FEDORA-EPEL-2022-d1317f7176
Packages in this update:
rubygem-git-1.3.0-2.el7
Update description:
Security fix for CVE-2022-25648
rubygem-git-1.3.0-2.el7
Security fix for CVE-2022-25648
rubygem-git-1.11.0-1.el8
Security fix for CVE-2022-25648
needrestart-3.6-1.el8
Security fix for CVE-2022-30688
needrestart-3.6-1.el7
Security fix for CVE-2022-30688
HCL Domino is affected by an Insufficient Access Control vulnerability. An authenticated attacker with local access to the system could exploit this vulnerability to attain escalation of privileges, denial of service, or information disclosure.
gron-0.6.1-2.fc34
Security fix for CVE-2022-28327
The affected ThroughTek P2P products (SDKs using versions before 3.1.5, any versions with nossl tag, device firmware not using AuthKey for IOTC conneciton, firmware using AVAPI module without enabling DTLS mechanism, and firmware using P2PTunnel or RDT module) do not sufficiently protect data transferred between the local device and ThroughTek servers. This can allow an attacker to access sensitive information, such as camera feeds.
Successful exploitation of this vulnerability for multiple Mitsubishi Electric Factory Automation Engineering Software Products of various versions could allow an attacker to escalate privilege and execute malicious programs, which could cause a denial-of-service condition, and allow information to be disclosed, tampered with, and/or destroyed.
A malicious attacker could exploit the interface of the Fieldcomm Group HART-IP (release 1.0.0.0) by constructing messages with sufficiently large payloads to overflow the internal buffer and crash the device, or obtain control of the device.