FEDORA-2022-0d56cb7ee4
Packages in this update:
zabbix-6.0.8-1.fc37
Update description:
6.0.8, fixes CVE-2022-40626
zabbix-6.0.8-1.fc37
6.0.8, fixes CVE-2022-40626
IBM Maximo Asset Management 7.6.1.1 and 7.6.1.2 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 210163.
java-latest-openjdk-18.0.2.0.9-1.rolling.el9
July CPU update
java-latest-openjdk-18.0.2.0.9-1.rolling.el8
July CPU update
python3.11-3.11.0~rc2-1.fc36
Update Python to 3.11.0rc2. Contains security fix for CVE-2020-10735 and other bugfixes, see https://docs.python.org/3.11/whatsnew/changelog.html#python-3-11-0-release-candidate-2
freeipa-4.10.0-6.fc37
samba-4.17.0-1.fc37
Update to version 4.17.0
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This vulnerability allows remote attackers to execute arbitrary code on affected installations of NIKON NIS-Elements Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.