CVE-2017-11671

NameCVE-2017-11671
DescriptionUnder certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitylow (attack range: local)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gcc-4.8 (PTS)jessie4.8.4-1vulnerable
gcc-4.9 (PTS)jessie4.9.2-10+deb8u1vulnerable
jessie (security)4.9.2-10+deb8u2vulnerable
gcc-5 (PTS)sid5.5.0-12fixed
gcc-6 (PTS)stretch (security), stretch6.3.0-18+deb9u1fixed
buster6.5.0-1fixed
sid6.5.0-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gcc-4.6source(unstable)(unfixed)low
gcc-4.7source(unstable)(unfixed)low
gcc-4.8source(unstable)(unfixed)low
gcc-4.9source(unstable)(unfixed)low
gcc-5source(unstable)5.4.1-10low
gcc-6source(unstable)6.3.0-12low

Notes

[jessie] - gcc-4.9 <no-dsa> (Minor issue)
[jessie] - gcc-4.8 <no-dsa> (Minor issue)
[wheezy] - gcc-4.7 <no-dsa> (Minor issue)
[wheezy] - gcc-4.6 <no-dsa> (Minor issue)
http://openwall.com/lists/oss-security/2017/07/27/2
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=80180
https://gcc.gnu.org/ml/gcc-patches/2017-03/msg01349.html

Search for package or bug name: Reporting problems