FEDORA-2022-61cf1c64f6
Packages in this update:
uboot-tools-2022.04-2.fc36
Update description:
uboot-tools-2022.04-2:
Fixes for Pine64 Pinebook Pro
Fix for CVE-2022-30767 (NFSv2)
Fix for CVE-2018-25032 (zlib)
uboot-tools-2022.04-2.fc36
uboot-tools-2022.04-2:
Fixes for Pine64 Pinebook Pro
Fix for CVE-2022-30767 (NFSv2)
Fix for CVE-2018-25032 (zlib)
Multiple security issues were discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.
Two vulnerabilities were discovered in the containerd container
runtime, which could result in denial of service or incomplete restriction
of capabilities.
collectd-5.12.0-16.fc36
qemu-6.2.0-12.fc36
xen-4.16.1-2.fc36
stop building for ix86 and armv7hl due to missing build dependency
x86 pv: Race condition in typeref acquisition [XSA-401, CVE-2022-26362]
x86 pv: Insufficient care with non-coherent mappings [ XSA-402,
CVE-2022-26363, CVE-2022-26364]
Split qemu-user-static into per-arch subpackages (bz 2061584)
golang-github-docker-libnetwork-0.8.0-18.20220610gitf6ccccb.fc35
moby-engine-20.10.17-2.fc35
https://github.com/moby/moby/releases/tag/v20.10.17
Includes updates to bundled libraries that fix CVEs.
Bump to f6ccccb1c082a432c2a5814aaedaca56af33d9ea
golang-github-docker-libnetwork-0.8.0-17.20220610gitf6ccccb.fc36
moby-engine-20.10.17-2.fc36
https://github.com/moby/moby/releases/tag/v20.10.17
Includes updates to bundled libraries that fix CVEs.
Bump to f6ccccb1c082a432c2a5814aaedaca56af33d9ea
A vulnerability has been found in SICUNET Access Controller 0.32-05z and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument c leads to privilege escalation. The attack can be launched remotely.
A vulnerability was found in SICUNET Access Controller 0.32-05z and classified as critical. Affected by this issue is some unknown functionality of the file card_scan_decoder.php. The manipulation of the argument No/door leads to privilege escalation. The attack may be launched remotely.
A vulnerability was found in SICUNET Access Controller 0.32-05z. It has been classified as very critical. This affects an unknown part. The manipulation leads to weak authentication. It is possible to initiate the attack remotely.
A vulnerability was found in SICUNET Access Controller 0.32-05z. It has been declared as problematic. This vulnerability affects unknown code of the component Password Storage. The manipulation leads to weak encryption. Attacking locally is a requirement.