CVE Vulnerabilities

CVE-2019-15847

Insufficient Entropy

Published: Sep 02, 2019 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Ubuntu
NEGLIGIBLE
root.io logo minimus.io logo echo.ai logo

The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.

Weakness

The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.

Affected Software

NameVendorStart VersionEnd Version
GccGnu*7.5.0 (excluding)
GccGnu8.0 (including)8.4.0 (excluding)
GccGnu9.0 (including)9.3.0 (excluding)
GccGnu10.0 (including)10.1.0 (excluding)
Red Hat Enterprise Linux 8RedHatgcc-0:8.3.1-5.el8*
Red Hat Enterprise Linux 8RedHatgcc-0:8.3.1-5.el8*
Red Hat Software Collections for Red Hat Enterprise Linux 6RedHatdevtoolset-8-gcc-0:8.3.1-3.2.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatdevtoolset-8-gcc-0:8.3.1-3.2.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatdevtoolset-9-gcc-0:9.3.1-2.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUSRedHatdevtoolset-8-gcc-0:8.3.1-3.2.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUSRedHatdevtoolset-8-gcc-0:8.3.1-3.2.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUSRedHatdevtoolset-9-gcc-0:9.3.1-2.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUSRedHatdevtoolset-8-gcc-0:8.3.1-3.2.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUSRedHatdevtoolset-9-gcc-0:9.3.1-2.el7*
Gcc-10Ubuntuesm-infra/focal*
Gcc-10Ubuntufocal*
Gcc-10Ubuntuupstream*
Gcc-4.8Ubuntutrusty*
Gcc-6Ubuntubionic*
Gcc-6Ubuntudisco*
Gcc-6-crossUbuntubionic*
Gcc-6-cross-portsUbuntubionic*
Gcc-7Ubuntubionic*
Gcc-7Ubuntudisco*
Gcc-7Ubuntueoan*
Gcc-7Ubuntuesm-infra/bionic*
Gcc-7Ubuntuupstream*
Gcc-7-crossUbuntubionic*
Gcc-7-crossUbuntudisco*
Gcc-7-cross-portsUbuntubionic*
Gcc-7-cross-portsUbuntudisco*
Gcc-8Ubuntubionic*
Gcc-8Ubuntudisco*
Gcc-8Ubuntuesm-infra/bionic*
Gcc-8Ubuntuupstream*
Gcc-8-crossUbuntubionic*
Gcc-8-crossUbuntudisco*
Gcc-8-crossUbuntueoan*
Gcc-8-crossUbuntufocal*
Gcc-8-crossUbuntugroovy*
Gcc-8-crossUbuntuhirsute*
Gcc-8-cross-portsUbuntubionic*
Gcc-8-cross-portsUbuntudisco*
Gcc-8-cross-portsUbuntueoan*
Gcc-8-cross-portsUbuntufocal*
Gcc-8-cross-portsUbuntugroovy*
Gcc-8-cross-portsUbuntuhirsute*
Gcc-9Ubuntudisco*
Gcc-9Ubuntuupstream*
Gcc-9-crossUbuntudisco*
Gcc-9-crossUbuntueoan*
Gcc-9-crossUbuntugroovy*
Gcc-9-crossUbuntuhirsute*
Gcc-9-crossUbuntuimpish*
Gcc-9-crossUbuntukinetic*
Gcc-9-crossUbuntulunar*
Gcc-9-crossUbuntumantic*
Gcc-9-cross-portsUbuntudisco*
Gcc-9-cross-portsUbuntueoan*
Gcc-9-cross-portsUbuntufocal*
Gcc-9-cross-portsUbuntugroovy*
Gcc-9-cross-portsUbuntuhirsute*
Gcc-9-cross-portsUbuntuimpish*
Gcc-9-cross-portsUbuntukinetic*
Gcc-9-cross-portsUbuntulunar*
Gcc-9-cross-portsUbuntumantic*
Gcc-defaultsUbuntubionic*
Gcc-defaultsUbuntudisco*
Gcc-defaultsUbuntueoan*
Gcc-defaultsUbuntugroovy*
Gcc-defaultsUbuntuhirsute*
Gcc-defaultsUbuntuimpish*
Gcc-defaultsUbuntukinetic*
Gcc-defaultsUbuntulunar*
Gcc-defaultsUbuntumantic*
Gcc-defaultsUbuntuprecise/esm*
Gcc-defaultsUbuntutrusty*
Gcc-defaultsUbuntuxenial*
Gcc-snapshotUbuntubionic*
Gcc-snapshotUbuntudisco*
Gcc-snapshotUbuntueoan*
Gcc-snapshotUbuntufocal*
Gcc-snapshotUbuntugroovy*
Gcc-snapshotUbuntuhirsute*
Gcc-snapshotUbuntuimpish*
Gcc-snapshotUbuntukinetic*
Gcc-snapshotUbuntulunar*
Gcc-snapshotUbuntumantic*
Gcc-snapshotUbuntuoracular*
Gcc-snapshotUbuntuplucky*
Gcc-snapshotUbuntuxenial*
Gccgo-6Ubuntuxenial*

Potential Mitigations

References