First published: Mon Sep 02 2019(Updated: )
The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU GCC | <7.5.0 | |
GNU GCC | >=8.0<8.4.0 | |
GNU GCC | >=9.0<9.3.0 | |
GNU GCC | >=10.0<10.1.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15847 is a vulnerability in the GNU Compiler Collection (GCC) that allows multiple calls of the __builtin_darn intrinsic to be optimized into a single call, reducing the entropy of the random number generator.
CVE-2019-15847 affects GNU GCC versions up to 10.1.0.
The severity of CVE-2019-15847 is high, with a severity value of 7.5.
To fix CVE-2019-15847, users should update their GNU GCC installations to version 10.1.0 or higher.
More information about CVE-2019-15847 can be found in the links provided: [Link 1](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html), [Link 2](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html), [Link 3](http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html).