CVE-2023-53491

Source
https://cve.org/CVERecord?id=CVE-2023-53491
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53491.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53491
Downstream
Related
Published
2025-10-01T11:45:43.101Z
Modified
2026-05-15T11:53:19.289969057Z
Summary
start_kernel: Add __no_stack_protector function attribute
Details

In the Linux kernel, the following vulnerability has been resolved:

start_kernel: Add __nostackprotector function attribute

Back during the discussion of commit a9a3ed1eff36 ("x86: Fix early boot crash on gcc-10, third try") we discussed the need for a function attribute to control the omission of stack protectors on a per-function basis; at the time Clang had support for nostackprotector but GCC did not. This was fixed in gcc-11. Now that the function attribute is available, let's start using it.

Callers of bootinitstackcanary need to use this function attribute unless they're compiled with -fno-stack-protector, otherwise the canary stored in the stack slot of the caller will differ upon the call to bootinitstackcanary. This will lead to a call to __stackchkfail() then panic.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53491.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.30
Fixed
6.4.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53491.json"