CVE-2023-4039
- EPSS 0.18%
- Published 13.09.2023 09:15:15
- Last modified 13.02.2025 17:17:14
**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This...
CVE-2021-3826
- EPSS 0.43%
- Published 01.09.2022 21:15:08
- Last modified 21.11.2024 06:22:32
Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.
CVE-2022-27943
- EPSS 0.05%
- Published 26.03.2022 13:15:07
- Last modified 21.11.2024 06:56:31
libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.
CVE-2021-46195
- EPSS 0.26%
- Published 14.01.2022 20:15:15
- Last modified 21.11.2024 06:33:45
GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.
CVE-2021-37322
- EPSS 0.24%
- Published 18.11.2021 22:15:07
- Last modified 21.11.2024 06:14:57
GCC c++filt v2.26 was discovered to contain a use-after-free vulnerability via the component cplus-dem.c.
CVE-2002-2439
- EPSS 0.14%
- Published 23.10.2019 18:15:11
- Last modified 20.11.2024 23:43:41
Integer overflow in the new[] operator in gcc before 4.8.0 allows attackers to have unspecified impacts.
CVE-2019-15847
- EPSS 0.49%
- Published 02.09.2019 23:15:10
- Last modified 21.11.2024 04:29:36
The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operati...
CVE-2018-12886
- EPSS 0.19%
- Published 22.05.2019 19:29:00
- Last modified 21.11.2024 03:46:02
stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack ...
- EPSS 0.12%
- Published 26.07.2017 21:29:00
- Last modified 20.04.2025 01:37:25
Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDS...
- EPSS 0.45%
- Published 17.11.2015 15:59:04
- Last modified 12.04.2025 10:46:40
The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspeci...