[ALSA-2021:4585] Moderate: gcc-toolset-10-gcc security update
Type:
security
Severity:
moderate
Release date:
2021-11-12
Description:
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Security Fix(es): * Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574) The following changes were introduced in gcc in order to facilitate detection of BiDi Unicode characters: This update implements a new warning option -Wbidirectional to warn about possibly dangerous bidirectional characters. There are three levels of warning supported by gcc: "-Wbidirectional=unpaired", which warns about improperly terminated BiDi contexts. (This is the default.) "-Wbidirectional=none", which turns the warning off. "-Wbidirectional=any", which warns about any use of bidirectional characters. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
References:
Updated packages:
  • gcc-toolset-10-libubsan-devel-10.3.1-1.2.el8_5.x86_64.rpm
  • gcc-toolset-10-gcc-gfortran-10.3.1-1.2.el8_5.x86_64.rpm
  • gcc-toolset-10-libstdc++-devel-10.3.1-1.2.el8_5.x86_64.rpm
  • gcc-toolset-10-gcc-10.3.1-1.2.el8_5.x86_64.rpm
  • gcc-toolset-10-gcc-plugin-devel-10.3.1-1.2.el8_5.x86_64.rpm
  • gcc-toolset-10-libquadmath-devel-10.3.1-1.2.el8_5.x86_64.rpm
  • gcc-toolset-10-liblsan-devel-10.3.1-1.2.el8_5.x86_64.rpm
  • gcc-toolset-10-libtsan-devel-10.3.1-1.2.el8_5.x86_64.rpm
  • gcc-toolset-10-gcc-c++-10.3.1-1.2.el8_5.x86_64.rpm
  • gcc-toolset-10-libstdc++-docs-10.3.1-1.2.el8_5.x86_64.rpm
  • gcc-toolset-10-libasan-devel-10.3.1-1.2.el8_5.x86_64.rpm
  • gcc-toolset-10-libitm-devel-10.3.1-1.2.el8_5.x86_64.rpm
  • gcc-toolset-10-libatomic-devel-10.3.1-1.2.el8_5.x86_64.rpm
  • gcc-toolset-10-gcc-gdb-plugin-10.3.1-1.2.el8_5.x86_64.rpm
  • gcc-toolset-10-libtsan-devel-10.3.1-1.2.el8_5.aarch64.rpm
  • gcc-toolset-10-gcc-10.3.1-1.2.el8_5.aarch64.rpm
  • gcc-toolset-10-gcc-plugin-devel-10.3.1-1.2.el8_5.aarch64.rpm
  • gcc-toolset-10-libatomic-devel-10.3.1-1.2.el8_5.aarch64.rpm
  • gcc-toolset-10-libstdc++-docs-10.3.1-1.2.el8_5.aarch64.rpm
  • gcc-toolset-10-gcc-gdb-plugin-10.3.1-1.2.el8_5.aarch64.rpm
  • gcc-toolset-10-libitm-devel-10.3.1-1.2.el8_5.aarch64.rpm
  • gcc-toolset-10-libasan-devel-10.3.1-1.2.el8_5.aarch64.rpm
  • gcc-toolset-10-liblsan-devel-10.3.1-1.2.el8_5.aarch64.rpm
  • gcc-toolset-10-gcc-gfortran-10.3.1-1.2.el8_5.aarch64.rpm
  • gcc-toolset-10-libubsan-devel-10.3.1-1.2.el8_5.aarch64.rpm
  • gcc-toolset-10-libstdc++-devel-10.3.1-1.2.el8_5.aarch64.rpm
  • gcc-toolset-10-gcc-c++-10.3.1-1.2.el8_5.aarch64.rpm
  • gcc-toolset-10-libstdc++-devel-10.3.1-1.2.el8_5.i686.rpm
  • gcc-toolset-10-libasan-devel-10.3.1-1.2.el8_5.i686.rpm
  • libasan6-10.3.1-1.2.el8_5.i686.rpm
  • gcc-toolset-10-libitm-devel-10.3.1-1.2.el8_5.i686.rpm
  • gcc-toolset-10-libubsan-devel-10.3.1-1.2.el8_5.i686.rpm
  • libasan6-10.3.1-1.2.el8_5.x86_64.rpm
  • gcc-toolset-10-libatomic-devel-10.3.1-1.2.el8_5.i686.rpm
  • gcc-toolset-10-libquadmath-devel-10.3.1-1.2.el8_5.i686.rpm
  • gcc-toolset-10-gcc-c++-10.3.1-1.2.el8_5.ppc64le.rpm
  • gcc-toolset-10-gcc-plugin-devel-10.3.1-1.2.el8_5.ppc64le.rpm
  • gcc-toolset-10-libitm-devel-10.3.1-1.2.el8_5.ppc64le.rpm
  • gcc-toolset-10-libstdc++-devel-10.3.1-1.2.el8_5.ppc64le.rpm
  • gcc-toolset-10-libatomic-devel-10.3.1-1.2.el8_5.ppc64le.rpm
  • gcc-toolset-10-libstdc++-docs-10.3.1-1.2.el8_5.ppc64le.rpm
  • gcc-toolset-10-libasan-devel-10.3.1-1.2.el8_5.ppc64le.rpm
  • gcc-toolset-10-gcc-gfortran-10.3.1-1.2.el8_5.ppc64le.rpm
  • gcc-toolset-10-gcc-gdb-plugin-10.3.1-1.2.el8_5.ppc64le.rpm
  • gcc-toolset-10-gcc-10.3.1-1.2.el8_5.ppc64le.rpm
  • gcc-toolset-10-libquadmath-devel-10.3.1-1.2.el8_5.ppc64le.rpm
  • gcc-toolset-10-liblsan-devel-10.3.1-1.2.el8_5.ppc64le.rpm
  • gcc-toolset-10-libubsan-devel-10.3.1-1.2.el8_5.ppc64le.rpm
  • gcc-toolset-10-libtsan-devel-10.3.1-1.2.el8_5.ppc64le.rpm
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.