Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.68716
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2011:0025
Summary:NOSUMMARY
Description:Description:
The remote host is missing updates announced in
advisory RHSA-2011:0025.

The gcc packages include C, C++, Java, Fortran, Objective C, and Ada 95 GNU
compilers, along with related support libraries. The libgcj package
provides fastjar, an archive tool for Java Archive (JAR) files.

Two directory traversal flaws were found in the way fastjar extracted JAR
archive files. If a local, unsuspecting user extracted a specially-crafted
JAR file, it could cause fastjar to overwrite arbitrary files writable by
the user running fastjar. (CVE-2010-0831, CVE-2010-2322)

This update also fixes the following bugs:

* The option -print-multi-os-directory in the gcc --help output is not in
the gcc(1) man page. This update applies an upstream patch to amend this.
(BZ#529659)

* An internal assertion in the compiler tried to check that a C++ static
data member is external which resulted in errors. This was because when the
compiler optimizes C++ anonymous namespaces the declarations were no longer
marked external as everything on anonymous namespaces is local to the
current translation. This update corrects the assertion to resolve this
issue. (BZ#503565, BZ#508735, BZ#582682)

* Attempting to compile certain .cpp files could have resulted in an
internal compiler error. This update resolves this issue. (BZ#527510)

* PrintServiceLookup.lookupPrintServices with an appropriate DocFlavor
failed to return a list of printers under gcj. This update includes a
backported patch to correct this bug in the printer lookup service.
(BZ#578382)

* GCC would not build against xulrunner-devel-1.9.2. This update removes
gcjwebplugin from the GCC RPM. (BZ#596097)

* When a SystemTap generated kernel module was compiled, gcc reported an
internal compiler error and gets a segmentation fault. This update applies
a patch that, instead of crashing, assumes it can point to anything.
(BZ#605803)

* There was a performance issue with libstdc++ regarding all objects
derived from or using std::streambuf because of lock contention between
threads. This patch ensures reload uses the same value from _S_global for
the comparison, _M_add_reference () and _M_impl member of the class.
(BZ#635708)

All gcc users should upgrade to these updated packages, which contain
backported patches to correct these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2011-0025.html

Risk factor : High

CVSS Score:
5.8

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-0831
BugTraq ID: 41006
http://www.securityfocus.com/bid/41006
http://security.gentoo.org/glsa/glsa-201209-21.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2010:122
http://marc.info/?l=oss-security&m=127602731712034&w=2
http://marc.info/?l=oss-security&m=127603032617644&w=2
http://marc.info/?l=oss-security&m=127602564508766&w=2
http://www.osvdb.org/65467
http://www.redhat.com/support/errata/RHSA-2011-0025.html
http://secunia.com/advisories/42892
http://secunia.com/advisories/50786
http://www.vupen.com/english/advisories/2010/1553
http://www.vupen.com/english/advisories/2011/0121
Common Vulnerability Exposure (CVE) ID: CVE-2010-2322
BugTraq ID: 41009
http://www.securityfocus.com/bid/41009
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.