Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2022-8415

Опубликовано: 22 нояб. 2022
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2022-8415: mingw-gcc security and bug fix update (LOW)

[12.0.1-11.2]

  • Bump release and rebuild resolves: rhbz#2096010

[12.0.1-11.1]

  • Rebase to Fedora Rawhide resolves: rhbz#2080170

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

mingw32-cpp

12.0.1-11.2.el9

mingw32-gcc

12.0.1-11.2.el9

mingw32-gcc-c++

12.0.1-11.2.el9

mingw32-libgcc

12.0.1-11.2.el9

mingw64-cpp

12.0.1-11.2.el9

mingw64-gcc

12.0.1-11.2.el9

mingw64-gcc-c++

12.0.1-11.2.el9

mingw64-libgcc

12.0.1-11.2.el9

Oracle Linux x86_64

mingw32-cpp

12.0.1-11.2.el9

mingw32-gcc

12.0.1-11.2.el9

mingw32-gcc-c++

12.0.1-11.2.el9

mingw32-libgcc

12.0.1-11.2.el9

mingw64-cpp

12.0.1-11.2.el9

mingw64-gcc

12.0.1-11.2.el9

mingw64-gcc-c++

12.0.1-11.2.el9

mingw64-libgcc

12.0.1-11.2.el9

Связанные CVE

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 3 лет назад

GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.

CVSS3: 3.3
redhat
больше 4 лет назад

GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.

CVSS3: 5.5
nvd
больше 3 лет назад

GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.

CVSS3: 5.5
debian
больше 3 лет назад

GCC v12.0 was discovered to contain an uncontrolled recursion via the ...

github
больше 3 лет назад

GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.