ID CVE-2017-11671
Summary Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation.
References
Vulnerable Configurations
  • GNU GCC 4.6
    cpe:2.3:a:gnu:gcc:4.6
  • GNU GCC 4.7
    cpe:2.3:a:gnu:gcc:4.7
  • GNU GCC 4.8
    cpe:2.3:a:gnu:gcc:4.8
  • GNU GCC 4.9
    cpe:2.3:a:gnu:gcc:4.9
  • GNU GCC 5.0
    cpe:2.3:a:gnu:gcc:5.0
  • GNU GCC 5.1
    cpe:2.3:a:gnu:gcc:5.1
  • GNU GCC 5.2
    cpe:2.3:a:gnu:gcc:5.2
  • GNU GCC 5.3
    cpe:2.3:a:gnu:gcc:5.3
  • GNU GCC 5.4
    cpe:2.3:a:gnu:gcc:5.4
  • GNU GCC 6.0
    cpe:2.3:a:gnu:gcc:6.0
  • GNU GCC 6.1
    cpe:2.3:a:gnu:gcc:6.1
  • GNU GCC 6.2
    cpe:2.3:a:gnu:gcc:6.2
  • GNU GCC 6.3
    cpe:2.3:a:gnu:gcc:6.3
CVSS
Base: 2.1
Impact:
Exploitability:
CWE CWE-338
CAPEC
nessus via4
  • NASL family PhotonOS Local Security Checks
    NASL id PHOTONOS_PHSA-2018-1_0-0150_GCC.NASL
    description An update of the gcc package has been released.
    last seen 2019-02-08
    modified 2019-02-07
    plugin id 121849
    published 2019-02-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121849
    title Photon OS 1.0: Gcc PHSA-2018-1.0-0150
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2018-1116.NASL
    description According to the versions of the gcc packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - The gcc package contains the GNU Compiler Collection version 4.8.You'll need this package in order to compile C code. - Security fix(es): - Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation.(CVE-2017-11671) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-13
    plugin id 109514
    published 2018-05-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=109514
    title EulerOS 2.0 SP2 : gcc (EulerOS-SA-2018-1116)
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2018-1331.NASL
    description According to the versions of the gcc packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities : - The gcc package contains the GNU Compiler Collection version 4.8.You'll need this package in order to compile C code. - Security fix(es): - Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation.(CVE-2017-11671) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-13
    plugin id 118419
    published 2018-10-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118419
    title EulerOS Virtualization 2.5.0 : gcc (EulerOS-SA-2018-1331)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2017-2526-1.NASL
    description This update for gcc48 fixes the following issues: Security issues fixed : - A new option -fstack-clash-protection is now offered, which mitigates the stack clash type of attacks. [bnc#1039513] Future maintenance releases of packages will be built with this option. - CVE-2017-11671: Fixed rdrand/rdseed code generation issue [bsc#1050947] Bugs fixed : - Enable LFS support in 32bit libgcov.a. [bsc#1044016] - Bump libffi version in libffi.pc to 3.0.11. - Fix libffi issue for armv7l. [bsc#988274] - Properly diagnose missing -fsanitize=address support on ppc64le. [bnc#1028744] - Backport patch for PR65612. [bnc#1022062] - Fixed DR#1288. [bnc#1011348] Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-30
    plugin id 103355
    published 2017-09-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=103355
    title SUSE SLED12 / SLES12 Security Update : gcc48 (SUSE-SU-2017:2526-1)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2018-0849.NASL
    description An update for gcc is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link (s) in the References section. The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Security Fix(es) : * gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics (CVE-2017-11671) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.5 Release Notes linked from the References section.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 109374
    published 2018-04-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=109374
    title CentOS 7 : gcc (CESA-2018:0849)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2018-0849.NASL
    description From Red Hat Security Advisory 2018:0849 : An update for gcc is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link (s) in the References section. The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Security Fix(es) : * gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics (CVE-2017-11671) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.5 Release Notes linked from the References section.
    last seen 2019-02-21
    modified 2018-04-18
    plugin id 109108
    published 2018-04-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=109108
    title Oracle Linux 7 : gcc (ELSA-2018-0849)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2017-32A4A94C72.NASL
    description Fixes CVE-2017-11671. Fixed bugs (http://gcc.gnu.org/PRNNNNN): 31468, 43434, 45053, 49244, 50345, 53915, 56469, 60818, 60992, 61636, 61729, 62045, 64238, 65542, 65705, 65972, 66295, 66669, 67353, 67440, 68163, 68491, 68972, 69264, 69699, 69804, 69823, 69953, 70601, 70844, 70878, 71294, 71310, 71444, 71458, 71510, 71778, 71838, 72775, 73650, 75964, 76731, 77333, 77563, 77728, 77850, 78002, 78049, 78236, 78282, 78331, 78339, 78474, 78532, 78543, 78644, 78783, 78992, 79027, 79050, 79141, 79155, 79255, 79256, 79261, 79264, 79396, 79434, 79439, 79453, 79461, 79494, 79508, 79511, 79512, 79514, 79519, 79536, 79537, 79544, 79545, 79548, 79552, 79558, 79559, 79562, 79566, 79568, 79570, 79572, 79574, 79576, 79577, 79579, 79580, 79587, 79607, 79631, 79639, 79640, 79641, 79664, 79666, 79676, 79681, 79687, 79729, 79732, 79733, 79749, 79752, 79753, 79756, 79760, 79761, 79769, 79770, 79789, 79796, 79803, 79807, 79831, 79849, 79850, 79883, 79892, 79894, 79896, 79900, 79901, 79903, 79906, 79931, 79932, 79940, 79944, 79945, 79947, 79951, 79962, 79971, 79977, 79980, 79984, 80004, 80019, 80025, 80034, 80037, 80041, 80043, 80067, 80075, 80081, 80082, 80090, 80091, 80092, 80094, 80097, 80101, 80103, 80104, 80112, 80113, 80117, 80122, 80123, 80129, 80137, 80141, 80150, 80166, 80167, 80168, 80170, 80171, 80176, 80179, 80180, 80181, 80205, 80212, 80218, 80222, 80224, 80241, 80244, 80246, 80262, 80267, 80275, 80281, 80286, 80294, 80297, 80298, 80315, 80316, 80321, 80334, 80341, 80348, 80349, 80350, 80361, 80362, 80363, 80376, 80382, 80385, 80392, 80394, 80413, 80426, 80429, 80448, 80453, 80462, 80474, 80492, 80493, 80501, 80504, 80510, 80539, 80569, 80589, 80618, 80663, 80678, 80692, 80718, 80752, 80799, 80809, 80822, 80853, 80902, 80904, 80909, 80918, 80921, 80929, 80966, 80968, 80973, 80984, 81002, 81006, 81011, 81130, 81154, 81162, 81192, 81300, 81305, 81375, 81407, 81471, 81487, 81555, 81556 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-02-01
    plugin id 102099
    published 2017-08-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=102099
    title Fedora 25 : gcc / gcc-python-plugin / libtool (2017-32a4a94c72)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2017-1223.NASL
    description This update for gcc48 fixes the following issues : Security issues fixed : - A new option -fstack-clash-protection is now offered, which mitigates the stack clash type of attacks. [bnc#1039513] Future maintenance releases of packages will be built with this option. - CVE-2017-11671: Fixed rdrand/rdseed code generation issue [bsc#1050947] Bugs fixed : - Enable LFS support in 32bit libgcov.a. [bsc#1044016] - Bump libffi version in libffi.pc to 3.0.11. - Fix libffi issue for armv7l. [bsc#988274] - Properly diagnose missing -fsanitize=address support on ppc64le. [bnc#1028744] - Backport patch for PR65612. [bnc#1022062] - Fixed DR#1288. [bnc#1011348] This update was imported from the SUSE:SLE-12:Update update project.
    last seen 2019-02-21
    modified 2018-01-26
    plugin id 104245
    published 2017-10-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=104245
    title openSUSE Security Update : gcc48 (openSUSE-2017-1223)
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2018-1174.NASL
    description According to the versions of the gcc packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - The gcc package contains the GNU Compiler Collection version 4.8.You'll need this package in order to compile C code. - Security fix(es): - Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation.(CVE-2017-11671) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-13
    plugin id 110826
    published 2018-07-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=110826
    title EulerOS 2.0 SP3 : gcc (EulerOS-SA-2018-1174)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2018-0849.NASL
    description An update for gcc is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link (s) in the References section. The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Security Fix(es) : * gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics (CVE-2017-11671) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.5 Release Notes linked from the References section.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 108988
    published 2018-04-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108988
    title RHEL 7 : gcc (RHSA-2018:0849)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20180410_GCC_ON_SL7_X.NASL
    description Security Fix(es) : - gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics (CVE-2017-11671) Additional Changes :
    last seen 2019-02-21
    modified 2018-12-27
    plugin id 109446
    published 2018-05-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=109446
    title Scientific Linux Security Update : gcc on SL7.x x86_64
  • NASL family PhotonOS Local Security Checks
    NASL id PHOTONOS_PHSA-2018-1_0-0150.NASL
    description An update of {'gcc', 'nghttp2'} packages of Photon OS has been released.
    last seen 2019-02-21
    modified 2019-02-07
    plugin id 111276
    published 2018-07-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111276
    title Photon OS 1.0 : gcc / nghttp2 (PhotonOS-PHSA-2018-1.0-0150 (deprecated)
redhat via4
advisories
bugzilla
id 1529981
title gcc: incorrect CFI information on i386 with -fstack-clash-protection
oval
AND
  • OR
    • comment Red Hat Enterprise Linux 7 Client is installed
      oval oval:com.redhat.rhba:tst:20150364001
    • comment Red Hat Enterprise Linux 7 Server is installed
      oval oval:com.redhat.rhba:tst:20150364002
    • comment Red Hat Enterprise Linux 7 Workstation is installed
      oval oval:com.redhat.rhba:tst:20150364003
    • comment Red Hat Enterprise Linux 7 ComputeNode is installed
      oval oval:com.redhat.rhba:tst:20150364004
  • OR
    • AND
      • comment cpp is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849033
      • comment cpp is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849034
    • AND
      • comment gcc is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849031
      • comment gcc is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849032
    • AND
      • comment gcc-c++ is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849051
      • comment gcc-c++ is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849052
    • AND
      • comment gcc-gfortran is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849037
      • comment gcc-gfortran is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849038
    • AND
      • comment gcc-gnat is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849073
      • comment gcc-gnat is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849074
    • AND
      • comment gcc-go is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849035
      • comment gcc-go is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849036
    • AND
      • comment gcc-objc is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849023
      • comment gcc-objc is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849024
    • AND
      • comment gcc-objc++ is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849047
      • comment gcc-objc++ is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849048
    • AND
      • comment gcc-plugin-devel is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849059
      • comment gcc-plugin-devel is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849060
    • AND
      • comment libasan is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849061
      • comment libasan is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849062
    • AND
      • comment libasan-static is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849075
      • comment libasan-static is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849076
    • AND
      • comment libatomic is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849029
      • comment libatomic is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849030
    • AND
      • comment libatomic-static is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849057
      • comment libatomic-static is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849058
    • AND
      • comment libgcc is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849045
      • comment libgcc is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849046
    • AND
      • comment libgfortran is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849041
      • comment libgfortran is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849042
    • AND
      • comment libgfortran-static is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849025
      • comment libgfortran-static is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849026
    • AND
      • comment libgnat is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849077
      • comment libgnat is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849078
    • AND
      • comment libgnat-devel is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849065
      • comment libgnat-devel is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849066
    • AND
      • comment libgnat-static is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849069
      • comment libgnat-static is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849070
    • AND
      • comment libgo is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849011
      • comment libgo is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849012
    • AND
      • comment libgo-devel is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849039
      • comment libgo-devel is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849040
    • AND
      • comment libgo-static is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849009
      • comment libgo-static is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849010
    • AND
      • comment libgomp is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849053
      • comment libgomp is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849054
    • AND
      • comment libitm is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849021
      • comment libitm is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849022
    • AND
      • comment libitm-devel is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849007
      • comment libitm-devel is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849008
    • AND
      • comment libitm-static is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849005
      • comment libitm-static is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849006
    • AND
      • comment libmudflap is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849013
      • comment libmudflap is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849014
    • AND
      • comment libmudflap-devel is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849017
      • comment libmudflap-devel is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849018
    • AND
      • comment libmudflap-static is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849043
      • comment libmudflap-static is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849044
    • AND
      • comment libobjc is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849055
      • comment libobjc is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849056
    • AND
      • comment libquadmath is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849067
      • comment libquadmath is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849068
    • AND
      • comment libquadmath-devel is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849071
      • comment libquadmath-devel is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849072
    • AND
      • comment libquadmath-static is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849063
      • comment libquadmath-static is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849064
    • AND
      • comment libstdc++ is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849019
      • comment libstdc++ is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849020
    • AND
      • comment libstdc++-devel is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849027
      • comment libstdc++-devel is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849028
    • AND
      • comment libstdc++-docs is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849015
      • comment libstdc++-docs is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849016
    • AND
      • comment libstdc++-static is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849049
      • comment libstdc++-static is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849050
    • AND
      • comment libtsan is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849079
      • comment libtsan is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849080
    • AND
      • comment libtsan-static is earlier than 0:4.8.5-28.el7
        oval oval:com.redhat.rhsa:tst:20180849081
      • comment libtsan-static is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20180849082
rhsa
id RHSA-2018:0849
released 2018-04-10
severity Low
title RHSA-2018:0849: gcc security, bug fix, and enhancement update (Low)
rpms
  • cpp-0:4.8.5-28.el7
  • gcc-0:4.8.5-28.el7
  • gcc-c++-0:4.8.5-28.el7
  • gcc-gfortran-0:4.8.5-28.el7
  • gcc-gnat-0:4.8.5-28.el7
  • gcc-go-0:4.8.5-28.el7
  • gcc-objc-0:4.8.5-28.el7
  • gcc-objc++-0:4.8.5-28.el7
  • gcc-plugin-devel-0:4.8.5-28.el7
  • libasan-0:4.8.5-28.el7
  • libasan-static-0:4.8.5-28.el7
  • libatomic-0:4.8.5-28.el7
  • libatomic-static-0:4.8.5-28.el7
  • libgcc-0:4.8.5-28.el7
  • libgfortran-0:4.8.5-28.el7
  • libgfortran-static-0:4.8.5-28.el7
  • libgnat-0:4.8.5-28.el7
  • libgnat-devel-0:4.8.5-28.el7
  • libgnat-static-0:4.8.5-28.el7
  • libgo-0:4.8.5-28.el7
  • libgo-devel-0:4.8.5-28.el7
  • libgo-static-0:4.8.5-28.el7
  • libgomp-0:4.8.5-28.el7
  • libitm-0:4.8.5-28.el7
  • libitm-devel-0:4.8.5-28.el7
  • libitm-static-0:4.8.5-28.el7
  • libmudflap-0:4.8.5-28.el7
  • libmudflap-devel-0:4.8.5-28.el7
  • libmudflap-static-0:4.8.5-28.el7
  • libobjc-0:4.8.5-28.el7
  • libquadmath-0:4.8.5-28.el7
  • libquadmath-devel-0:4.8.5-28.el7
  • libquadmath-static-0:4.8.5-28.el7
  • libstdc++-0:4.8.5-28.el7
  • libstdc++-devel-0:4.8.5-28.el7
  • libstdc++-docs-0:4.8.5-28.el7
  • libstdc++-static-0:4.8.5-28.el7
  • libtsan-0:4.8.5-28.el7
  • libtsan-static-0:4.8.5-28.el7
refmap via4
bid 100018
confirm
Last major update 26-07-2017 - 17:29
Published 26-07-2017 - 17:29
Last modified 11-04-2018 - 21:29
Back to Top