CVE-2019-15847

The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:gcc:*:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gcc:*:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gcc:*:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gcc:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

History

21 Nov 2024, 04:29

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html - Mailing List, Third Party Advisory
References () https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481 - Issue Tracking, Vendor Advisory () https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481 - Issue Tracking, Vendor Advisory

Information

Published : 2019-09-02 23:15

Updated : 2024-11-21 04:29


NVD link : CVE-2019-15847

Mitre link : CVE-2019-15847

CVE.ORG link : CVE-2019-15847


JSON object : View

Products Affected

gnu

  • gcc

opensuse

  • leap
CWE
CWE-331

Insufficient Entropy