CVE-2023-4039

Summary

CVECVE-2023-4039
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2023-09-13 09:15:00 UTC
Updated2023-09-14 20:01:00 UTC
DescriptionA failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity.

Risk And Classification

Problem Types: NVD-CWE-Other

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Gnu Gcc All All All All

References

ReferenceSourceLinkTags
GCC's -fstack-protector fails to guard dynamic stack allocations on ARM64 · Advisory · metaredteam/external-disclosures · GitHub MISC github.com
GCC Stack Protector Vulnerability AArch64 MISC developer.arm.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 505870 Alpine Linux Security Update for gcc
  • 673474 EulerOS Security Update for gcc (EulerOS-SA-2024-1103)
  • 673525 EulerOS Security Update for gcc (EulerOS-SA-2024-1265)
  • 673590 EulerOS Security Update for gcc (EulerOS-SA-2023-3328)
  • 673609 EulerOS Security Update for gcc (EulerOS-SA-2023-3296)
  • 673672 EulerOS Security Update for gcc (EulerOS-SA-2023-3174)
  • 673734 EulerOS Security Update for gcc (EulerOS-SA-2023-3209)
  • 673783 EulerOS Security Update for gcc (EulerOS-SA-2024-1118)
  • 754856 SUSE Enterprise Linux Security Update for gcc12 (SUSE-SU-2023:3640-1)
  • 754865 SUSE Enterprise Linux Security Update for gcc7 (SUSE-SU-2023:3686-1)
  • 755132 SUSE Enterprise Linux Security Update for gcc13 (SUSE-SU-2023:4162-1)
  • 755209 SUSE Enterprise Linux Security Update for gcc13 (SUSE-SU-2023:4287-1)
  • 755216 SUSE Enterprise Linux Security Update for gcc13 (SUSE-SU-2023:4287-2)
  • 755271 SUSE Enterprise Linux Security Update for gcc13 (SUSE-SU-2023:4458-1)
  • 755285 SUSE Enterprise Linux Security Update for gcc13 (SUSE-SU-2023:4480-1)
  • 755854 SUSE Enterprise Linux Security Update for gcc12 (SUSE-SU-2023:3661-1)
  • 755898 SUSE Enterprise Linux Security Update for gcc7 (SUSE-SU-2023:3662-1)
  • 907319 Common Base Linux Mariner (CBL-Mariner) Security Update for gcc (28769-1)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report