Fixed
Created: May 23, 2019
Updated: Oct 14, 2019
Resolved Date: Oct 14, 2019
Found In Version: 10.18.44.1
Fix Version: 10.18.44.11
Severity: Standard
Applicable for: Wind River Linux LTS 18
Component/s: Toolchain
stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.
CREATE(Triage): {Link=https://nvd.nist.gov/vuln/detail/CVE-2018-12886 User=admin}