vulnerability

Red Hat: CVE-2017-11671: Low: gcc security, bug fix, and enhancement update (RHSA-2018:0849)

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
Jul 26, 2017
Added
Apr 11, 2018
Modified
Mar 3, 2021

Description

Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation.

Solution(s)

redhat-upgrade-cppredhat-upgrade-gccredhat-upgrade-gcc-base-debuginforedhat-upgrade-gcc-credhat-upgrade-gcc-debuginforedhat-upgrade-gcc-gfortranredhat-upgrade-gcc-gnatredhat-upgrade-gcc-goredhat-upgrade-gcc-objcredhat-upgrade-gcc-plugin-develredhat-upgrade-libasanredhat-upgrade-libasan-staticredhat-upgrade-libatomicredhat-upgrade-libatomic-staticredhat-upgrade-libgccredhat-upgrade-libgfortranredhat-upgrade-libgfortran-staticredhat-upgrade-libgnatredhat-upgrade-libgnat-develredhat-upgrade-libgnat-staticredhat-upgrade-libgoredhat-upgrade-libgo-develredhat-upgrade-libgo-staticredhat-upgrade-libgompredhat-upgrade-libitmredhat-upgrade-libitm-develredhat-upgrade-libitm-staticredhat-upgrade-libmudflapredhat-upgrade-libmudflap-develredhat-upgrade-libmudflap-staticredhat-upgrade-libobjcredhat-upgrade-libquadmathredhat-upgrade-libquadmath-develredhat-upgrade-libquadmath-staticredhat-upgrade-libstdcredhat-upgrade-libstdc-develredhat-upgrade-libstdc-docsredhat-upgrade-libstdc-staticredhat-upgrade-libtsanredhat-upgrade-libtsan-static
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.