GNU GCC 4.9

CPE Details

GNU GCC 4.9
4.9
2019-05-23
11h27 +00:00
2019-05-23
11h27 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:gnu:gcc:4.9:*:*:*:*:*:*:*

Informations

Vendor

gnu

Product

gcc

Version

4.9

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2021-37322 2021-11-18 20h11 +00:00 GCC c++filt v2.26 was discovered to contain a use-after-free vulnerability via the component cplus-dem.c.
7.8
High
CVE-2019-15847 2019-09-02 20h03 +00:00 The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.
7.5
High
CVE-2018-12886 2019-05-22 16h42 +00:00 stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.
8.1
High
CVE-2017-11671 2017-07-26 19h00 +00:00 Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation.
4
Medium
CVE-2015-5276 2015-11-17 14h00 +00:00 The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.
5