RTI Bypass Blockset - GCC 4.8.2

Problem Description

The installation of RTI Bypass Blockset includes the GNU Compiler Collection library in version 4.8.2. There are potential security vulnerabilities in this version.

Connected CVE's

The following vulnerabilities are associated with the components.

A detailed description of the CVE's can be found here.

 

Database
CVE
Score
Classification
NVD 

CVE-2018-12886

 8.1

High

NVD 

CVE-2021-37322

2 7.8

High

NVD 

CVE-2019-15847

 7.5

High

NVD 

CVE-2015-5276

 5

Medium

NVD 

CVE-2023-4039

 4.8

Medium

 

Affected Products / Affected Versions

RTI Bypass Blockset 2022-A

Solution

The provided script removes the GCC 4.8.2 compiler from the system.

The script must be executed after the installation of the basic software and after the installation of service packs and patches. If a recovery/repair is carried out, the components are automatically restored and the script must be executed again.

Limitations

None

  • rtibypassblockset_remove_gcc4.8.2.ps1.zip ZIP, 0.8 KB
Tags
Date 2024-01-08
Product Compilers, RTI (Real-Time Interface), RTI Bypass Blockset
Information Type Notifications
Information Category Product Security, Troubleshooting
dSPACE Release 2022-A

Drive innovation forward. Always on the pulse of technology development.

Subscribe to our expert knowledge. Learn from our successful project examples. Keep up to date on simulation and validation. Subscribe to/manage dSPACE direct and aerospace & defense now.

Enable form call

At this point, an input form from Click Dimensions is integrated. This enables us to process your newsletter subscription. The form is currently hidden due to your privacy settings for our website.

External input form

By activating the input form, you consent to personal data being transmitted to Click Dimensions within the EU, in the USA, Canada or Australia. More on this in our privacy policy.