{"id":"CVE-2023-4039","details":"**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains \nthat target AArch64 allows an attacker to exploit an existing buffer \noverflow in dynamically-sized local variables in your application \nwithout this being detected. This stack-protector failure only applies \nto C99-style dynamically-sized local variables or those created using \nalloca(). The stack-protector operates as intended for statically-sized \nlocal variables.\n\nThe default behavior when the stack-protector \ndetects an overflow is to terminate your application, resulting in \ncontrolled loss of availability. An attacker who can exploit a buffer \noverflow without triggering the stack-protector might be able to change \nprogram flow control to cause an uncontrolled loss of availability or to\n go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.","modified":"2026-03-13T22:01:17.569291Z","published":"2023-09-13T09:15:15.690Z","related":["CGA-wf76-m3xc-rjhq","GHSA-x7ch-h5rf-w2mf","SUSE-SU-2023:3640-1","SUSE-SU-2023:3661-1","SUSE-SU-2023:3662-1","SUSE-SU-2023:3686-1","SUSE-SU-2023:4162-1","SUSE-SU-2023:4458-1","SUSE-SU-2023:4480-1","SUSE-SU-2024:0045-1","openSUSE-SU-2024:13233-1","openSUSE-SU-2024:13234-1","openSUSE-SU-2024:13235-1"],"references":[{"type":"FIX","url":"https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64"},{"type":"FIX","url":"https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"2023-09-12"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-4039.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}]}