Gnu

Gcc

14 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.18%
  • Published 13.09.2023 09:15:15
  • Last modified 13.02.2025 17:17:14

**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This...

  • EPSS 0.43%
  • Published 01.09.2022 21:15:08
  • Last modified 21.11.2024 06:22:32

Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.

Exploit
  • EPSS 0.05%
  • Published 26.03.2022 13:15:07
  • Last modified 21.11.2024 06:56:31

libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.

Exploit
  • EPSS 0.26%
  • Published 14.01.2022 20:15:15
  • Last modified 21.11.2024 06:33:45

GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.

Exploit
  • EPSS 0.24%
  • Published 18.11.2021 22:15:07
  • Last modified 21.11.2024 06:14:57

GCC c++filt v2.26 was discovered to contain a use-after-free vulnerability via the component cplus-dem.c.

Exploit
  • EPSS 0.14%
  • Published 23.10.2019 18:15:11
  • Last modified 20.11.2024 23:43:41

Integer overflow in the new[] operator in gcc before 4.8.0 allows attackers to have unspecified impacts.

  • EPSS 0.49%
  • Published 02.09.2019 23:15:10
  • Last modified 21.11.2024 04:29:36

The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operati...

Exploit
  • EPSS 0.19%
  • Published 22.05.2019 19:29:00
  • Last modified 21.11.2024 03:46:02

stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack ...

  • EPSS 0.12%
  • Published 26.07.2017 21:29:00
  • Last modified 20.04.2025 01:37:25

Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDS...

  • EPSS 0.45%
  • Published 17.11.2015 15:59:04
  • Last modified 12.04.2025 10:46:40

The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspeci...