Release date:
2026-04-24 18:36:36 UTC
Description:
- CVE-2022-3821: fix buffer-over-run in format_timespan
Updated packages:
-
libgudev1-219-78.el7_9.9.tuxcare.els3.i686.rpm
sha:932da4063bd86b5029e199929a4fe580c1d57f660d999dd594e6019d1d81035c
-
libgudev1-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:26db792556801ce2355e5bc52dd235e556329b7e279cff8ad8b5513c36adcc6a
-
libgudev1-devel-219-78.el7_9.9.tuxcare.els3.i686.rpm
sha:ec119626fb25d17ab839d92c07dc88b1ed3a4a9d20d223f54efd340263cb02b1
-
libgudev1-devel-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:01e8e4543f5e2fefcab17f81112d7d25a11bbba8bdc88c320d6bb5c2eac530dc
-
systemd-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:e94bfa10ce944812bef11aabca9c2da053b6b792ce2ab665416655074de54157
-
systemd-devel-219-78.el7_9.9.tuxcare.els3.i686.rpm
sha:48de7e80662e242f53c022a33d5c9271f0dec8913e3bbaefe3a3cfe2cf2b4ee3
-
systemd-devel-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:0c019817363bf7e0220a423ee0561f91b87c2d6b9b010fd54d5e09d8bfe42dbf
-
systemd-journal-gateway-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:28db6d93f4821f1e0d1391d2c4677df6a10e17588ed77ebbd9ab0108f523d9a0
-
systemd-libs-219-78.el7_9.9.tuxcare.els3.i686.rpm
sha:54ff93e0167c39d52a044c8870312e6718834617c5ea9e7cc1871a6519a6a1db
-
systemd-libs-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:8c0ea8210517e3b41fd87ccb106a3bf4aed63e9381cd617c42cb6db3af1fa756
-
systemd-networkd-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:00fdcff16ea89d96cd87a4ae361cd5bdfc8fe5d0eeee461950c578e1a4e1b003
-
systemd-python-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:b0b4626ac35fcd12dd16ab0c10f6dcb2d73af5bd56f7b7ca3f804942b1d74ec2
-
systemd-resolved-219-78.el7_9.9.tuxcare.els3.i686.rpm
sha:ec47585f7632bc1348bb07fe3ef8006aa78d0f948a758d67d3ea7842f630762e
-
systemd-resolved-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:1182332944c44a2b44e07dd3da4e3fa67c76c0e2bfbaba43155d85f0da291910
-
systemd-sysv-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:37cb412cef5a6f91d0112c0fffb7be8b9d20737db85b76dd318b9f8b8ccdc75d
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.