Release date:
2026-04-24 18:43:48 UTC
Description:
- CVE-2022-3821: fix buffer-over-run in format_timespan
Updated packages:
-
libgudev1-219-78.el7_9.9.tuxcare.els3.i686.rpm
sha:54b2c9cacb0468d2c3de46dad08e2380a23b12a9813e29e5beefca725b2e587b
-
libgudev1-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:382904c5ac9be64fa1e43d6c5f9aa574c441799bd91b07a39c96d9659f446de2
-
libgudev1-devel-219-78.el7_9.9.tuxcare.els3.i686.rpm
sha:65f838caacd748cedb691bfca8c707704e3a243b07d81c4b996998642c86cbbd
-
libgudev1-devel-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:b8638ff5a511450469927689a1313d69c417f42a7cb0cef1c624205a315003a8
-
systemd-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:ca6eb8d67f18d5722e7c8cb4bf8e3238a01e65112548787e6e60b05b231331a2
-
systemd-devel-219-78.el7_9.9.tuxcare.els3.i686.rpm
sha:b4ba5884fae8d63b571e5aff8ac19aab9361274a285bb2c766f7769b615f5026
-
systemd-devel-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:298388afc42c30f532f485c4eb411ff6ad10097dbed2a327c6c82a2321040650
-
systemd-journal-gateway-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:9ec19c959da669d72f93508d65b5e20c590a89c14697bc94c70f48e3a044dfb9
-
systemd-libs-219-78.el7_9.9.tuxcare.els3.i686.rpm
sha:44db0b2d1189b5d5fedfb0f18ac36ea379c337babf94e54835c7e19f6e3691ce
-
systemd-libs-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:bc56e6c06ba0d147193f6c20940ad2a28ebc3d20d67c7d4b401ff73a8ee3ab1d
-
systemd-networkd-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:2fa3a40d0fab5cdd76a4dd199fbefec3cba5e5f9e21fa676e688016250cfb549
-
systemd-python-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:3010d25724e2709e55907250085a3b6cf8e2f0c4481507284dc40817c37ce2c6
-
systemd-resolved-219-78.el7_9.9.tuxcare.els3.i686.rpm
sha:e986922508ff35bc63554c739070a952d281c19beae96a4056a953065f6f5fbf
-
systemd-resolved-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:e4f758afd3a4353c02f802250c119b4cc6e2ce4ffa698cc3da4aa670961c32d6
-
systemd-sysv-219-78.el7_9.9.tuxcare.els3.x86_64.rpm
sha:daf1844e5f011d383419eb0871707e71a1af9d79eff7f43335b2c7bbb9f7ea9a
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.