Описание
ELSA-2025-1346: gcc security update (MODERATE)
[11.5.0-5.0.1]
- Merge Oracle patches to 11.5.0-5. Oracle history:
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
libatomic
11.5.0-5.0.1.el9_5
libgcc
11.5.0-5.0.1.el9_5
libgfortran
11.5.0-5.0.1.el9_5
libgomp
11.5.0-5.0.1.el9_5
libstdc++
11.5.0-5.0.1.el9_5
gcc-plugin-devel
11.5.0-5.0.1.el9_5
libstdc++-static
11.5.0-5.0.1.el9_5
cpp
11.5.0-5.0.1.el9_5
gcc
11.5.0-5.0.1.el9_5
gcc-c++
11.5.0-5.0.1.el9_5
gcc-gfortran
11.5.0-5.0.1.el9_5
gcc-plugin-annobin
11.5.0-5.0.1.el9_5
libasan
11.5.0-5.0.1.el9_5
libgccjit
11.5.0-5.0.1.el9_5
libgccjit-devel
11.5.0-5.0.1.el9_5
libitm
11.5.0-5.0.1.el9_5
libitm-devel
11.5.0-5.0.1.el9_5
liblsan
11.5.0-5.0.1.el9_5
libstdc++-devel
11.5.0-5.0.1.el9_5
libstdc++-docs
11.5.0-5.0.1.el9_5
libtsan
11.5.0-5.0.1.el9_5
libubsan
11.5.0-5.0.1.el9_5
Oracle Linux x86_64
libatomic
11.5.0-5.0.1.el9_5
libgcc
11.5.0-5.0.1.el9_5
libgfortran
11.5.0-5.0.1.el9_5
libgomp
11.5.0-5.0.1.el9_5
libquadmath
11.5.0-5.0.1.el9_5
libstdc++
11.5.0-5.0.1.el9_5
cpp
11.5.0-5.0.1.el9_5
gcc
11.5.0-5.0.1.el9_5
gcc-c++
11.5.0-5.0.1.el9_5
gcc-gfortran
11.5.0-5.0.1.el9_5
gcc-offload-nvptx
11.5.0-5.0.1.el9_5
gcc-plugin-annobin
11.5.0-5.0.1.el9_5
libasan
11.5.0-5.0.1.el9_5
libgccjit
11.5.0-5.0.1.el9_5
libgccjit-devel
11.5.0-5.0.1.el9_5
libgomp-offload-nvptx
11.5.0-5.0.1.el9_5
libitm
11.5.0-5.0.1.el9_5
libitm-devel
11.5.0-5.0.1.el9_5
liblsan
11.5.0-5.0.1.el9_5
libquadmath-devel
11.5.0-5.0.1.el9_5
libstdc++-devel
11.5.0-5.0.1.el9_5
libstdc++-docs
11.5.0-5.0.1.el9_5
libtsan
11.5.0-5.0.1.el9_5
libubsan
11.5.0-5.0.1.el9_5
gcc-plugin-devel
11.5.0-5.0.1.el9_5
libstdc++-static
11.5.0-5.0.1.el9_5
Связанные CVE
Связанные уязвимости
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, pa ...