MiracleLinux 3 : gcc-4.1.2-50.0.1 (AXSA:2011-05:01)

high Nessus Plugin ID 283930

Synopsis

The remote MiracleLinux host is missing one or more security updates.

Description

The remote MiracleLinux 3 host has packages installed that are affected by multiple vulnerabilities as referenced in the AXSA:2011-05:01 advisory.

The gcc package contains the GNU Compiler Collection version 4.1.
You will need this package in order to compile C code.
Security issues fixed with this release:
CVE-2010-0831 Directory traversal vulnerability in the extract_jar function in jartool.c in FastJar 0.98 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in a non-initial pathname component in a filename within a .jar archive, a related issue to CVE-2005-1080.
NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-3619.
CVE-2010-2322 Absolute path traversal vulnerability in the extract_jar function in jartool.c in FastJar 0.98 allows remote attackers to create or overwrite arbitrary files via a full pathname for a file within a .jar archive, a related issue to CVE-2010-0831.
NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-3619.
Fixed bugs:
- Added the -print-multi-os-directory option to the gcc(1) man page.
- An internal assertion in the compiler tried to check that a C++ static data member is external which resulted in errors. This was because when the compiler optimizes C++ anonymous namespaces the declarations were no longer marked external as everything on anonymous namespaces is local to the current translation.
This update corrects the assertion to resolve this issue.
- Compiling certain .cpp files could result in an internal compiler error; this has been fixed.
- PrintServiceLookup.lookupPrintServices with an appropriate DocFlavor failed to return a list of printers under gcj; this has been fixed by backporting a patch to correct this bug in the printer lookup service.
- GCC would not build against xulrunner-devel-1.9.2. This update removes gcjwebplugin from the GCC RPM.
- When a SystemTap generated kernel module was compiled, gcc would report an internal compiler error and get a segmentation fault. This has been fixed by a patch that, instead of crashing, assumes it can point to anything.
- There was a performance issue with libstdc++ regarding all objects derived from or using std::streambuf because of lock contention between threads. This patch ensures reload uses the same value from _S_global for the comparison, _M_add_reference () and _M_impl member of the class.

Tenable has extracted the preceding description block directly from the MiracleLinux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://tsn.miraclelinux.com/en/node/1683

Plugin Details

Severity: High

ID: 283930

File Name: miracle_linux_AXSA-2011-05.nasl

Version: 1.1

Type: local

Published: 1/14/2026

Updated: 1/14/2026

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

Vendor

Vendor Severity: High

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.5

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P

CVSS Score Source: CVE-2010-0831

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2010-2322

Vulnerability Information

CPE: p-cpe:/a:miracle:linux:gcc-c%2b%2b, p-cpe:/a:miracle:linux:libgfortran, p-cpe:/a:miracle:linux:gcc, p-cpe:/a:miracle:linux:libstdc%2b%2b-devel, p-cpe:/a:miracle:linux:libstdc%2b%2b, p-cpe:/a:miracle:linux:libgcc, p-cpe:/a:miracle:linux:gcc-gfortran, p-cpe:/a:miracle:linux:cpp, p-cpe:/a:miracle:linux:gcc-objc, p-cpe:/a:miracle:linux:libgnat, p-cpe:/a:miracle:linux:libobjc, p-cpe:/a:miracle:linux:gcc-gnat, cpe:/o:miracle:linux:3, p-cpe:/a:miracle:linux:gcc-java, p-cpe:/a:miracle:linux:libmudflap, p-cpe:/a:miracle:linux:libgcj-devel, p-cpe:/a:miracle:linux:libgcj, p-cpe:/a:miracle:linux:libmudflap-devel

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/MiracleLinux/release, Host/MiracleLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/20/2011

Vulnerability Publication Date: 6/8/2010

Reference Information

CVE: CVE-2010-0831, CVE-2010-2322