A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit buffer overflow in dynamically-sized local variables without detection
Reporter | Title | Published | Views | Family All 82 |
---|---|---|---|---|
OpenVAS | SUSE: Security Advisory (SUSE-SU-2023:3661-1) | 28 Feb 202400:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for gcc (EulerOS-SA-2024-1118) | 29 Jan 202400:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for gcc (EulerOS-SA-2024-1103) | 29 Jan 202400:00 | – | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2023:4287-1) | 1 Nov 202300:00 | – | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2023:3640-1) | 19 Sep 202300:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for gcc (EulerOS-SA-2024-1265) | 12 Mar 202400:00 | – | openvas |
OpenVAS | openSUSE: Security Advisory for gcc12 (SUSE-SU-2023:3661-1) | 4 Mar 202400:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for gcc (EulerOS-SA-2024-1007) | 5 Jan 202400:00 | – | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2023:4480-1) | 21 Nov 202300:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for gcc (EulerOS-SA-2023-3209) | 10 Nov 202300:00 | – | openvas |
[
{
"defaultStatus": "affected",
"product": "Arm GNU Toolchain",
"vendor": "Arm Ltd",
"versions": [
{
"status": "affected",
"version": "All versions where option -fstack-protector is used"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GCC",
"vendor": "GNU",
"versions": [
{
"status": "affected",
"version": "All versions of GCC that target AArch64 when option -fstack-protector is used"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo