Lucene search

K
suseSuseOPENSUSE-SU-2020:0716-1
HistoryMay 26, 2020 - 12:00 a.m.

Security update for gcc9 (moderate)

2020-05-2600:00:00
lists.opensuse.org
72

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

An update that solves two vulnerabilities and has 8 fixes
is now available.

Description:

This update includes the GNU Compiler Collection 9.

This update ships the GCC 9.3 release.

A full changelog is provided by the GCC team on:

  https://www.gnu.org/software/gcc/gcc-9/changes.html

The base system compiler libraries libgcc_s1, libstdc++6 and others are
now built by the gcc 9 packages.

To use it, install “gcc9” or “gcc9-c++” or other compiler brands and use
CC=gcc-9 / CXX=g+±9 during configuration for using it.

Security issues fixed:

  • CVE-2019-15847: Fixed a miscompilation in the POWER9 back end, that
    optimized multiple calls of the __builtin_darn intrinsic into a single
    call. (bsc#1149145)
  • CVE-2019-14250: Fixed a heap overflow in the LTO linker. (bsc#1142649)

Non-security issues fixed:

  • Split out libstdc++ pretty-printers into a separate package
    supplementing gdb and the installed runtime. (bsc#1135254)
  • Fixed miscompilation for vector shift on s390. (bsc#1141897)
  • Includes a fix for Internal compiler error when building HepMC
    (bsc#1167898)
  • Includes fix for binutils version parsing
  • Add libstdc++6-pp provides and conflicts to avoid file conflicts with
    same minor version of libstdc++6-pp from gcc10.
  • Add gcc9 autodetect -g at lto link (bsc#1149995)
  • Install go tool buildid for bootstrapping go

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.1:

    zypper in -t patch openSUSE-2020-716=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.1noarch< - openSUSE Leap 15.1 (noarch):- openSUSE Leap 15.1 (noarch):.noarch.rpm
openSUSE Leap15.1x86_64< - openSUSE Leap 15.1 (x86_64):- openSUSE Leap 15.1 (x86_64):.x86_64.rpm

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N