vulnerability
Red Hat: CVE-2017-11671: Low: gcc security, bug fix, and enhancement update (RHSA-2018:0849)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:L/Au:N/C:P/I:N/A:N) | Jul 26, 2017 | Apr 11, 2018 | Mar 3, 2021 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
Jul 26, 2017
Added
Apr 11, 2018
Modified
Mar 3, 2021
Description
Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation.
Solution(s)
redhat-upgrade-cppredhat-upgrade-gccredhat-upgrade-gcc-base-debuginforedhat-upgrade-gcc-credhat-upgrade-gcc-debuginforedhat-upgrade-gcc-gfortranredhat-upgrade-gcc-gnatredhat-upgrade-gcc-goredhat-upgrade-gcc-objcredhat-upgrade-gcc-plugin-develredhat-upgrade-libasanredhat-upgrade-libasan-staticredhat-upgrade-libatomicredhat-upgrade-libatomic-staticredhat-upgrade-libgccredhat-upgrade-libgfortranredhat-upgrade-libgfortran-staticredhat-upgrade-libgnatredhat-upgrade-libgnat-develredhat-upgrade-libgnat-staticredhat-upgrade-libgoredhat-upgrade-libgo-develredhat-upgrade-libgo-staticredhat-upgrade-libgompredhat-upgrade-libitmredhat-upgrade-libitm-develredhat-upgrade-libitm-staticredhat-upgrade-libmudflapredhat-upgrade-libmudflap-develredhat-upgrade-libmudflap-staticredhat-upgrade-libobjcredhat-upgrade-libquadmathredhat-upgrade-libquadmath-develredhat-upgrade-libquadmath-staticredhat-upgrade-libstdcredhat-upgrade-libstdc-develredhat-upgrade-libstdc-docsredhat-upgrade-libstdc-staticredhat-upgrade-libtsanredhat-upgrade-libtsan-static

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.