Rapid7 Vulnerability & Exploit Database

Amazon Linux AMI 2: CVE-2023-4039: Security patch for gcc, gcc10 (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Amazon Linux AMI 2: CVE-2023-4039: Security patch for gcc, gcc10 (Multiple Advisories)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
09/14/2023
Created
09/14/2023
Added
09/14/2023
Modified
02/21/2024

Description

**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.

Solution(s)

  • amazon-linux-ami-2-upgrade-cpp
  • amazon-linux-ami-2-upgrade-cpp10
  • amazon-linux-ami-2-upgrade-gcc
  • amazon-linux-ami-2-upgrade-gcc-base-debuginfo
  • amazon-linux-ami-2-upgrade-gcc-c
  • amazon-linux-ami-2-upgrade-gcc-debuginfo
  • amazon-linux-ami-2-upgrade-gcc-gdb-plugin
  • amazon-linux-ami-2-upgrade-gcc-gfortran
  • amazon-linux-ami-2-upgrade-gcc-gnat
  • amazon-linux-ami-2-upgrade-gcc-go
  • amazon-linux-ami-2-upgrade-gcc-objc
  • amazon-linux-ami-2-upgrade-gcc-plugin-devel
  • amazon-linux-ami-2-upgrade-gcc10
  • amazon-linux-ami-2-upgrade-gcc10-c
  • amazon-linux-ami-2-upgrade-gcc10-debuginfo
  • amazon-linux-ami-2-upgrade-gcc10-gdb-plugin
  • amazon-linux-ami-2-upgrade-gcc10-gfortran
  • amazon-linux-ami-2-upgrade-gcc10-plugin-devel
  • amazon-linux-ami-2-upgrade-libasan10
  • amazon-linux-ami-2-upgrade-libasan10-devel
  • amazon-linux-ami-2-upgrade-libatomic
  • amazon-linux-ami-2-upgrade-libatomic10-devel
  • amazon-linux-ami-2-upgrade-libcilkrts
  • amazon-linux-ami-2-upgrade-libgcc
  • amazon-linux-ami-2-upgrade-libgccjit
  • amazon-linux-ami-2-upgrade-libgccjit-devel
  • amazon-linux-ami-2-upgrade-libgfortran
  • amazon-linux-ami-2-upgrade-libgfortran10
  • amazon-linux-ami-2-upgrade-libgnat
  • amazon-linux-ami-2-upgrade-libgo
  • amazon-linux-ami-2-upgrade-libgomp
  • amazon-linux-ami-2-upgrade-libitm
  • amazon-linux-ami-2-upgrade-libitm10-devel
  • amazon-linux-ami-2-upgrade-libmpx
  • amazon-linux-ami-2-upgrade-libobjc
  • amazon-linux-ami-2-upgrade-libquadmath
  • amazon-linux-ami-2-upgrade-libquadmath10-devel
  • amazon-linux-ami-2-upgrade-libsanitizer
  • amazon-linux-ami-2-upgrade-libstdc
  • amazon-linux-ami-2-upgrade-libstdc-10-devel
  • amazon-linux-ami-2-upgrade-libstdc-10-docs
  • amazon-linux-ami-2-upgrade-libstdc-docs

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;