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.

Solution(s)

  • huawei-euleros-2_0_sp11-upgrade-libasan
  • huawei-euleros-2_0_sp11-upgrade-libatomic
  • huawei-euleros-2_0_sp11-upgrade-libgcc
  • huawei-euleros-2_0_sp11-upgrade-libgfortran
  • huawei-euleros-2_0_sp11-upgrade-libgomp
  • huawei-euleros-2_0_sp11-upgrade-libobjc
  • huawei-euleros-2_0_sp11-upgrade-libquadmath
  • huawei-euleros-2_0_sp11-upgrade-libstdc++

References

  • https://attackerkb.com/topics/cve-2023-4039
  • CVE - 2023-4039
  • EulerOS-SA-2024-1118
  • 查看数 703
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…