[ALSA-2021:4587] Moderate: gcc security update
Type:
security
Severity:
moderate
Release date:
2021-11-18
Description:
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Security Fix(es): * Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574) The following changes were introduced in gcc in order to facilitate detection of BiDi Unicode characters: This update implements a new warning option -Wbidirectional to warn about possibly dangerous bidirectional characters. There are three levels of warning supported by gcc: "-Wbidirectional=unpaired", which warns about improperly terminated BiDi contexts. (This is the default.) "-Wbidirectional=none", which turns the warning off. "-Wbidirectional=any", which warns about any use of bidirectional characters. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
References:
Updated packages:
  • libstdc++-docs-8.5.0-4.el8_5.alma.x86_64.rpm
  • libstdc++-devel-8.5.0-4.el8_5.alma.x86_64.rpm
  • libquadmath-devel-8.5.0-4.el8_5.alma.i686.rpm
  • gcc-c++-8.5.0-4.el8_5.alma.x86_64.rpm
  • libstdc++-devel-8.5.0-4.el8_5.alma.i686.rpm
  • gcc-offload-nvptx-8.5.0-4.el8_5.alma.x86_64.rpm
  • gcc-gdb-plugin-8.5.0-4.el8_5.alma.x86_64.rpm
  • gcc-8.5.0-4.el8_5.alma.x86_64.rpm
  • libquadmath-devel-8.5.0-4.el8_5.alma.x86_64.rpm
  • gcc-gdb-plugin-8.5.0-4.el8_5.alma.i686.rpm
  • libitm-devel-8.5.0-4.el8_5.alma.x86_64.rpm
  • libitm-devel-8.5.0-4.el8_5.alma.i686.rpm
  • cpp-8.5.0-4.el8_5.alma.x86_64.rpm
  • gcc-gfortran-8.5.0-4.el8_5.alma.x86_64.rpm
  • gcc-plugin-devel-8.5.0-4.el8_5.alma.x86_64.rpm
  • libstdc++-static-8.5.0-4.el8_5.alma.i686.rpm
  • libstdc++-static-8.5.0-4.el8_5.alma.x86_64.rpm
  • gcc-plugin-devel-8.5.0-4.el8_5.alma.i686.rpm
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.