vulnerability

CentOS Linux: CVE-2017-11671: Low: gcc security, bug fix, and enhancement update (CESA-2018:0849)

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
Jul 26, 2017
Added
Aug 28, 2019
Modified
May 25, 2023

Description

Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation.

Solutions

centos-upgrade-cppcentos-upgrade-gcccentos-upgrade-gcc-base-debuginfocentos-upgrade-gcc-ccentos-upgrade-gcc-debuginfocentos-upgrade-gcc-gfortrancentos-upgrade-gcc-gnatcentos-upgrade-gcc-gocentos-upgrade-gcc-objccentos-upgrade-gcc-plugin-develcentos-upgrade-libasancentos-upgrade-libasan-staticcentos-upgrade-libatomiccentos-upgrade-libatomic-staticcentos-upgrade-libgcccentos-upgrade-libgfortrancentos-upgrade-libgfortran-staticcentos-upgrade-libgnatcentos-upgrade-libgnat-develcentos-upgrade-libgnat-staticcentos-upgrade-libgocentos-upgrade-libgo-develcentos-upgrade-libgo-staticcentos-upgrade-libgompcentos-upgrade-libitmcentos-upgrade-libitm-develcentos-upgrade-libitm-staticcentos-upgrade-libmudflapcentos-upgrade-libmudflap-develcentos-upgrade-libmudflap-staticcentos-upgrade-libobjccentos-upgrade-libquadmathcentos-upgrade-libquadmath-develcentos-upgrade-libquadmath-staticcentos-upgrade-libstdccentos-upgrade-libstdc-develcentos-upgrade-libstdc-docscentos-upgrade-libstdc-staticcentos-upgrade-libtsancentos-upgrade-libtsan-static
Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.