Wind River Support Network

HomeDefectsLIN1018-4138
Fixed

LIN1018-4138 : Security Advisory - gcc - CVE-2018-12886

Created: May 23, 2019    Updated: Oct 14, 2019
Resolved Date: Oct 14, 2019
Found In Version: 10.18.44.1
Fix Version: 10.18.44.11
Severity: Standard
Applicable for: Wind River Linux LTS 18
Component/s: Toolchain

Description

stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.

CREATE(Triage): {Link=https://nvd.nist.gov/vuln/detail/CVE-2018-12886 User=admin}

CVEs


Live chat
Online