Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-5276

Опубликовано: 17 нояб. 2015
Источник: debian

Описание

The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gcc-5fixed5.3.0-1package
gcc-4.9fixed4.9.3-5package
gcc-4.9no-dsajessiepackage

Примечания

  • https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142

  • Upstream commit: https://gcc.gnu.org/viewcvs/gcc?view=revision&revision=227687

Связанные уязвимости

ubuntu
около 10 лет назад

The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.

redhat
почти 11 лет назад

The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.

nvd
около 10 лет назад

The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.

suse-cvrf
почти 10 лет назад

Security update for gcc5

suse-cvrf
больше 10 лет назад

Security update for gcc48