** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-4982. Reason: This candidate is a duplicate of CVE-2016-4982. Notes: All CVE users should reference CVE-2016-4982 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Category Archives: Advisories
webkit2gtk3-2.36.5-1.fc36
FEDORA-2022-057423bfbf
Packages in this update:
webkit2gtk3-2.36.5-1.fc36
Update description:
Add support for PAC proxy in the WebDriver implementation.
Fix video playback when loaded through custom URIs, this fixes video playback in the Yelp documentation browser.
Fix several crashes and rendering issues.
Security fixes: CVE-2022-32792, CVE-2022-32816
libldb-2.5.2-1.fc36 samba-4.16.4-0.fc36
FEDORA-2022-19600c9743
Packages in this update:
libldb-2.5.2-1.fc36
samba-4.16.4-0.fc36
Update description:
Update to version 4.16.4 to address security fixes for CVE-2022-32742, CVE-2022-32744, CVE-2022-32745, CVE-2022-32746
gnutls-3.7.7-1.fc35
FEDORA-2022-5470992bfc
Packages in this update:
gnutls-3.7.7-1.fc35
Update description:
Rebase gnutls to version 3.7.7
notes=Security fix for CVE-2022-2509
gnutls-3.7.7-1.fc36
FEDORA-2022-0156c442d0
Packages in this update:
gnutls-3.7.7-1.fc36
Update description:
Rebase gnutls to version 3.7.7
notes=Security fix for CVE-2022-2509
libldb-2.5.2-2.fc37 samba-4.16.4-0.fc37
FEDORA-2022-3fd94cef3e
Packages in this update:
libldb-2.5.2-2.fc37
samba-4.16.4-0.fc37
Update description:
Update to version 4.16.4 to address security fixes for CVE-2022-32742, CVE-2022-32744, CVE-2022-32745, CVE-2022-32746
thunderbird-91.12.0-1.fc35
FEDORA-2022-354e8e835e
Packages in this update:
thunderbird-91.12.0-1.fc35
Update description:
Update to 91.12.0 ;
https://www.mozilla.org/en-US/security/advisories/mfsa2022-31/
thunderbird-91.12.0-1.fc36
FEDORA-2022-a7fccdd7a0
Packages in this update:
thunderbird-91.12.0-1.fc36
Update description:
Update to 91.12.0 ;
https://www.mozilla.org/en-US/security/advisories/mfsa2022-31/
ZDI-22-1035: Autodesk Desktop App Link Following Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Autodesk Desktop App. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
ZDI-22-1034: Autodesk Desktop App Link Following Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Autodesk Desktop App. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.