rpm package
suse/gcc9&distro=SUSE Linux Enterprise Module for Toolchain 12
pkg:rpm/suse/gcc9&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Toolchain%2012
Vulnerabilities (2)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2019-15847 | — | < 9.2.1+r275327-1.3.9 | 9.2.1+r275327-1.3.9 | Sep 2, 2019 | The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For exam | ||
| CVE-2019-14250 | — | < 9.2.1+r275327-1.3.9 | 9.2.1+r275327-1.3.9 | Jul 24, 2019 | An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow. |
- CVE-2019-15847Sep 2, 2019affected < 9.2.1+r275327-1.3.9fixed 9.2.1+r275327-1.3.9
The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For exam
- CVE-2019-14250Jul 24, 2019affected < 9.2.1+r275327-1.3.9fixed 9.2.1+r275327-1.3.9
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.