CVE-2015-5276 PUBLISHED

The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.

EPSS 0.45% · 63.4th percentile

Risk Scores

EPSS Score
0.45%
63.4th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSgcc-msp4304.6.3~mspgcc-20120406-7ubuntu3, 0
Ubuntu:16.04:LTSgcc-4.74.7.4-3ubuntu12, 0, 4.7.4-3ubuntu3
Ubuntu:16.04:LTSgcc-i686-linux-android0, 9, 7
Ubuntu:16.04:LTSgcc-4.8-ppc64el-cross2, 0.8, 0.9
Ubuntu:16.04:LTSgcc-4.8-arm64-cross0, 2, 0.18
Ubuntu:16.04:LTSgcc-4.7-armel-cross0, 3, 1.90
Ubuntu:16.04:LTSgcc-4.7-armhf-cross0, 1.86, 1.87
Ubuntu:18.04:LTSgcc-4.80, 4.8.5-4ubuntu6, 4.8.5-4ubuntu8
Ubuntu:14.04:LTSgcc-4.84.8.2-16ubuntu6, 0, 4.8.1-10ubuntu8
Ubuntu:16.04:LTSgcc-4.84.8.5-3ubuntu2, 4.8.5-3ubuntu3, 4.8.5-4ubuntu1
Ubuntu:20.04:LTSgcc-msp4300, 4.6.3~mspgcc-20120406-7.1ubuntu3
Ubuntu:16.04:LTSgcc-4.8-armhf-cross0.17, 2, 0
Ubuntu:16.04:LTSgcc-4.8-powerpc-cross0.20, 3, 0
Ubuntu:22.04:LTSgcc-msp4304.6.3~mspgcc-20120406-7.1ubuntu3, 0
Ubuntu:18.04:LTSgcc-msp4304.6.3~mspgcc-20120406-7ubuntu4, 0, 4.6.3~mspgcc-20120406-7ubuntu5
Ubuntu:14.04:LTSgcc-mingw-w640, 9, 8
Ubuntu:14.04:LTSgcc-4.74.7.3-7ubuntu3, 4.7.3-9ubuntu2, 4.7.3-9ubuntu1
Ubuntu:16.04:LTSgcc-avr1:4.9.2+Atmel3.5.0-1, 1:4.8.1+Atmel3.4.5-1, 0
Ubuntu:16.04:LTSgcc-arm-linux-androideabi0.20130705.1-0ubuntu9, 0, 0.20130705.1-0ubuntu8
Ubuntu:16.04:LTSgcc-arm-none-eabi15:4.9.3+svn227297-1build1, 15:4.9.3+svn227297-1, 0

Timeline

References

Open in Interactive Console →