![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.870375 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Update for gcc RHSA-2011:0025-01 |
Resumen: | The remote host is missing an update for the 'gcc'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'gcc' package(s) announced via the referenced advisory. Vulnerability Insight: The gcc packages include C, C++, Java, Fortran, Objective C, and Ada 95 GNU compilers, along with related support libraries. The libgcj package provides fastjar, an archive tool for Java Archive (JAR) files. Two directory traversal flaws were found in the way fastjar extracted JAR archive files. If a local, unsuspecting user extracted a specially-crafted JAR file, it could cause fastjar to overwrite arbitrary files writable by the user running fastjar. (CVE-2010-0831, CVE-2010-2322) This update also fixes the following bugs: * The option -print-multi-os-directory in the gcc --help output is not in the gcc(1) man page. This update applies an upstream patch to amend this. (BZ#529659) * An internal assertion in the compiler tried to check that a C++ static data member is external which resulted in errors. This was because when the compiler optimizes C++ anonymous namespaces the declarations were no longer marked external as everything on anonymous namespaces is local to the current translation. This update corrects the assertion to resolve this issue. (BZ#503565, BZ#508735, BZ#582682) * Attempting to compile certain .cpp files could have resulted in an internal compiler error. This update resolves this issue. (BZ#527510) * PrintServiceLookup.lookupPrintServices with an appropriate DocFlavor failed to return a list of printers under gcj. This update includes a backported patch to correct this bug in the printer lookup service. (BZ#578382) * GCC would not build against xulrunner-devel-1.9.2. This update removes gcjwebplugin from the GCC RPM. (BZ#596097) * When a SystemTap generated kernel module was compiled, gcc reported an internal compiler error and gets a segmentation fault. This update applies a patch that, instead of crashing, assumes it can point to anything. (BZ#605803) * There was a performance issue with libstdc++ regarding all objects derived from or using std::streambuf because of lock contention between threads. This patch ensures reload uses the same value from _S_global for the comparison, _M_add_reference () and _M_impl member of the class. (BZ#635708) All gcc users should upgrade to these updated packages, which contain backported patches to correct these issues. Affected Software/OS: gcc on Red Hat Enterprise Linux (v. 5 server) Solution: Please Install the Updated Packages. CVSS Score: 5.8 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2010-0831 BugTraq ID: 41006 http://www.securityfocus.com/bid/41006 http://security.gentoo.org/glsa/glsa-201209-21.xml http://www.mandriva.com/security/advisories?name=MDVSA-2010:122 http://marc.info/?l=oss-security&m=127602731712034&w=2 http://marc.info/?l=oss-security&m=127603032617644&w=2 http://marc.info/?l=oss-security&m=127602564508766&w=2 http://www.osvdb.org/65467 http://www.redhat.com/support/errata/RHSA-2011-0025.html http://secunia.com/advisories/42892 http://secunia.com/advisories/50786 http://www.vupen.com/english/advisories/2010/1553 http://www.vupen.com/english/advisories/2011/0121 Common Vulnerability Exposure (CVE) ID: CVE-2010-2322 BugTraq ID: 41009 http://www.securityfocus.com/bid/41009 |
Copyright | Copyright (C) 2011 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |