[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2020:3749-1 -- SLES gcc7, cpp7, libada7, libgfortran4, libubsan0

ID: oval:org.secpod.oval:def:89002909Date: (C)2021-02-25   (M)2022-10-10
Class: PATCHFamily: unix




This update for gcc7 fixes the following issues: - CVE-2020-13844: Added mitigation for aarch64 Straight Line Speculation issue - Enable fortran for the nvptx offload compiler. - Update README.First-for.SuSE.packagers - avoid assembler errors with AVX512 gather and scatter instructions when using -masm=intel. - Backport the aarch64 -moutline-atomics feature and accumulated fixes but not its default enabling. [jsc#SLE-12209, bsc#1167939] - Fixed 32bit libgnat.so link. [bsc#1178675] - Fixed memcpy miscompilation on aarch64. [bsc#1178624, bsc#1178577] - Fixed debug line info for try/catch. [bsc#1178614] - Remove -mbranch-protection=standard when gcc7 is used to build gcc7 - Fixed corruption of pass private -gt;aux via DF. [gcc#94148] - Fixed debug information issue with inlined functions and passed by reference arguments. [gcc#93888] - Fixed binutils release date detection issue. - Fixed register allocation issue with exception handling code on s390x. [bsc#1161913] - Fixed miscompilation of some atomic code on aarch64. [bsc#1150164]

Platform:
SUSE Linux Enterprise Server 15
Product:
gcc7
cpp7
libada7
libgfortran4
libubsan0
Reference:
SUSE-SU-2020:3749-1
CVE-2020-13844
CVE    1
CVE-2020-13844
CPE    6
cpe:/a:gcc:gcc7
cpe:/a:cpp:cpp7
cpe:/o:suse:suse_linux_enterprise_server:15
cpe:/a:gcc:libada7
...

© SecPod Technologies