Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:1301

Опубликовано: 13 фев. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: gcc security update

The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.

Security Fix(es):

  • jquery: Untrusted code execution via tag in HTML passed to DOM manipulation methods (CVE-2020-11023)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
libasanx86_6423.el8_10libasan-8.5.0-23.el8_10.x86_64.rpm
libatomicx86_6423.el8_10libatomic-8.5.0-23.el8_10.x86_64.rpm
libatomic-staticx86_6423.el8_10libatomic-static-8.5.0-23.el8_10.x86_64.rpm
libgccx86_6423.el8_10libgcc-8.5.0-23.el8_10.x86_64.rpm
libgfortranx86_6423.el8_10libgfortran-8.5.0-23.el8_10.x86_64.rpm
libgompx86_6423.el8_10libgomp-8.5.0-23.el8_10.x86_64.rpm
libgomp-offload-nvptxx86_6423.el8_10libgomp-offload-nvptx-8.5.0-23.el8_10.x86_64.rpm
libitmx86_6423.el8_10libitm-8.5.0-23.el8_10.x86_64.rpm
liblsanx86_6423.el8_10liblsan-8.5.0-23.el8_10.x86_64.rpm
libquadmathx86_6423.el8_10libquadmath-8.5.0-23.el8_10.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 6.9
ubuntu
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.1
redhat
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
nvd
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
debian
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, pa ...

rocky
4 месяца назад

Moderate: gcc-toolset-14-gcc security update