First published: Mon Feb 17 2025(Updated: )
Moderate: gcc security update
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux Server | ||
redhat/gcc | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/cpp | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/gcc | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/gcc-base-debuginfo | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/gcc-base-debuginfo | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/gcc-debuginfo | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/gcc-debuginfo | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/gcc-gfortran | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/gcc-gnat | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/gcc-go | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/gcc-objc | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/gcc-plugin-devel | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libasan | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libasan | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libasan-static | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libasan-static | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libatomic | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libatomic | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libatomic-static | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libatomic-static | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libgcc | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libgcc | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libgfortran | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libgfortran | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libgfortran-static | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libgfortran-static | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libgnat | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libgnat | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libgnat-devel | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libgnat-devel | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libgnat-static | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libgnat-static | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libgo | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libgo | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libgo-devel | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libgo-devel | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libgo-static | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libgo-static | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libgomp | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libgomp | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libitm | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libitm | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libitm-devel | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libitm-devel | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libitm-static | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libitm-static | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libmudflap | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libmudflap | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libmudflap-devel | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libmudflap-devel | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libmudflap-static | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libmudflap-static | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libobjc | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libobjc | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libquadmath | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libquadmath | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libquadmath-devel | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libquadmath-devel | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libquadmath-static | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libquadmath-static | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libtsan | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
redhat/libtsan-static | <4.8.5-40.el7_7 | 4.8.5-40.el7_7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:1580 is classified as moderate.
To fix RHSA-2025:1580, update the affected gcc and related packages to version 4.8.5-40.el7_7.
RHSA-2025:1580 affects various Red Hat Enterprise Linux Server products and their associated gcc packages.
The security fix in RHSA-2025:1580 addresses untrusted code execution issues via the <option> tag in HTML.
It is advisable to apply the recommended updates for RHSA-2025:1580 to maintain system security and mitigate potential vulnerabilities.