|Description||The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.
More Information: https://security-tracker.debian.org/tracker/CVE-2019-15847
Feature Version: 8.3.0-6
Fixed By Version:
|Container Layer Hash||sha256:d121f8d1c4128ebc1e95e5bfad90a0189b84eadbbb2fbaad20cbb26d20b2c8a2|
|Assessment||Ignore by email@example.com on 9/16/2020 9:47:56 AM|
|Expiration||12/15/2020 8:47:56 AM (90 days from assessment)|
|There are no comments for this vulnerability.|