跳转到帖子

Amazon Linux AMI 2: CVE-2023-4039: Security patch for gcc, gcc10 (Multiple Advisories)

recommended_posts

发布于
  • Members

Amazon Linux AMI 2: CVE-2023-4039: Security patch for gcc, gcc10 (Multiple Advisories)

Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
09/14/2023
Created
09/14/2023
Added
09/14/2023
Modified
01/28/2025

Description

**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.

Solution(s)

  • amazon-linux-ami-2-upgrade-cpp
  • amazon-linux-ami-2-upgrade-cpp10
  • amazon-linux-ami-2-upgrade-gcc
  • amazon-linux-ami-2-upgrade-gcc-base-debuginfo
  • amazon-linux-ami-2-upgrade-gcc-c
  • amazon-linux-ami-2-upgrade-gcc-debuginfo
  • amazon-linux-ami-2-upgrade-gcc-gdb-plugin
  • amazon-linux-ami-2-upgrade-gcc-gfortran
  • amazon-linux-ami-2-upgrade-gcc-gnat
  • amazon-linux-ami-2-upgrade-gcc-go
  • amazon-linux-ami-2-upgrade-gcc-objc
  • amazon-linux-ami-2-upgrade-gcc-plugin-devel
  • amazon-linux-ami-2-upgrade-gcc10
  • amazon-linux-ami-2-upgrade-gcc10-c
  • amazon-linux-ami-2-upgrade-gcc10-debuginfo
  • amazon-linux-ami-2-upgrade-gcc10-gdb-plugin
  • amazon-linux-ami-2-upgrade-gcc10-gfortran
  • amazon-linux-ami-2-upgrade-gcc10-plugin-devel
  • amazon-linux-ami-2-upgrade-libasan10
  • amazon-linux-ami-2-upgrade-libasan10-devel
  • amazon-linux-ami-2-upgrade-libatomic
  • amazon-linux-ami-2-upgrade-libatomic10-devel
  • amazon-linux-ami-2-upgrade-libcilkrts
  • amazon-linux-ami-2-upgrade-libgcc
  • amazon-linux-ami-2-upgrade-libgccjit
  • amazon-linux-ami-2-upgrade-libgccjit-devel
  • amazon-linux-ami-2-upgrade-libgfortran
  • amazon-linux-ami-2-upgrade-libgfortran10
  • amazon-linux-ami-2-upgrade-libgnat
  • amazon-linux-ami-2-upgrade-libgo
  • amazon-linux-ami-2-upgrade-libgomp
  • amazon-linux-ami-2-upgrade-libitm
  • amazon-linux-ami-2-upgrade-libitm10-devel
  • amazon-linux-ami-2-upgrade-libmpx
  • amazon-linux-ami-2-upgrade-libobjc
  • amazon-linux-ami-2-upgrade-libquadmath
  • amazon-linux-ami-2-upgrade-libquadmath10-devel
  • amazon-linux-ami-2-upgrade-libsanitizer
  • amazon-linux-ami-2-upgrade-libstdc
  • amazon-linux-ami-2-upgrade-libstdc-10-devel
  • amazon-linux-ami-2-upgrade-libstdc-10-docs
  • amazon-linux-ami-2-upgrade-libstdc-docs

References

  • https://attackerkb.com/topics/cve-2023-4039
  • AL2/ALAS-2023-2244
  • AL2/ALAS-2023-2245
  • CVE - 2023-4039
  • 查看数 712
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…