Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-1346

Опубликовано: 13 фев. 2025
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2025-1346: gcc security update (MODERATE)

[11.5.0-5.0.1]

  • Merge Oracle patches to 11.5.0-5. Oracle history:

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

libatomic

11.5.0-5.0.1.el9_5

libgcc

11.5.0-5.0.1.el9_5

libgfortran

11.5.0-5.0.1.el9_5

libgomp

11.5.0-5.0.1.el9_5

libstdc++

11.5.0-5.0.1.el9_5

gcc-plugin-devel

11.5.0-5.0.1.el9_5

libstdc++-static

11.5.0-5.0.1.el9_5

cpp

11.5.0-5.0.1.el9_5

gcc

11.5.0-5.0.1.el9_5

gcc-c++

11.5.0-5.0.1.el9_5

gcc-gfortran

11.5.0-5.0.1.el9_5

gcc-plugin-annobin

11.5.0-5.0.1.el9_5

libasan

11.5.0-5.0.1.el9_5

libgccjit

11.5.0-5.0.1.el9_5

libgccjit-devel

11.5.0-5.0.1.el9_5

libitm

11.5.0-5.0.1.el9_5

libitm-devel

11.5.0-5.0.1.el9_5

liblsan

11.5.0-5.0.1.el9_5

libstdc++-devel

11.5.0-5.0.1.el9_5

libstdc++-docs

11.5.0-5.0.1.el9_5

libtsan

11.5.0-5.0.1.el9_5

libubsan

11.5.0-5.0.1.el9_5

Oracle Linux x86_64

libatomic

11.5.0-5.0.1.el9_5

libgcc

11.5.0-5.0.1.el9_5

libgfortran

11.5.0-5.0.1.el9_5

libgomp

11.5.0-5.0.1.el9_5

libquadmath

11.5.0-5.0.1.el9_5

libstdc++

11.5.0-5.0.1.el9_5

cpp

11.5.0-5.0.1.el9_5

gcc

11.5.0-5.0.1.el9_5

gcc-c++

11.5.0-5.0.1.el9_5

gcc-gfortran

11.5.0-5.0.1.el9_5

gcc-offload-nvptx

11.5.0-5.0.1.el9_5

gcc-plugin-annobin

11.5.0-5.0.1.el9_5

libasan

11.5.0-5.0.1.el9_5

libgccjit

11.5.0-5.0.1.el9_5

libgccjit-devel

11.5.0-5.0.1.el9_5

libgomp-offload-nvptx

11.5.0-5.0.1.el9_5

libitm

11.5.0-5.0.1.el9_5

libitm-devel

11.5.0-5.0.1.el9_5

liblsan

11.5.0-5.0.1.el9_5

libquadmath-devel

11.5.0-5.0.1.el9_5

libstdc++-devel

11.5.0-5.0.1.el9_5

libstdc++-docs

11.5.0-5.0.1.el9_5

libtsan

11.5.0-5.0.1.el9_5

libubsan

11.5.0-5.0.1.el9_5

gcc-plugin-devel

11.5.0-5.0.1.el9_5

libstdc++-static

11.5.0-5.0.1.el9_5

Связанные CVE

Связанные уязвимости

CVSS3: 6.9
ubuntu
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.1
redhat
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
nvd
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
debian
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, pa ...

rocky
4 месяца назад

Moderate: gcc-toolset-14-gcc security update