CVE-2023-53491

Source
https://cve.org/CVERecord?id=CVE-2023-53491
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53491.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53491
Downstream
Related
Published
2025-10-01T11:45:43.101Z
Modified
2026-03-11T07:47:06.610564782Z
Summary
start_kernel: Add __no_stack_protector function attribute
Details

In the Linux kernel, the following vulnerability has been resolved:

start_kernel: Add __nostackprotector function attribute

Back during the discussion of commit a9a3ed1eff36 ("x86: Fix early boot crash on gcc-10, third try") we discussed the need for a function attribute to control the omission of stack protectors on a per-function basis; at the time Clang had support for nostackprotector but GCC did not. This was fixed in gcc-11. Now that the function attribute is available, let's start using it.

Callers of bootinitstackcanary need to use this function attribute unless they're compiled with -fno-stack-protector, otherwise the canary stored in the stack slot of the caller will differ upon the call to bootinitstackcanary. This will lead to a call to __stackchkfail() then panic.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53491.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
420594296838fdc9a674470d710cda7d1487f9f4
Fixed
25e73018b4093e0cfbcec5dc4a4bb86d0b69ed56
Fixed
514ca14ed5444b911de59ed3381dfd195d99fe4b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53491.json"