First published: Wed May 22 2019(Updated: )
stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU GCC | >=4.1<=8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12886 is a vulnerability in the GNU Compiler Collection (GCC) that affects versions 4.1 through 8.
The severity of CVE-2018-12886 is high with a CVSS score of 8.1.
CVE-2018-12886 generates instruction sequences that spill the address of the stack protector guard on ARM targets, allowing an attacker to bypass protection.
GNU GCC versions 4.1 through 8 are affected by CVE-2018-12886.
Upgrade to a version of GNU GCC that is not affected by CVE-2018-12886 or apply any available patches provided by the vendor.