From URL: Patch was posted here: https://gcc.gnu.org/ml/gcc-patches/2017-03/msg01349.html References: https://nvd.nist.gov/vuln/detail/CVE-2017-11671
Fixed upstream in 6.4, 7.1 and later
CVE ID: CVE-2017-11671 Summary: Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation. Maintainers, please advised if this is fixed in tree!
Yes. All non-masked versions are gcc-6.5.0 and above. All contain a fix.
Clean since 2019-10-28 for gcc 4.x (it seems): https://gitweb.gentoo.org/repo/gentoo.git/commit/sys-devel/gcc?id=d9649766ab2893de8586d88215a846275615bd72 And the others were removed a while before that. So closing.