rpm package
suse/gcc7&distro=SUSE Linux Enterprise Server 12 SP5
pkg:rpm/suse/gcc7&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5
Vulnerabilities (4)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-4039 | — | < 7.5.0+r278197-13.1 | 7.5.0+r278197-13.1 | Sep 13, 2023 | **DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only | ||
| CVE-2020-13844 | — | < 7.5.0+r278197-13.1 | 7.5.0+r278197-13.1 | Jun 8, 2020 | Arm Armv8-A core implementations utilizing speculative execution past unconditional changes in control flow may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka "straight-line speculation." | ||
| CVE-2019-15847 | — | < 7.5.0+r278197-13.1 | 7.5.0+r278197-13.1 | Sep 2, 2019 | The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For exam | ||
| CVE-2019-14250 | — | < 7.5.0+r278197-13.1 | 7.5.0+r278197-13.1 | Jul 24, 2019 | An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow. |
- CVE-2023-4039Sep 13, 2023affected < 7.5.0+r278197-13.1fixed 7.5.0+r278197-13.1
**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only
- CVE-2020-13844Jun 8, 2020affected < 7.5.0+r278197-13.1fixed 7.5.0+r278197-13.1
Arm Armv8-A core implementations utilizing speculative execution past unconditional changes in control flow may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka "straight-line speculation."
- CVE-2019-15847Sep 2, 2019affected < 7.5.0+r278197-13.1fixed 7.5.0+r278197-13.1
The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For exam
- CVE-2019-14250Jul 24, 2019affected < 7.5.0+r278197-13.1fixed 7.5.0+r278197-13.1
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.