Patches for gcc-9:

        $ git config --add remote.origin.fetch 
'+refs/vendors/ARM/heads/CVE-2023-4039/gcc-9:refs/remotes/origin/ARM_CVE-2023-4039_gcc-9'
        $ git fetch

        $ git log --oneline origin/ARM_CVE-2023-4039_gcc-9 | head -n11
        bf3eeaa0182a aarch64: Make stack smash canary protect saved registers
        f2684e63652b aarch64: Simplify probe of final frame allocation
        12517baf6c88 aarch64: Put LR save probe in first 16 bytes
        4dd8925d95d3 aarch64: Tweak stack clash boundary condition
        cfed3b87e935 Backport check-function-bodies support
        eb2271eb6bb6 aarch64: Tweak frame_size comment
        16016465ff28 aarch64: Rename hard_fp_offset to bytes_above_hard_fp
        4604c4cd0a6c aarch64: Rename locals_offset to bytes_above_locals
        347487fffa02 aarch64: Add bytes_below_hard_fp to frame info
        78ebdb7b12d5 aarch64: Explicitly handle frames with no saved registers
        7a15b5060a83 Update ChangeLog and version files for release

Gitweb:
        
https://gcc.gnu.org/git/?p=gcc.git;a=shortlog;h=bf3eeaa0182a92987570d9c787bd45079eebf528&hp=7a15b5060a83ea8282323d92043c6152e6a3e22d

Generated a single .patch file just like src:gcc-9's d/p/git-
updates.diff


        LANG=C git diff --no-renames --src-prefix=a/src/ --dst-prefix=b/src/ \
                78ebdb7b12d5e258b9811bab715734454268fd0c^ 
bf3eeaa0182a92987570d9c787bd45079eebf528 \
                | awk '/^diff .*\.texi/ {skip=1; next} /^diff / { skip=0 } 
skip==0' \
                | grep -v -E '^(diff|index)' \
                > cve-2023-4039.diff

For verification purposes, this patch can be cleanly reverted
from the gcc-9 package that introduced its changes in Noble:

        gcc-9 (9.5.0-6) unstable; urgency=medium

          * Address stack protector and stack clash protection weaknesses
            on AArch64. CVE-2023-4039.
            
        $ pull-lp-source gcc-9 noble 9.5.0-6ubuntu1
        $ cd gcc-9-9.5.0/
        $ debian/rules patch
        $ patch -R -p1 -F0 --dry-run < /tmp/gcc-9/cve-2023-4039.diff
        checking file src/gcc/config/aarch64/aarch64.c
        checking file src/gcc/config/aarch64/aarch64.h
        checking file 
src/gcc/testsuite/gcc.target/aarch64/stack-check-prologue-17.c
        checking file 
src/gcc/testsuite/gcc.target/aarch64/stack-check-prologue-18.c
        checking file src/gcc/testsuite/gcc.target/aarch64/stack-protector-8.c
        checking file src/gcc/testsuite/gcc.target/aarch64/stack-protector-9.c
        checking file src/gcc/testsuite/lib/scanasm.exp
        $ echo $?
        0
        
Changelog entry:

        'd/p/cve-2023-4039.diff: Address stack protector and stack clash
protection weaknesses on AArch64. CVE-2023-4039. (LP: #2054343) Taken
from the vendors/ARM/heads/CVE-2023-4039/gcc-9 branch.'

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2054343

Title:
  CVE-2023-4039: ARM64 GCC

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gcc-10/+bug/2054343/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to