DEBIAN-CVE-2023-4039

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2023-4039
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-4039.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-4039
Upstream
Published
2023-09-13T09:15:15Z
Modified
2025-09-18T06:27:30.603756Z
Summary
[none]
Details

DISPUTEDA failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.

References

Affected packages

Debian:11

gcc-10

Package

Name
gcc-10
Purl
pkg:deb/debian/gcc-10?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "unimportant"
}

gcc-9

Package

Name
gcc-9
Purl
pkg:deb/debian/gcc-9?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12

gcc-11

Package

Name
gcc-11
Purl
pkg:deb/debian/gcc-11?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "unimportant"
}

gcc-12

Package

Name
gcc-12
Purl
pkg:deb/debian/gcc-12?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
12.2.0-14+deb12u1

Affected versions

12.*

12.2.0-14

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13

gcc-12

Package

Name
gcc-12
Purl
pkg:deb/debian/gcc-12?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
12.3.0-9

Ecosystem specific

{
    "urgency": "unimportant"
}

gcc-13

Package

Name
gcc-13
Purl
pkg:deb/debian/gcc-13?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
13.2.0-4

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:14

gcc-12

Package

Name
gcc-12
Purl
pkg:deb/debian/gcc-12?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
12.3.0-9

Ecosystem specific

{
    "urgency": "unimportant"
}

gcc-13

Package

Name
gcc-13
Purl
pkg:deb/debian/gcc-13?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
13.2.0-4

Ecosystem specific

{
    "urgency": "unimportant"
}