Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:1306

Опубликовано: 13 фев. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: gcc-toolset-13-gcc security update

The gcc-toolset-13-gcc package contains the GNU Compiler Collection version 13.

Security Fix(es):

  • jquery: Untrusted code execution via tag in HTML passed to DOM manipulation methods (CVE-2020-11023)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
gcc-toolset-13-gccx86_642.2.el8_10gcc-toolset-13-gcc-13.3.1-2.2.el8_10.x86_64.rpm
gcc-toolset-13-gcc-c++x86_642.2.el8_10gcc-toolset-13-gcc-c++-13.3.1-2.2.el8_10.x86_64.rpm
gcc-toolset-13-gcc-gfortranx86_642.2.el8_10gcc-toolset-13-gcc-gfortran-13.3.1-2.2.el8_10.x86_64.rpm
gcc-toolset-13-gcc-plugin-annobinx86_642.2.el8_10gcc-toolset-13-gcc-plugin-annobin-13.3.1-2.2.el8_10.x86_64.rpm
gcc-toolset-13-gcc-plugin-develx86_642.2.el8_10gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el8_10.x86_64.rpm
gcc-toolset-13-libasan-develx86_642.2.el8_10gcc-toolset-13-libasan-devel-13.3.1-2.2.el8_10.x86_64.rpm
gcc-toolset-13-libatomic-develx86_642.2.el8_10gcc-toolset-13-libatomic-devel-13.3.1-2.2.el8_10.x86_64.rpm
gcc-toolset-13-libgccjitx86_642.2.el8_10gcc-toolset-13-libgccjit-13.3.1-2.2.el8_10.x86_64.rpm
gcc-toolset-13-libgccjit-develx86_642.2.el8_10gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el8_10.x86_64.rpm
gcc-toolset-13-libitm-develx86_642.2.el8_10gcc-toolset-13-libitm-devel-13.3.1-2.2.el8_10.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 6.9
ubuntu
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.1
redhat
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
nvd
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
debian
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, pa ...

rocky
4 месяца назад

Moderate: gcc-toolset-14-gcc security update