CVE-2023-53491
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/10/2025
Last modified:
23/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
start_kernel: Add __no_stack_protector function attribute<br />
<br />
Back during the discussion of<br />
commit a9a3ed1eff36 ("x86: Fix early boot crash on gcc-10, third try")<br />
we discussed the need for a function attribute to control the omission<br />
of stack protectors on a per-function basis; at the time Clang had<br />
support for no_stack_protector but GCC did not. This was fixed in<br />
gcc-11. Now that the function attribute is available, let&#39;s start using<br />
it.<br />
<br />
Callers of boot_init_stack_canary need to use this function attribute<br />
unless they&#39;re compiled with -fno-stack-protector, otherwise the canary<br />
stored in the stack slot of the caller will differ upon the call to<br />
boot_init_stack_canary. This will lead to a call to __stack_chk_fail()<br />
then panic.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.30 (including) | 6.4.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



