FEDORA-2022-1cf6eefd62
Packages in this update:
openscad-2021.01-8.fc36
Update description:
Security fixes for CVE-2022-0496 and CVE-2022-0497
openscad-2021.01-8.fc36
Security fixes for CVE-2022-0496 and CVE-2022-0497
openscad-2021.01-8.fc37
Automatic update for openscad-2021.01-8.fc37.
* Tue Apr 5 2022 Lumír Balhar <lbalhar@redhat.com> – 2021.01-8
– Security fixes for CVE-2022-0496 and CVE-2022-0497
– Fixes: rhbz#2050696 rhbz#2050700
Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution within the context of a privileged process. Depending on the privileges associated with this application, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. If this application has been configured to have fewer user rights on the system, exploitation of the most severe of these vulnerabilities could have less impact than if it was configured with administrative rights.
It was discovered that Waitress incorrectly handled certain requests.
An attacker could possibly use this issue to expose sensitive information.
community-mysql-8.0.28-1.fc35
MySQL 8.0.28
Release notes:
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-28.html
community-mysql-8.0.28-1.fc34
MySQL 8.0.28
Release notes:
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-28.html
This vulnerability allows local attackers to execute arbitrary code on affected installations of Samsung Galaxy S21 phones. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Schneider Electric SCADAPack Workbench. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Schneider Electric SCADAPack Workbench. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Omron CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.