CVE-2023-4039

ADVISORY - ubuntu

Summary

DISPUTEDA failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.

EPSS Score: 0.00121 (0.325)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Protection Mechanism Failure

ADVISORY - redhat

Ubuntu

CREATED

UPDATED

ADVISORY IDCVE-2023-4039
EXPLOITABILITY SCORE

2.2

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

4.8low
PackageTypeOS NameOS VersionAffected RangesFix Versions
ubuntu/gcc-12debubuntu22.04>=0Not yet available
ubuntu/gcc-10debubuntu24.04<10.5.0-4ubuntu210.5.0-4ubuntu2
ubuntu/gcc-10debubuntu23.10>=0Not yet available
ubuntu/gcc-10debubuntu23.04>=0Not yet available
ubuntu/gcc-10-crossdebubuntu23.10>=0Not yet available
ubuntu/gcc-10-crossdebubuntu23.04>=0Not yet available
ubuntu/gcc-10-crossdebubuntu24.04<23ubuntu223ubuntu2
ubuntu/gcc-10-cross-mipsendebubuntu23.04>=0Not yet available
ubuntu/gcc-10-cross-mipsendebubuntu23.10>=0Not yet available
ubuntu/gcc-10-cross-portsdebubuntu23.10>=0Not yet available
ubuntu/gcc-10-cross-portsdebubuntu23.04>=0Not yet available
ubuntu/gcc-11debubuntu24.10<11.4.0-4ubuntu111.4.0-4ubuntu1
ubuntu/gcc-11debubuntu25.04<11.4.0-4ubuntu111.4.0-4ubuntu1
ubuntu/gcc-11debubuntu23.10<11.4.0-4ubuntu111.4.0-4ubuntu1
ubuntu/gcc-11debubuntu22.04>=0Not yet available
ubuntu/gcc-11debubuntu23.04>=0Not yet available
ubuntu/gcc-11debubuntu24.04<11.4.0-4ubuntu111.4.0-4ubuntu1
ubuntu/gcc-11-crossdebubuntu23.10>=0Not yet available
ubuntu/gcc-11-crossdebubuntu23.04>=0Not yet available
ubuntu/gcc-11-crossdebubuntu24.04<21ubuntu221ubuntu2
ubuntu/gcc-11-crossdebubuntu24.10<21ubuntu221ubuntu2
ubuntu/gcc-11-crossdebubuntu25.04<21ubuntu221ubuntu2
ubuntu/gcc-11-crossdebubuntu22.04>=0Not yet available
ubuntu/gcc-11-cross-mipsendebubuntu23.04>=0Not yet available
ubuntu/gcc-11-cross-mipsendebubuntu23.10>=0Not yet available
ubuntu/gcc-11-cross-portsdebubuntu23.10>=0Not yet available
ubuntu/gcc-11-cross-portsdebubuntu23.04>=0Not yet available
ubuntu/gcc-12debubuntu23.10<12.3.0-9ubuntu112.3.0-9ubuntu1
ubuntu/gcc-12debubuntu24.04<12.3.0-9ubuntu112.3.0-9ubuntu1
ubuntu/gcc-12debubuntu25.04<12.3.0-9ubuntu112.3.0-9ubuntu1
ubuntu/gcc-12debubuntu24.10<12.3.0-9ubuntu112.3.0-9ubuntu1
ubuntu/gcc-12debubuntu23.04>=0Not yet available
ubuntu/gcc-12-crossdebubuntu23.10<18ubuntu218ubuntu2
ubuntu/gcc-12-crossdebubuntu25.04<19ubuntu219ubuntu2
ubuntu/gcc-12-crossdebubuntu23.04>=0Not yet available
ubuntu/gcc-12-crossdebubuntu22.04>=0Not yet available
ubuntu/gcc-12-crossdebubuntu24.04<19ubuntu219ubuntu2
ubuntu/gcc-12-crossdebubuntu24.10<19ubuntu219ubuntu2
ubuntu/gcc-12-cross-mipsendebubuntu23.04>=0Not yet available
ubuntu/gcc-12-cross-mipsendebubuntu23.10>=0Not yet available
ubuntu/gcc-12-cross-portsdebubuntu23.04>=0Not yet available
ubuntu/gcc-12-cross-portsdebubuntu23.10>=0Not yet available
ubuntu/gcc-13debubuntu23.10<13.2.0-4ubuntu113.2.0-4ubuntu1
ubuntu/gcc-13debubuntu24.04<13.2.0-4ubuntu113.2.0-4ubuntu1
ubuntu/gcc-13debubuntu23.04>=0Not yet available
ubuntu/gcc-13debubuntu24.10<13.2.0-4ubuntu113.2.0-4ubuntu1
ubuntu/gcc-13debubuntu25.04<13.2.0-4ubuntu113.2.0-4ubuntu1
ubuntu/gcc-13-crossdebubuntu23.10>=0Not yet available
ubuntu/gcc-13-crossdebubuntu23.04>=0Not yet available
ubuntu/gcc-13-cross-portsdebubuntu23.10<10ubuntu210ubuntu2
ubuntu/gcc-13-cross-portsdebubuntu24.10<14ubuntu414ubuntu4
ubuntu/gcc-13-cross-portsdebubuntu24.04<14ubuntu414ubuntu4
ubuntu/gcc-13-cross-portsdebubuntu25.04<14ubuntu414ubuntu4
ubuntu/gcc-13-cross-portsdebubuntu23.04>=0Not yet available
ubuntu/gcc-4.4debubuntu14.04>=0Not yet available
ubuntu/gcc-4.6debubuntu14.04>=0Not yet available
ubuntu/gcc-4.7debubuntu16.04>=0Not yet available
ubuntu/gcc-4.7debubuntu14.04>=0Not yet available
ubuntu/gcc-4.7-armel-crossdebubuntu14.04>=0Not yet available
ubuntu/gcc-4.7-armel-crossdebubuntu16.04>=0Not yet available
ubuntu/gcc-4.7-armhf-crossdebubuntu14.04>=0Not yet available
ubuntu/gcc-4.7-armhf-crossdebubuntu16.04>=0Not yet available
ubuntu/gcc-4.8debubuntu16.04>=0Not yet available
ubuntu/gcc-4.8debubuntu14.04>=0Not yet available
ubuntu/gcc-4.8debubuntu18.04>=0Not yet available
ubuntu/gcc-4.8-arm64-crossdebubuntu14.04>=0Not yet available
ubuntu/gcc-4.8-arm64-crossdebubuntu16.04>=0Not yet available
ubuntu/gcc-4.8-armhf-crossdebubuntu16.04>=0Not yet available
ubuntu/gcc-4.8-armhf-crossdebubuntu14.04>=0Not yet available
ubuntu/gcc-4.8-powerpc-crossdebubuntu14.04>=0Not yet available
ubuntu/gcc-4.8-powerpc-crossdebubuntu16.04>=0Not yet available
ubuntu/gcc-4.8-ppc64el-crossdebubuntu16.04>=0Not yet available
ubuntu/gcc-4.8-ppc64el-crossdebubuntu14.04>=0Not yet available
ubuntu/gcc-4.9debubuntu16.04>=0Not yet available
ubuntu/gcc-4.9-crossdebubuntu16.04>=0Not yet available
ubuntu/gcc-4.9-crossdebubuntu18.04>=0Not yet available
ubuntu/gcc-5debubuntu16.04>=0Not yet available
ubuntu/gcc-5debubuntu18.04>=0Not yet available
ubuntu/gcc-5-crossdebubuntu16.04>=0Not yet available
ubuntu/gcc-5-crossdebubuntu18.04>=0Not yet available
ubuntu/gcc-5-cross-portsdebubuntu16.04>=0Not yet available
ubuntu/gcc-5-cross-portsdebubuntu18.04>=0Not yet available
ubuntu/gcc-6debubuntu18.04>=0Not yet available
ubuntu/gcc-6-crossdebubuntu18.04>=0Not yet available
ubuntu/gcc-6-cross-portsdebubuntu18.04>=0Not yet available
ubuntu/gcc-7debubuntu18.04>=0Not yet available
ubuntu/gcc-7-crossdebubuntu18.04>=0Not yet available
ubuntu/gcc-7-cross-portsdebubuntu18.04>=0Not yet available
ubuntu/gcc-8debubuntu18.04>=0Not yet available
ubuntu/gcc-8-crossdebubuntu18.04>=0Not yet available
ubuntu/gcc-8-cross-portsdebubuntu18.04>=0Not yet available
ubuntu/gcc-9debubuntu23.10>=0Not yet available
ubuntu/gcc-9debubuntu23.04>=0Not yet available
ubuntu/gcc-9debubuntu24.04<9.5.0-6ubuntu29.5.0-6ubuntu2
ubuntu/gcc-9-crossdebubuntu23.04>=0Not yet available
ubuntu/gcc-9-crossdebubuntu24.04<29ubuntu229ubuntu2
ubuntu/gcc-9-crossdebubuntu23.10>=0Not yet available
ubuntu/gcc-9-cross-mipsendebubuntu23.04>=0Not yet available
ubuntu/gcc-9-cross-mipsendebubuntu23.10>=0Not yet available
ubuntu/gcc-9-cross-portsdebubuntu23.04>=0Not yet available
ubuntu/gcc-9-cross-portsdebubuntu23.10>=0Not yet available
ubuntu/gcc-arm-linux-androideabidebubuntu16.04>=0Not yet available
ubuntu/gcc-arm-linux-androideabidebubuntu14.04>=0Not yet available
ubuntu/gcc-arm-none-eabidebubuntu14.04>=0Not yet available
ubuntu/gcc-arm-none-eabidebubuntu23.04>=0Not yet available
ubuntu/gcc-arm-none-eabidebubuntu23.10>=0Not yet available
ubuntu/gcc-arm-none-eabidebubuntu18.04>=0Not yet available
ubuntu/gcc-arm-none-eabidebubuntu16.04>=0Not yet available
ubuntu/gcc-avrdebubuntu23.10>=0Not yet available
ubuntu/gcc-avrdebubuntu18.04>=0Not yet available
ubuntu/gcc-avrdebubuntu23.04>=0Not yet available
ubuntu/gcc-avrdebubuntu14.04>=0Not yet available
ubuntu/gcc-avrdebubuntu16.04>=0Not yet available
ubuntu/gcc-defaultsdebubuntu18.04>=0Not yet available
ubuntu/gcc-defaultsdebubuntu23.10>=0Not yet available
ubuntu/gcc-defaultsdebubuntu14.04>=0Not yet available
ubuntu/gcc-defaultsdebubuntu23.04>=0Not yet available
ubuntu/gcc-defaultsdebubuntu16.04>=0Not yet available
ubuntu/gcc-defaults-arm64-crossdebubuntu14.04>=0Not yet available
ubuntu/gcc-defaults-armel-crossdebubuntu14.04>=0Not yet available
ubuntu/gcc-defaults-armhf-crossdebubuntu14.04>=0Not yet available
ubuntu/gcc-defaults-powerpc-crossdebubuntu14.04>=0Not yet available
ubuntu/gcc-defaults-ppc64el-crossdebubuntu14.04>=0Not yet available
ubuntu/gcc-h8300-hmsdebubuntu23.04>=0Not yet available
ubuntu/gcc-h8300-hmsdebubuntu16.04>=0Not yet available
ubuntu/gcc-h8300-hmsdebubuntu18.04>=0Not yet available
ubuntu/gcc-h8300-hmsdebubuntu14.04>=0Not yet available
ubuntu/gcc-h8300-hmsdebubuntu23.10>=0Not yet available
ubuntu/gcc-i686-linux-androiddebubuntu14.04>=0Not yet available
ubuntu/gcc-i686-linux-androiddebubuntu16.04>=0Not yet available
ubuntu/gcc-m68hc1xdebubuntu18.04>=0Not yet available
ubuntu/gcc-m68hc1xdebubuntu16.04>=0Not yet available
ubuntu/gcc-m68hc1xdebubuntu14.04>=0Not yet available
ubuntu/gcc-mingw-w64debubuntu16.04>=0Not yet available
ubuntu/gcc-mingw-w64debubuntu18.04>=0Not yet available
ubuntu/gcc-mingw-w64debubuntu23.04>=0Not yet available
ubuntu/gcc-mingw-w64debubuntu23.10>=0Not yet available
ubuntu/gcc-mingw-w64debubuntu14.04>=0Not yet available
ubuntu/gcc-msp430debubuntu23.10>=0Not yet available
ubuntu/gcc-msp430debubuntu16.04>=0Not yet available
ubuntu/gcc-msp430debubuntu18.04>=0Not yet available
ubuntu/gcc-msp430debubuntu23.04>=0Not yet available
ubuntu/gcc-msp430debubuntu14.04>=0Not yet available
ubuntu/gcc-optdebubuntu18.04>=0Not yet available
ubuntu/gcc-optdebubuntu23.04>=0Not yet available
ubuntu/gcc-optdebubuntu16.04>=0Not yet available
ubuntu/gcc-optdebubuntu23.10>=0Not yet available
ubuntu/gcc-optdebubuntu14.04>=0Not yet available
ubuntu/gcc-or1k-elfdebubuntu23.04>=0Not yet available
ubuntu/gcc-or1k-elfdebubuntu18.04>=0Not yet available
ubuntu/gcc-or1k-elfdebubuntu16.04>=0Not yet available
ubuntu/gcc-or1k-elfdebubuntu14.04>=0Not yet available
ubuntu/gcc-or1k-elfdebubuntu23.10>=0Not yet available
ubuntu/gcc-riscv64-unknown-elfdebubuntu23.10>=0Not yet available
ubuntu/gcc-riscv64-unknown-elfdebubuntu18.04>=0Not yet available
ubuntu/gcc-riscv64-unknown-elfdebubuntu23.04>=0Not yet available
ubuntu/gcc-riscv64-unknown-elfdebubuntu16.04>=0Not yet available
ubuntu/gcc-riscv64-unknown-elfdebubuntu14.04>=0Not yet available
ubuntu/gcc-snapshotdebubuntu16.04>=0Not yet available
ubuntu/gcc-snapshotdebubuntu14.04>=0Not yet available
ubuntu/gcc-snapshotdebubuntu23.10>=0Not yet available
ubuntu/gcc-snapshotdebubuntu23.04>=0Not yet available
ubuntu/gcc-snapshotdebubuntu18.04>=0Not yet available
ubuntu/gcc-xtensa-lx106debubuntu23.04>=0Not yet available
ubuntu/gcc-xtensa-lx106debubuntu16.04>=0Not yet available
ubuntu/gcc-xtensa-lx106debubuntu14.04>=0Not yet available
ubuntu/gcc-xtensa-lx106debubuntu23.10>=0Not yet available
ubuntu/gcc-xtensa-lx106debubuntu18.04>=0Not yet available
ubuntu/gccgo-4.9debubuntu14.04>=0Not yet available
ubuntu/gccgo-6debubuntu16.04>=0Not yet available

CVSS:3 Severity and metrics

The CVSS metrics represent different qualitative aspects of a vulnerability that impact the overall score, as defined by the CVSS Specification.

The vulnerable component is bound to the network stack, but the attack is limited at the protocol level to a logically adjacent topology. This can mean an attack must be launched from the same shared physical (e.g., Bluetooth or IEEE 802.11) or logical (e.g., local IP subnet) network, or from within a secure or otherwise limited administrative domain (e.g., MPLS, secure VPN to an administrative network zone). One example of an Adjacent attack would be an ARP (IPv4) or neighbor discovery (IPv6) flood leading to a denial of service on the local LAN segment (e.g., CVE-2013-6014).

A successful attack depends on conditions beyond the attacker's control, requiring investing a measurable amount of effort in research, preparation, or execution against the vulnerable component before a successful attack.

The attacker is unauthorized prior to attack, and therefore does not require any access to settings or files of the vulnerable system to carry out an attack.

The vulnerable system can be exploited without interaction from any user.

An exploited vulnerability can only affect resources managed by the same security authority. In this case, the vulnerable component and the impacted component are either the same, or both are managed by the same security authority.

There is some loss of confidentiality. Access to some restricted information is obtained, but the attacker does not have control over what information is obtained, or the amount or kind of loss is limited. The information disclosure does not cause a direct, serious loss to the impacted component.

Modification of data is possible, but the attacker does not have control over the consequence of a modification, or the amount of modification is limited. The data modification does not have a direct, serious impact on the impacted component.

There is no impact to availability within the impacted component.

NIST

CREATED

UPDATED

ADVISORY IDCVE-2023-4039
EXPLOITABILITY SCORE

2.2

EXPLOITS FOUND
COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

4.8medium

Alpine

CREATED

UPDATED

ADVISORY IDCVE-2023-4039
EXPLOITABILITY SCORE

-

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
RATING UNAVAILABLE FROM ADVISORY

Debian

CREATED

UPDATED

ADVISORY IDCVE-2023-4039
EXPLOITABILITY SCORE

-

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

N/Alow

Amazon

CREATED

UPDATED

EXPLOITABILITY SCORE

-

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

N/Amedium

Amazon

CREATED

UPDATED

EXPLOITABILITY SCORE

-

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

N/Amedium

Amazon

CREATED

UPDATED

EXPLOITABILITY SCORE

-

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

N/Amedium

Red Hat

CREATED

UPDATED

ADVISORY IDCVE-2023-4039
EXPLOITABILITY SCORE

2.2

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

N/Aunspecified

Oracle

CREATED

UPDATED

EXPLOITABILITY SCORE

-

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

N/Alow

Oracle

CREATED

UPDATED

EXPLOITABILITY SCORE

-

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

N/Alow

Oracle

CREATED

UPDATED

EXPLOITABILITY SCORE

-

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

N/Alow

Chainguard

CREATED

UPDATED

ADVISORY ID

CGA-6285-g9qw-vhcr

EXPLOITABILITY SCORE

-

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
RATING UNAVAILABLE FROM ADVISORY

Chainguard

CREATED

UPDATED

ADVISORY ID

CGA-8mq5-mjh4-xwff

EXPLOITABILITY SCORE

-

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
RATING UNAVAILABLE FROM ADVISORY

Chainguard

CREATED

UPDATED

ADVISORY ID

CGA-h4h6-7wwr-mh65

EXPLOITABILITY SCORE

-

EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
RATING UNAVAILABLE FROM ADVISORY

intheWild

CREATED

UPDATED

ADVISORY IDCVE-2023-4039
EXPLOITABILITY SCORE

-

EXPLOITS FOUND

-

COMMON WEAKNESS ENUMERATION (CWE)-
RATING UNAVAILABLE FROM ADVISORY