An issue was found in a defense in depth feature of the GCC compiler on aarch64 platforms. The stack protector feature (-fstack-protector) did not detect or defend against overflows of dynamically-sized local variables. This update to the GCC compiler remedies code generation for this defense in depth feature, ensuring it is working as intended.
Customers building their own binaries with GCC are advised to update their compiler, and to ensure they are enabling the defense in depth options available to them, such as the stack protector.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 2 - Core | gcc | 2023-09-08 19:46 | ALAS2-2023-2245 |
Amazon Linux 2023 | gcc | 2023-09-08 19:46 | ALAS2023-2023-342 |
Amazon Linux 2 - Core | gcc10 | 2023-09-08 19:46 | ALAS2-2023-2244 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 4.8 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N |
NVD | CVSSv3 | 4.8 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N |