Lucene search

K
ubuntuUbuntuUSN-5770-1
HistoryDec 08, 2022 - 12:00 a.m.

GCC vulnerability

2022-12-0800:00:00
ubuntu.com
15

4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

4.4 Medium

AI Score

Confidence

High

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

52.1%

Releases

  • Ubuntu 16.04 ESM

Packages

  • gcc-5 - GNU C compiler
  • gccgo-6 - GNU Go compiler

Details

Todd Eisenberger discovered that certain versions of GNU Compiler
Collection (GCC) could be made to clobber the status flag of RDRAND
and RDSEED with specially crafted input. This could potentially lead
to less randomness in random number generation.

OSVersionArchitecturePackageVersionFilename
Ubuntu16.04noarchgnat-5< 5.4.0-6ubuntu1~16.04.12+esm2UNKNOWN
Ubuntu16.04noarchcpp-5< 5.4.0-6ubuntu1~16.04.12UNKNOWN
Ubuntu16.04noarchcpp-5-dbgsym< 5.4.0-6ubuntu1~16.04.12UNKNOWN
Ubuntu16.04noarchcpp-5-doc< 5.4.0-6ubuntu1~16.04.12UNKNOWN
Ubuntu16.04noarchfixincludes< 1:5.4.0-6ubuntu1~16.04.12UNKNOWN
Ubuntu16.04noarchfixincludes-dbgsym< 1:5.4.0-6ubuntu1~16.04.12UNKNOWN
Ubuntu16.04noarchg++-5< 5.4.0-6ubuntu1~16.04.12UNKNOWN
Ubuntu16.04noarchg++-5-dbgsym< 5.4.0-6ubuntu1~16.04.12UNKNOWN
Ubuntu16.04noarchg++-5-multilib< 5.4.0-6ubuntu1~16.04.12UNKNOWN
Ubuntu16.04noarchg++-5-multilib-dbgsym< 5.4.0-6ubuntu1~16.04.12UNKNOWN
Rows per page:
1-10 of 2591

4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

4.4 Medium

AI Score

Confidence

High

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

52.1%