GNU GCC 6.0

CPE Details

GNU GCC 6.0
6.0
2019-05-23
11h27 +00:00
2019-05-23
11h27 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:gnu:gcc:6.0:*:*:*:*:*:*:*

Informations

Vendor

gnu

Product

gcc

Version

6.0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2021-37322 2021-11-18 20h11 +00:00 GCC c++filt v2.26 was discovered to contain a use-after-free vulnerability via the component cplus-dem.c.
7.8
Haute
CVE-2019-15847 2019-09-02 20h03 +00:00 The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.
7.5
Haute
CVE-2018-12886 2019-05-22 16h42 +00:00 stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.
8.1
Haute
CVE-2017-11671 2017-07-26 19h00 +00:00 Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation.
4
Moyen