FEDORA-2022-45d2cfdfa4
Packages in this update:
mingw-python3-3.10.8-2.fc36
Update description:
Backport patch for CVE-2022-45061.
mingw-python3-3.10.8-2.fc36
Backport patch for CVE-2022-45061.
galera-26.4.13-1.fc36
mariadb-10.5.18-1.fc36
MariaDB 10.5.18 & Galera 26.4.13
Release notes:
galera-26.4.13-1.fc35
mariadb-10.5.18-1.fc35
MariaDB 10.5.18 & Galera 26.4.13
Release notes:
galera-26.4.13-1.fc37
mariadb-10.5.18-1.fc37
MariaDB 10.5.18 & Galera 26.4.13
Release notes:
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Teams. No user interaction is required if the attacker and target are in the same Teams organization.
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Teams. No user interaction is required if the attacker and target are in the same Teams organization.
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Teams. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
This vulnerability allows remote attackers to escalate privileges on affected installations of Microsoft Teams. An attacker must first obtain the ability to execute script within the application window in order to exploit this vulnerability.
This vulnerability allows remote attackers to escape the sandbox on affected installations of Microsoft Teams. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Teams. No user interaction is required if the attacker and target are in the same Teams organization and are both participants in a meeting.