Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-1301

Опубликовано: 12 фев. 2025
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2025-1301: gcc security update (MODERATE)

[8.5.0-23.0.1]

  • Merge Oracle patches to 8.5.0-23. Oracle history: May-22-2024 Qing Zhao qing.zhao@oracle.com 8.5.0-22.0.1
    • Merge Oracle patches to 8.5.0-22. Reviewed-by: Jose E. Marchesi jose.marchesi@oracle.com March-27-2024 Qing Zhao qing.zhao@oracle.com 8.5.0-21.0.1
    • Merge Oracle patches to 8.5.0-21. January-19-2024 Qing Zhao qing.zhao@oracle.com 8.5.0-20.0.3
    • Fix Orabug 35283123, i.e, the same bug as GCC PR111407. gcc14-pr111407.patch Reviewed-by: Jose E. Marchesi jose.marchesi@oracle.com January-5-2024 Jose E. Marchesi jose.marchesi@oracle.com 8.5.0-20.0.2
    • Restore support for -mpreserve-args in aarch64 targets, adapted to new AArch64 stack frame layout. Reviewed-by: Cupertino Miranda cupertino.miranda@oracle.com October-4-2023 David Faust david.faust@oracle.com 8.5.0-20.0.1
    • Forward-port Oracle patches Reviewed-by: Jose E. Marchesi jose.marchesi@oracle.com September-28-2023 David Faust david.faust@oracle.com 8.5.0-18.0.6
    • Backport additional patches from gcc-9 to fix CVE-2023-4039 patches interaction with backported aarch64 -fstack-clash-protection support. [Orabug 35843962] Reviewed-by: Jose E. Marchesi jose.marchesi@oracle.com August-31-2023 Qing Zhao qing.zhao@oracle.com 8.5.0-18.0.5
    • CVE-2023-4039 GCC mitigation. Orabug 35751743. Includes removal of aarch64-preserve-args.patch.
    • CVE-2022-40982 'Intel Downfall' mitigation. Orabug 35751810. Add two patches originally from GCC upstream releases/gcc-11 branch. with major adjustment. gcc11-downfall-disable-gather-in-vec.patch gcc11-downfall-support-mno-gather.patch Reviewed-by: Jose E. Marchesi jose.marchesi@oracle.com May-11-2023 Jose E. Marchesi jose.marchesi@oracle.com 8.5.0-18.0.2
    • Support for -mpreserve-args in aarch64. Orabug 35065765. Reviewed-by: Qing Zhao qing.zhao@oracle.com. March-28-2023 Qing Zhao qing.zhao@oracle.com 8.5.0-18.0.1
    • Merge Oracle patches with gcc-8.5.0-18. Reviewed-by: Jose E. Marchesi jose.marchesi@oracle.com January-12-2023 Qing Zhao qing.zhao@oracle.com 8.5.0-16.0.1
    • Merge oracle patches with gcc-8.5.0-16. November-30-2022 Qing Zhao qing.zhao@oracle.com 8.5.0-15.0.2
    • Fix Orabug 34679540 - PROFILE COLLECT BUILD AND WORK LOAD TEST ISSUES IN LINUX ARM64. Removing the buggy patch that has been removed from upstream gcc too: gcc10-pr91971.patch September-28-2022 Qing Zhao qing.zhao@oracle.com 8.5.0-15.0.1
    • Merge oracle patches with gcc-8.5.0-15. June-29-2022 Qing Zhao qing.zhao@oracle.com 8.5.0-10.1.0.1
    • Merge oracle patches with gcc-8.5.0-10.1.el8_6. Reviewed-by: Jose E. Marchesi jose.marchesi@oracle.com May-4-2022 Qing Zhao qing.zhao@oracle.com 8.5.0-10.0.2
    • Fix Orabug 34066706 only in OL GCC. report error when there is no PROGRAM_SUMMARY section in .gcda file. Reviewed-by: Jose E. Marchesi jose.marchesi@oracle.com April-27-2022 Marek Polacek polacek@redhat.com 8.5.0-10.1
    • backport Default widths with -fdec-format-defaults patch (#2079578) March-22-2022 Qing Zhao qing.zhao@oracle.com 8.5.0-10.0.1
    • Merge with oracle patches. January-5-2022 Qing Zhao qing.zhao@oracle.com 8.5.0-4.0.2
    • Add patches to support marvell on Arm: gcc9-add-support-for-profile-extension.patch gcc10-add-initial-octeontx2-support.patch Reviewed-by: Jose E. Marchesi jose.marchesi@oracle.com November-16-2021 Qing Zhao qing.zhao@oracle.com 8.5.0-4.0.1
    • Merge oracle patches to security errata 8.5.0-4. Reviewed-by: Jose E. Marchesi jose.marchesi@oracle.com October-14-2021 Indu Bhagat indu.bhagat@oracle.com 8.5.0-3.0.2
    • Fix Orabug 33451471 and backport CTF/BTF enhancements ctfc: Free CTF container elements in ctfc_delete_container () ctf: Do not warn for CTF not supported for GNU GIMPLE ICE in btf_finalize when compiling with -gbtf (PR debug/102507, Orabug 33451471) Reviewed-by: Jose E. Marchesi jose.marchesi@oracle.com October-5-2021 Qing Zhao qing.zhao@oracle.com 8.5.0-3.0.1
    • Merge the following oracle patches to OL8.5 beta:
      • Fix an aarch64 compilation error triggered by the oracle patch gcc9-multiple-changes-align.patch on OL8U5 source base. gcc-fix-aarch64-tune-params.patch
      • Fix Orabug 33281392 Update CTF and BTF support in OL8 GCC This commit brings the support for CTF/BTF debug formats at par with upstream. GCC now generates the CTF/BTF debug information by using the internal DWARF representation. For backward compatibility reasons, OL8 GCC continues to support -gt command line option. (Indu Bhagat indu.bhagat@oracle.com 8.4.1-1.0.3)
      • Add complex divide improvement backport of upstream commit 54f0224d55a1b56dde092460ddf76913670e6efc (Patrick.McGehearty patrick.mcgehearty@oracle.com 8.4.1-1.0.2)
      • Fix Orabug 32301371 - bug using gcov with preserve paths option This is the same bug as GCC bug PR gcov-profile/88994 gcc9-pr88994.patch (Qing Zhao qing.zhao@oracle.com 8.3.1-5.1.0.2)
      • Fix generation of CTF type records for completed structs referred thru pointers. Orabug 31095790. (Jose E. Marchesi jose.marchesi@oracle.com 8.3.1-5.0.4)
      • Fix Orabug 29838827 - provide an option to adjust the maximum depth of nested #include This is the same bug as gcc upstream PR90581 from Gcc9: gcc9-pr90581.patch
      • Fix Orabug 29541051 - confusing error message when there is a problem with ASAN_OPTIONS 'ERROR: expected '='' This is the same bug as gcc upstream PR89832 from Gcc9: gcc9-pr89832.patch (Qing Zhao qing.zhao@oracle.com 8.3.1-5.0.3)
      • Update support for CTF Fix Orabug 30833294 GCC generates incorrect CTF for single element arrays Fix Orabug 30808764 CTF generation fails when attribute ((mode (XX))) is used (Indu Bhagat indu.bhagat@oracle.com 8.3.1-5.0.2)
      • Apply ares/neoverse support patches only ifarch aarch64. (Qing Zhao qing.zhao@oracle.com 8.3.1-4.5.0.6)
      • Add 4 patches from gcc9 to support Arm Ares and Neoverse-N1 for Aarch64 gcc9-add-vec-reverse.patch gcc9-multiple-changes-align.patch gcc9-initial-mcpu-ares-tuning.patch gcc9-add-support-for-neoverse-n1.patch (Indu Bhagat indu.bhagat@oracle.com 8.3.1-4.5.0.5)
      • Update support for CTF Fix Orabug 30778534 gcc should generate CTF for functions at file-scope only Fix Orabug 30779193 CTF generation fails for some flavors of vla Fix Orabug 30784275 Fix issues wtih CTF generation for typedef constructs ctf-3-generation-and-emission-for-a-single-compilation.patch ctf-4-update-ctf-testsuite.patch (Indu Bhagat indu.bhagat@oracle.com 8.3.1-4.5.0.4)
      • Add support for CTF in GCC Fix Orabug 30102948 gcc: Add CTF generation to compiler Fix Orabug 30102949 gcc: Add CTF generation to compiler (aarch64) ctf-1-new-function-lang_GNU_GIMPLE.patch ctf-2-command-line-options-gtLEVEL.patch ctf-3-generation-and-emission-for-a-single-compilation.patch ctf-4-update-ctf-testsuite.patch ctf-5-handle-ctf-sections-when-lto-enabled.patch (Qing Zhao qing.zhao@oracle.com 8.3.1-4.5.0.3)
      • CVE-2018-12207 / Intel SKX102 OL8 gcc: Intel Mitigation for CVE: CVE-2018-12207
      • Allow -flto -Wa,-mbranches-within-32B-boundaries to pass -mbranches-within-32B-boundaries to GNU assembler. Without -lfto, -Wa,-mbranches-within-32B-boundaries to pass -mbranches-within-32B-boundaries to GNU assembler using existing GCC binaries.
      • Mitigation patch: gcc8-Fix-Wa-with-flto.patch (Qing Zhao qing.zhao@oracle.com 8.3.1-4.5.0.2)
      • Fix Orabug 29968294 - Heap corruption with fprofile-dir=%p prevents profiling parallel processes, needed for RDBMS: Add patch to fix PR86057 from Gcc9: gcc9-pr86057.patch
      • Fix Orabug 30044244 - Profile directory concatenated with object file path This is the same bug as gcc upstream PR91971: gcc9-pr85759.patch gcc10-pr91971.patch (Indu Bhagat indu.bhagat@oracle.com 8.3.1-4.5.0.1)
      • Fix Orabug 29599147 - Need -fprofile-dir=%q{VAR} backported to gcc8 This is the similar GCC PR47618, add the fix from GCC9: gcc9-pr47618.patch
      • Fix Orabug 29272977 - DB SUPPORT: Need way to dump inlining report from GCC Add -fopt-info-inline support from GCC9: gcc9-opt-info-inline.patch
      • Fix Orabug 29273006 - DB SUPPORT: need way to turn off inlining of global functions Add -flive-patching support from GCC9: gcc9-fipa-reference-addressable.patch gcc9-fipa-stack-alignment.patch gcc9-add-fomit-frame-pointer-to-test.patch gcc9-extend-live-patching-option-handling.patch gcc9-ipa-stack-alignment-386-test.patch
      • Introduce 'oracle_release' into .spec file. Echo it to gcc/DEV-PHASE.
      • Backport 17 ampere patches from https://git.theobroma-systems.com/ampere-computing/gcc.git/log/?h=gcc-8_2_0-amp3-branch e18301133ea622f6d6796ded1d15466e70475cf8: Retpoline (Spectre-V2 mitigation) for aarch64. d735f3ae4712f66362326d179b4d7e9332c79677: Revert 2017-10-24 Richard Biener 271e2811e59c0c77fc022fa86a7030f20b4cac8e: Correct the maximum shift amount for shifted 0512749950d927de3dd695f2f2aacdfd30cf32fd: Add CPU support for Ampere Computing's eMAG. c8b87078f9e0714cb9cab602e12a18ceb12df05a: eMAG/Xgene: Procedural cost-model for X-Gene 74610471b3577c5d465c3fd095a65b796b1e074c: Updating cost table for xgene1. ddba1553ac412be5596e6e2962c148032c4cf231: [AArch64] Add Xgene1 prefetch tunings. b7ebb0a10a8900324074070188a0936ed81b28a4: [AArch64] Fix in xgene1_addrcost_table 393dc5c50d55d069f91627bf0be5bab812978850: X-Gene: Adapt tuning struct for GCC 8. b9136d58824af2118c4969c3edb42cad3318b08f: tree-ssa-list-find-pipeline: Add pipelining loads for list finds. 095496dd8a9491a17a9caec173281ad02e559df5: uncse: Added pass to undo common subexpression elimination. a7c8dc238e3656e9d2f9256ee76f933c8d7956fb: loop-prefetcher: Adapt defaults for X-Gene cores. 256307f293f1750851576e14c8a42b696eced2da: tree-ssa-cpp: Don't crash on SSA names without definition stmts. 6e32f53be4f6733f6bfe267ad2337aecaf4047f6: Introduce new option -funroll-more. 1ac2485a2fced091a5cce6343fe6a6337f850e73: New option to bypass aliasing-checks. 66d7d833bece61e58998ad53a609cd32e3ee4fad: cfgloopmanip: Allow forced creation of loop preheaders. c4f89d50e200538b1ac8889801705300e0b27ef2: Add new pass to optimise loops.

[8.5.0-23]

  • rebuild for CVE-2020-11023 (RHEL-78274)

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

gcc-plugin-devel

8.5.0-23.0.1.el8_10

libgfortran-static

8.5.0-23.0.1.el8_10

libstdc++-static

8.5.0-23.0.1.el8_10

cpp

8.5.0-23.0.1.el8_10

gcc

8.5.0-23.0.1.el8_10

gcc-c++

8.5.0-23.0.1.el8_10

gcc-gdb-plugin

8.5.0-23.0.1.el8_10

gcc-gfortran

8.5.0-23.0.1.el8_10

gcc-plugin-annobin

8.5.0-23.0.1.el8_10

libitm-devel

8.5.0-23.0.1.el8_10

libstdc++-devel

8.5.0-23.0.1.el8_10

libstdc++-docs

8.5.0-23.0.1.el8_10

libasan

8.5.0-23.0.1.el8_10

libatomic

8.5.0-23.0.1.el8_10

libatomic-static

8.5.0-23.0.1.el8_10

libgcc

8.5.0-23.0.1.el8_10

libgfortran

8.5.0-23.0.1.el8_10

libgomp

8.5.0-23.0.1.el8_10

libitm

8.5.0-23.0.1.el8_10

liblsan

8.5.0-23.0.1.el8_10

libstdc++

8.5.0-23.0.1.el8_10

libtsan

8.5.0-23.0.1.el8_10

libubsan

8.5.0-23.0.1.el8_10

Oracle Linux x86_64

gcc-plugin-devel

8.5.0-23.0.1.el8_10

libgfortran-static

8.5.0-23.0.1.el8_10

libquadmath-static

8.5.0-23.0.1.el8_10

libstdc++-static

8.5.0-23.0.1.el8_10

cpp

8.5.0-23.0.1.el8_10

gcc

8.5.0-23.0.1.el8_10

gcc-c++

8.5.0-23.0.1.el8_10

gcc-gdb-plugin

8.5.0-23.0.1.el8_10

gcc-gfortran

8.5.0-23.0.1.el8_10

gcc-offload-nvptx

8.5.0-23.0.1.el8_10

gcc-plugin-annobin

8.5.0-23.0.1.el8_10

libitm-devel

8.5.0-23.0.1.el8_10

libquadmath-devel

8.5.0-23.0.1.el8_10

libstdc++-devel

8.5.0-23.0.1.el8_10

libstdc++-docs

8.5.0-23.0.1.el8_10

libasan

8.5.0-23.0.1.el8_10

libatomic

8.5.0-23.0.1.el8_10

libatomic-static

8.5.0-23.0.1.el8_10

libgcc

8.5.0-23.0.1.el8_10

libgfortran

8.5.0-23.0.1.el8_10

libgomp

8.5.0-23.0.1.el8_10

libgomp-offload-nvptx

8.5.0-23.0.1.el8_10

libitm

8.5.0-23.0.1.el8_10

liblsan

8.5.0-23.0.1.el8_10

libquadmath

8.5.0-23.0.1.el8_10

libstdc++

8.5.0-23.0.1.el8_10

libtsan

8.5.0-23.0.1.el8_10

libubsan

8.5.0-23.0.1.el8_10

Связанные CVE

Связанные уязвимости

CVSS3: 6.9
ubuntu
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.1
redhat
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
nvd
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
debian
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, pa ...

rocky
4 месяца назад

Moderate: gcc-toolset-14-gcc security update