Lucene search

K

14 matches found

CVE
CVE
added 2023/09/13 9:15 a.m.489 views

CVE-2023-4039

DISPUTED A failure in the -fstack-protector feature in GCC-based toolchainsthat target AArch64 allows an attacker to exploit an existing bufferoverflow in dynamically-sized local variables in your applicationwithout this being detected. This stack-protector failure only appliesto C99-style dynamica...

4.8CVSS5.2AI score0.00149EPSS
CVE
CVE
added 2019/09/02 11:15 p.m.281 views

CVE-2019-15847

The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a singl...

7.5CVSS7.1AI score0.00494EPSS
CVE
CVE
added 2019/05/22 7:29 p.m.233 views

CVE-2018-12886

stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypa...

8.1CVSS8AI score0.00116EPSS
CVE
CVE
added 2022/03/26 1:15 p.m.200 views

CVE-2022-27943

libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.

5.5CVSS6AI score0.00044EPSS
CVE
CVE
added 2017/07/26 9:29 p.m.183 views

CVE-2017-11671

Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially...

4CVSS4.1AI score0.00115EPSS
CVE
CVE
added 2022/09/01 9:15 p.m.122 views

CVE-2021-3826

Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.

6.5CVSS6.3AI score0.00368EPSS
CVE
CVE
added 2022/01/14 8:15 p.m.102 views

CVE-2021-46195

GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.

5.5CVSS5.2AI score0.00198EPSS
CVE
CVE
added 2019/10/23 6:15 p.m.87 views

CVE-2002-2439

Integer overflow in the new[] operator in gcc before 4.8.0 allows attackers to have unspecified impacts.

7.8CVSS7.3AI score0.00181EPSS
CVE
CVE
added 2021/11/18 10:15 p.m.87 views

CVE-2021-37322

GCC c++filt v2.26 was discovered to contain a use-after-free vulnerability via the component cplus-dem.c.

7.8CVSS7.6AI score0.00159EPSS
CVE
CVE
added 2008/03/17 11:44 p.m.66 views

CVE-2008-1367

gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signa...

7.5CVSS6AI score0.03396EPSS
CVE
CVE
added 2015/11/17 3:59 p.m.63 views

CVE-2015-5276

The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.

5CVSS7.5AI score0.00448EPSS
CVE
CVE
added 2006/04/20 10:2 a.m.59 views

CVE-2006-1902

fold_binary in fold-const.c in GNU Compiler Collection (gcc) 4.1 improperly handles pointer overflow when folding a certain expr comparison to a corresponding offset comparison in cases other than EQ_EXPR and NE_EXPR, which might introduce buffer overflow vulnerabilities into applications that coul...

2.1CVSS7AI score0.00094EPSS
CVE
CVE
added 2005/04/21 4:0 a.m.48 views

CVE-2000-1219

The -ftrapv compiler option in gcc and g++ 3.3.3 and earlier does not handle all types of integer overflows, which may leave applications vulnerable to vulnerabilities related to overflows.

7.5CVSS6.7AI score0.00649EPSS
CVE
CVE
added 2008/04/06 11:44 p.m.40 views

CVE-2008-1685

gcc 4.2.0 through 4.3.0 in GNU Compiler Collection, when casts are not used, considers the sum of a pointer and an int to be greater than or equal to the pointer, which might lead to removal of length testing code that was intended as a protection mechanism against integer overflow and buffer overf...

6.8CVSS7.1AI score0.00487EPSS