Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:1338

Опубликовано: 13 фев. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: gcc-toolset-14-gcc security update

The gcc-toolset-14-gcc package contains the GNU Compiler Collection version 14.

Security Fix(es):

  • jquery: Untrusted code execution via tag in HTML passed to DOM manipulation methods (CVE-2020-11023)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
gcc-toolset-14-gccx86_647.1.el8_10gcc-toolset-14-gcc-14.2.1-7.1.el8_10.x86_64.rpm
gcc-toolset-14-gcc-c++x86_647.1.el8_10gcc-toolset-14-gcc-c++-14.2.1-7.1.el8_10.x86_64.rpm
gcc-toolset-14-gcc-gfortranx86_647.1.el8_10gcc-toolset-14-gcc-gfortran-14.2.1-7.1.el8_10.x86_64.rpm
gcc-toolset-14-gcc-plugin-annobinx86_647.1.el8_10gcc-toolset-14-gcc-plugin-annobin-14.2.1-7.1.el8_10.x86_64.rpm
gcc-toolset-14-gcc-plugin-develx86_647.1.el8_10gcc-toolset-14-gcc-plugin-devel-14.2.1-7.1.el8_10.x86_64.rpm
gcc-toolset-14-libasan-develx86_647.1.el8_10gcc-toolset-14-libasan-devel-14.2.1-7.1.el8_10.x86_64.rpm
gcc-toolset-14-libatomic-develx86_647.1.el8_10gcc-toolset-14-libatomic-devel-14.2.1-7.1.el8_10.x86_64.rpm
gcc-toolset-14-libgccjitx86_647.1.el8_10gcc-toolset-14-libgccjit-14.2.1-7.1.el8_10.x86_64.rpm
gcc-toolset-14-libgccjit-develx86_647.1.el8_10gcc-toolset-14-libgccjit-devel-14.2.1-7.1.el8_10.x86_64.rpm
gcc-toolset-14-libitm-develx86_647.1.el8_10gcc-toolset-14-libitm-devel-14.2.1-7.1.el8_10.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 6.9
ubuntu
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.1
redhat
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
nvd
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
debian
около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, pa ...

rocky
4 месяца назад

Moderate: gcc-toolset-13-gcc security update