Vulnerability Description
The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Gcc | < 7.5.0 |
| Opensuse | Leap | 15.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.htmlMailing ListThird Party Advisory
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481Issue TrackingVendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.htmlMailing ListThird Party Advisory
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481Issue TrackingVendor Advisory
FAQ
What is CVE-2019-15847?
CVE-2019-15847 is a vulnerability with a CVSS score of 7.5 (HIGH). The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number g...
How severe is CVE-2019-15847?
CVE-2019-15847 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-15847?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Gcc, Opensuse Leap.