Описание
ELSA-2025-1601: gcc security update (MODERATE)
[4.8.5-45.0.1]
- [Orabug: 37603707] ELSA-2025-1601 Moderate: gcc security update CVE-2020-11023 rebuild for CVE-2020-11023
- Reviewed-by: Jose E. Marchesi jose.marchesi@oracle.com
[4.8.5-44.0.5]
- fix arm cross building inline issue. gcc48-cfns-fix-protos.patch
- Reviewed-by: Jose E. Marchesi jose.marchesi@oracle.com
[4.8.5-44.0.3]
- [Orabug: 31505739] backport fix for sorry, unimplemented ms_abi attribute requires -maccumulate-outgoing-args or subtarget optimization implying it
- Reviewed-by: Jose E. Marchesi jose.marchesi@oracle.com
Обновленные пакеты
Oracle Linux 7
Oracle Linux x86_64
cpp
4.8.5-45.0.1.el7_9
gcc
4.8.5-45.0.1.el7_9
gcc-c++
4.8.5-45.0.1.el7_9
gcc-gfortran
4.8.5-45.0.1.el7_9
gcc-gnat
4.8.5-45.0.1.el7_9
gcc-go
4.8.5-45.0.1.el7_9
gcc-objc
4.8.5-45.0.1.el7_9
gcc-objc++
4.8.5-45.0.1.el7_9
gcc-plugin-devel
4.8.5-45.0.1.el7_9
libasan
4.8.5-45.0.1.el7_9
libasan-static
4.8.5-45.0.1.el7_9
libatomic
4.8.5-45.0.1.el7_9
libatomic-static
4.8.5-45.0.1.el7_9
libgcc
4.8.5-45.0.1.el7_9
libgfortran
4.8.5-45.0.1.el7_9
libgfortran-static
4.8.5-45.0.1.el7_9
libgnat
4.8.5-45.0.1.el7_9
libgnat-devel
4.8.5-45.0.1.el7_9
libgnat-static
4.8.5-45.0.1.el7_9
libgo
4.8.5-45.0.1.el7_9
libgo-devel
4.8.5-45.0.1.el7_9
libgo-static
4.8.5-45.0.1.el7_9
libgomp
4.8.5-45.0.1.el7_9
libitm
4.8.5-45.0.1.el7_9
libitm-devel
4.8.5-45.0.1.el7_9
libitm-static
4.8.5-45.0.1.el7_9
libmudflap
4.8.5-45.0.1.el7_9
libmudflap-devel
4.8.5-45.0.1.el7_9
libmudflap-static
4.8.5-45.0.1.el7_9
libobjc
4.8.5-45.0.1.el7_9
libquadmath
4.8.5-45.0.1.el7_9
libquadmath-devel
4.8.5-45.0.1.el7_9
libquadmath-static
4.8.5-45.0.1.el7_9
libstdc++
4.8.5-45.0.1.el7_9
libstdc++-devel
4.8.5-45.0.1.el7_9
libstdc++-docs
4.8.5-45.0.1.el7_9
libstdc++-static
4.8.5-45.0.1.el7_9
libtsan
4.8.5-45.0.1.el7_9
libtsan-static
4.8.5-45.0.1.el7_9
Связанные CVE
Связанные уязвимости
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, pa ...