Show filters
17 Total Results
Displaying 1-10 of 17
Sort by:
Attacker Value
Unknown

CVE-2023-4039

Disclosure Date: September 13, 2023 (last updated June 13, 2024)
** DISPUTED ** **DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.
Attacker Value
Unknown

CVE-2021-3826

Disclosure Date: September 01, 2022 (last updated January 23, 2024)
Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.
Attacker Value
Unknown

CVE-2022-27943

Disclosure Date: March 26, 2022 (last updated November 08, 2023)
libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.
Attacker Value
Unknown

CVE-2021-46195

Disclosure Date: January 14, 2022 (last updated February 23, 2025)
GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.
Attacker Value
Unknown

CVE-2021-37322

Disclosure Date: November 18, 2021 (last updated February 23, 2025)
GCC c++filt v2.26 was discovered to contain a use-after-free vulnerability via the component cplus-dem.c.
Attacker Value
Unknown

CVE-2002-2439

Disclosure Date: October 23, 2019 (last updated November 27, 2024)
Integer overflow in the new[] operator in gcc before 4.8.0 allows attackers to have unspecified impacts.
Attacker Value
Unknown

CVE-2019-15847

Disclosure Date: September 02, 2019 (last updated November 27, 2024)
The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.
Attacker Value
Unknown

CVE-2018-12886

Disclosure Date: May 22, 2019 (last updated November 27, 2024)
stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.
0
Attacker Value
Unknown

CVE-2017-11671

Disclosure Date: July 26, 2017 (last updated November 26, 2024)
Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation.
0
Attacker Value
Unknown

CVE-2015-5276

Disclosure Date: November 17, 2015 (last updated October 05, 2023)
The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.
0