Show filters
17 Total Results
Displaying 1-10 of 17
Sort by:
Attacker Value
Unknown
CVE-2023-4039
Disclosure Date: September 13, 2023 (last updated June 13, 2024)
** DISPUTED **
**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains
that target AArch64 allows an attacker to exploit an existing buffer
overflow in dynamically-sized local variables in your application
without this being detected. This stack-protector failure only applies
to C99-style dynamically-sized local variables or those created using
alloca(). The stack-protector operates as intended for statically-sized
local variables.
The default behavior when the stack-protector
detects an overflow is to terminate your application, resulting in
controlled loss of availability. An attacker who can exploit a buffer
overflow without triggering the stack-protector might be able to change
program flow control to cause an uncontrolled loss of availability or to
go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.
0
Attacker Value
Unknown
CVE-2021-3826
Disclosure Date: September 01, 2022 (last updated January 23, 2024)
Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.
0
Attacker Value
Unknown
CVE-2022-27943
Disclosure Date: March 26, 2022 (last updated November 08, 2023)
libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.
0
Attacker Value
Unknown
CVE-2021-46195
Disclosure Date: January 14, 2022 (last updated February 23, 2025)
GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.
0
Attacker Value
Unknown
CVE-2021-37322
Disclosure Date: November 18, 2021 (last updated February 23, 2025)
GCC c++filt v2.26 was discovered to contain a use-after-free vulnerability via the component cplus-dem.c.
0
Attacker Value
Unknown
CVE-2002-2439
Disclosure Date: October 23, 2019 (last updated November 27, 2024)
Integer overflow in the new[] operator in gcc before 4.8.0 allows attackers to have unspecified impacts.
0
Attacker Value
Unknown
CVE-2019-15847
Disclosure Date: September 02, 2019 (last updated November 27, 2024)
The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.
0
Attacker Value
Unknown
CVE-2018-12886
Disclosure Date: May 22, 2019 (last updated November 27, 2024)
stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.
0
Attacker Value
Unknown
CVE-2017-11671
Disclosure Date: July 26, 2017 (last updated November 26, 2024)
Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation.
0
Attacker Value
Unknown
CVE-2015-5276
Disclosure Date: November 17, 2015 (last updated October 05, 2023)
The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.
0