Release date:
2026-04-25 08:39:15 UTC
Description:
- CVE-2022-3821: fix buffer-over-run in format_timespan
Updated packages:
-
libgudev1-219-78.el7_9.9.tuxcare.els3.i686.rpm
sha:9b2805a8435d965693979805af39af2667aead7236e0ca1df3c3cbe8d56c19ae
-
libgudev1-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:bc7ecc9578b261dece09b8750cc53448ecd8c183a9a6b1e3f5c5a0c9ac8e19b9
-
libgudev1-devel-219-78.el7_9.9.tuxcare.els3.i686.rpm
sha:a0c870c9679f801dde945597efed6bcfab65b429cf4076bd8fa22659749cc279
-
libgudev1-devel-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:cec202a33a2d5b6a7329391e1b4ce54b74173f911f8eca5dd5cdca9e9688a5a3
-
systemd-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:701a70e16a6c9993c62c81219dd1ea04554817f2b14f6908e1ca308f88a62d50
-
systemd-devel-219-78.el7_9.9.tuxcare.els3.i686.rpm
sha:d5b4262c67ca55d0bc2c618509d2db93a4bdf3068a278adfcd5abdc741d15061
-
systemd-devel-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:d3e7bca7779fad4ffff453a844da4443dff39da56ef4686a8c4e2b079fc9f121
-
systemd-journal-gateway-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:07522db1240920536e3f85c1b31ceb8b2ad6dc8d04b609f5e94d801945dd0022
-
systemd-libs-219-78.el7_9.9.tuxcare.els3.i686.rpm
sha:cc36785f2ccb16585902869755a18b799aa0276e71c57d171421cd116de00bee
-
systemd-libs-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:3f7f3820ee14bf9b4902f9a2d7d6cb5913e945de4f92f1b21d8e52c41eb9cfdc
-
systemd-networkd-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:a13d1e8333436096f0e78b80390cb2a33990328c6825234e2066158fb5fc0093
-
systemd-python-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:9dfe22ed57d1a73e2937d7d5dc3b637518d1c7d09d48c44a80bed691fa86c634
-
systemd-resolved-219-78.el7_9.9.tuxcare.els3.i686.rpm
sha:be6d884eaf1ef7bfb999ad33502be9a7ae158a9308419c0fbcf3f920eb87bb3c
-
systemd-resolved-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:b4438896d3754e13cbc80e4ba1c8c5b22d06e665ea5528203524e51ca7ddb381
-
systemd-sysv-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:8ab960a4ed554ffb930306fe3301cf0c84d07fe274cf4d4ab8def2de36285335
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.