FEDORA-2022-97b4ae7fb4
Packages in this update:
cups-2.3.3op2-18.fc34
Update description:
Security fix for CVE-2022-26691
cups-2.3.3op2-18.fc34
Security fix for CVE-2022-26691
cups-2.3.3op2-18.fc35
Security fix for CVE-2022-26691
cups-2.4.2-1.fc36
New release 2.4.2, fixes CVE-2022-26691
vim-8.2.5046-1.fc34
Security fixes for CVE-2022-1851, CVE-2022-1898, CVE-2022-1897, CVE-2022-1927
Joshua Mason discovered that CUPS incorrectly handled the secret key used
to access the administrative web interface. A remote attacker could
possibly use this issue to open a session as an administrator and execute
arbitrary code. (CVE-2022-26691)
It was discovered that CUPS incorrectly handled certain memory operations
when handling IPP printing. A remote attacker could possibly use this issue
to cause CUPS to crash, leading to a denial of service, or obtain sensitive
information. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04
LTS. (CVE-2019-8842, CVE-2020-10001)
vim-8.2.5046-1.fc35
Security fixes for CVE-2022-1851, CVE-2022-1898, CVE-2022-1897, CVE-2022-1927
vim-8.2.5046-1.fc36
Security fixes for CVE-2022-1851, CVE-2022-1898, CVE-2022-1897, CVE-2022-1927
A Buffer Overflow vulnerability in the RSTP server component of Eufy Indoor 2K Indoor Camera allows a local attacker to achieve remote code execution.
This issue affects:
Eufy Indoor 2K Indoor Camera
2.0.9.3 version and prior versions.
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of FreeBSD Kernel. Authentication is not required to exploit this vulnerability.
kernel-5.17.12-300.fc36
The 5.17.12 stable kernel update contains a number of important fixes across the tree.