SB2019090311 - Insufficient randomization in GCC for Power9
Published: September 3, 2019 Updated: May 26, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) (CVE-ID: CVE-2019-15847)
The vulnerability allows an attacker to bypass implemented security restrictions.
The vulnerability exists due to the POWER9 backend in GNU Compiler Collection (GCC) can optimize multiple calls of the __builtin_darn intrinsic into a
single call, thus reducing the entropy of the random number generator. This vulnerability may weaken security features that rely on random number generator.
Remediation
Install update from vendor's website.