Fedora 12 : gcc-4.4.4-10.fc12 / libtool-2.2.6-18.fc12.1 (2010-10640)

This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.


Synopsis :

The remote Fedora host is missing one or more security updates.

Description :

The remote Fedora host is missing one or more security updates :

gcc-4.4.4-10.fc12 :

- Wed Jun 30 2010 Jakub Jelinek <jakub at redhat.com>
4.4.4-10

- update from gcc-4_4-branch

- PRs fortran/43841, fortran/43843,
tree-optimization/44683

- fix qualified-id as template argument handling
(#605761, PR c++/44587)

- -Wunused-but-set-* static_cast fix (PR c++/44682)

- VTA backports

- PRs debug/44610, debug/44668, debug/44694

- unswitching fixes (PR middle-end/43866)

- Thu Jun 24 2010 Jakub Jelinek <jakub at redhat.com>
4.4.4-9

- update from gcc-4_4-branch

- PRs bootstrap/44426, bootstrap/44544, c++/44627,
fortran/44536, libgcj/44216, target/39690,
target/43740, target/44261, target/44481,
target/44534, target/44615, testsuite/32843,
testsuite/43739, tree-optimization/44508

- VTA backports

- PRs debug/43650, debug/44181, debug/44247

- -Wunused-but-set-* ->*/.* fix (PR c++/44619)

- undeprecate #ident and #sccs (#606069)

- fixup dates in generated man pages even for fastjar
and gcc/ man pages

- don't realign stack on x86/x86-64 just because a
DECL_ALIGN was set too high by expansion code
(#603924, PR target/44542)

- don't allow side-effects in inline-asm memory operands
unless < or > is present in operand's constraint
(#602359, PR middle-end/44492)

- Fri Jun 11 2010 Jakub Jelinek <jakub at redhat.com>
4.4.4-8

- update from gcc-4_4-branch

- fix demangler (PR other/43838)

- VTA backports

- further var-tracking speedup (#598310, PR debug/41371)

- for typedefs in non-template classes adjust underlying
type to emit proper debug info (#601893)

- fix up fastjar directory traversal bugs (CVE-2010-0831)

- Tue Jun 8 2010 Jakub Jelinek <jakub at redhat.com>
4.4.4-7

- update from gcc-4_4-branch

- PRs c++/43555, fortran/42900, fortran/44360,
libfortran/41169, libgcj/38251, libobjc/36610,
libstdc++/32499, pch/14940, rtl-optimization/39580,
target/44075, target/44169, target/44199

- VTA backports

- PRs debug/44367, debug/44375, rtl-optimization/44013,
tree-optimization/44182

- speed up var-tracking (#598310, PR debug/41371)

- -Wunused-but-set-* bugfixes

- PRs c++/44361, c++/44362, c++/44412, c++/44443,
c++/44444

- fix -mno-fused-madd -mfma4 on i?86/x86_64 (PR
target/44338)

- use GCJ_PROPERTIES=jdt.compiler.useSingleThread=true
when building classes with ecj1 (#524155)

- Tue May 25 2010 Jakub Jelinek <jakub at redhat.com>
4.4.4-5

- update from gcc-4_4-branch

- PRs bootstrap/43870, debug/44205, target/43733,
target/44074, target/44202, target/44245,
tree-optimization/43845

- fix cv-qual issue with function types (#593750, PR
c++/44193)

[plus 297 lines in the Changelog]

libtool-2.2.6-18.fc12.1 :

- Wed Jun 30 2010 Jakub Jelinek <jakub at redhat.com>
2.2.6-18.fc12.1

- rebuilt for gcc 4.4.4

- Thu Jan 21 2010 Jakub Jelinek <jakub at redhat.com>
2.2.6-18

- rebuilt for gcc 4.4.3

- Wed Dec 2 2009 Karsten Hopp <karsten at redhat.com>
2.2.6-17

- fix directory name used in libtool tarball

- Wed Dec 2 2009 Karsten Hopp <karsten at redhat.com>
2.2.6-16

- update to 2.2.6b, fixes CVE-2009-3736: libltdl may
load and execute code from a library in the current
directory

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

https://bugzilla.redhat.com/show_bug.cgi?id=594497
http://www.nessus.org/u?4b27a553
http://www.nessus.org/u?c8caae5a

Solution :

Update the affected gcc and / or libtool packages.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P)
CVSS Temporal Score : 5.0
(CVSS2#E:ND/RL:OF/RC:ND)
Public Exploit Available : true

Family: Fedora Local Security Checks

Nessus Plugin ID: 47612 (fedora_2010-10640.nasl)

Bugtraq ID: 37128
41006
41009

CVE ID: CVE-2010-0831
CVE-2010-2322

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now