CVE-2017-11671

Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:gcc:4.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gcc:4.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gcc:4.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gcc:4.9:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gcc:5.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gcc:5.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gcc:5.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gcc:5.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gcc:5.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gcc:6.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gcc:6.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gcc:6.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gcc:6.3:*:*:*:*:*:*:*

History

21 Nov 2024, 03:08

Type Values Removed Values Added
References () http://openwall.com/lists/oss-security/2017/07/27/2 - Mailing List, Third Party Advisory () http://openwall.com/lists/oss-security/2017/07/27/2 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/100018 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/100018 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2018:0849 - () https://access.redhat.com/errata/RHSA-2018:0849 -
References () https://gcc.gnu.org/bugzilla/show_bug.cgi?id=80180 - Issue Tracking, Vendor Advisory () https://gcc.gnu.org/bugzilla/show_bug.cgi?id=80180 - Issue Tracking, Vendor Advisory
References () https://gcc.gnu.org/ml/gcc-patches/2017-03/msg01349.html - Mailing List () https://gcc.gnu.org/ml/gcc-patches/2017-03/msg01349.html - Mailing List

Information

Published : 2017-07-26 21:29

Updated : 2024-11-21 03:08


NVD link : CVE-2017-11671

Mitre link : CVE-2017-11671

CVE.ORG link : CVE-2017-11671


JSON object : View

Products Affected

gnu

  • gcc
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)