The installation of RTI Bypass Blockset includes the GNU Compiler Collection library in version 4.8.2. There are potential security vulnerabilities in this version.
The following vulnerabilities are associated with the components.
A detailed description of the CVE's can be found here.
Database |
CVE |
Score |
Classification |
NVD |
CVE-2018-12886 |
8.1 |
High |
NVD |
CVE-2021-37322 |
2 7.8 |
High |
NVD |
CVE-2019-15847 |
7.5 |
High |
NVD |
CVE-2015-5276 |
5 |
Medium |
NVD |
CVE-2023-4039 |
4.8 |
Medium |
RTI Bypass Blockset 2022-A
The provided script removes the GCC 4.8.2 compiler from the system.
The script must be executed after the installation of the basic software and after the installation of service packs and patches. If a recovery/repair is carried out, the components are automatically restored and the script must be executed again.
None
Date | 2024-01-08 |
Product | Compilers, RTI (Real-Time Interface), RTI Bypass Blockset |
Information Type | Notifications |
Information Category | Product Security, Troubleshooting |
dSPACE Release | 2022-A |
Drive innovation forward. Always on the pulse of technology development.
Subscribe to our expert knowledge. Learn from our successful project examples. Keep up to date on simulation and validation. Subscribe to/manage dSPACE direct and aerospace & defense now.