First published: Wed Jul 26 2017(Updated: )
Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gcc | <5.5 | 5.5 |
redhat/gcc | <6.4 | 6.4 |
GNU Compiler Collection | =4.6 | |
GNU Compiler Collection | =4.7 | |
GNU Compiler Collection | =4.8 | |
GNU Compiler Collection | =4.9 | |
GNU Compiler Collection | =5.0 | |
GNU Compiler Collection | =5.1 | |
GNU Compiler Collection | =5.2 | |
GNU Compiler Collection | =5.3 | |
GNU Compiler Collection | =5.4 | |
GNU Compiler Collection | =6.0 | |
GNU Compiler Collection | =6.1 | |
GNU Compiler Collection | =6.2 | |
GNU Compiler Collection | =6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11671 is considered a high severity vulnerability due to its potential impact on the integrity of random number generation.
To fix CVE-2017-11671, update your GCC version to 5.5 or 6.4 or later.
CVE-2017-11671 affects GNU Compiler Collection (GCC) versions 4.6 through 6.3.
Yes, CVE-2017-11671 may lead to exploitation by allowing an attacker to predict values from random number generation.
CVE-2017-11671 is primarily considered a local vulnerability impacting applications running with GCC compilers.