[CLSA-2024:1711562715] systemd: Fix of CVE-2023-26604
Type:
security
Severity:
None
Release date:
2024-03-27 18:05:17 UTC
Description:
- Moved tuxcare patches from 219-78.7.tuxcare.els1 - CVE-2023-26604: use only less as a pager and restrict its functionality (e.g stop running external shell) unless environment variable SYSTEMD_PAGERSECURE is defined
Updated packages:
  • libgudev1-219-78.el7_9.9.tuxcare.els1.i686.rpm
    sha:600ffbbc531d9525d5e6d75c82becd8cccc7624e
  • libgudev1-219-78.el7_9.9.tuxcare.els1.x86_64.rpm
    sha:443d73f6b44a0dc735e9e80891901ac88bbc6825
  • libgudev1-devel-219-78.el7_9.9.tuxcare.els1.i686.rpm
    sha:6c3f5ed36773f2c9bcacfa9efb496d42b5cf29d9
  • libgudev1-devel-219-78.el7_9.9.tuxcare.els1.x86_64.rpm
    sha:9fbd2eaed3fa1e2d3b85f071d8613c08851dee39
  • systemd-219-78.el7_9.9.tuxcare.els1.x86_64.rpm
    sha:97fc576af15f53a2f5b80576af0e90d2dc5e43da
  • systemd-devel-219-78.el7_9.9.tuxcare.els1.i686.rpm
    sha:33f697690762a0dffb5242db914d4b4e91917483
  • systemd-devel-219-78.el7_9.9.tuxcare.els1.x86_64.rpm
    sha:3a19be1a47e9471e4d22e06725368164b4f4f974
  • systemd-journal-gateway-219-78.el7_9.9.tuxcare.els1.x86_64.rpm
    sha:8125c44e813d3eda60e2aa7516ba6d8298484eab
  • systemd-libs-219-78.el7_9.9.tuxcare.els1.i686.rpm
    sha:c72e387afd05160e0bc5e0d75d7ddc2eabcb131e
  • systemd-libs-219-78.el7_9.9.tuxcare.els1.x86_64.rpm
    sha:9aaafca186a923a4a71a88ff84153f8e200616ea
  • systemd-networkd-219-78.el7_9.9.tuxcare.els1.x86_64.rpm
    sha:b5e05ef9e532d7367b42d9faab2c8f2802f4da2e
  • systemd-python-219-78.el7_9.9.tuxcare.els1.x86_64.rpm
    sha:a487989e9e3112d3390e9f22637f230e88691ebe
  • systemd-resolved-219-78.el7_9.9.tuxcare.els1.i686.rpm
    sha:c66136c8fb847c9450d65f836517efd52262c1c3
  • systemd-resolved-219-78.el7_9.9.tuxcare.els1.x86_64.rpm
    sha:8b068f8040965dc83c1d96ab57620301d696e83f
  • systemd-sysv-219-78.el7_9.9.tuxcare.els1.x86_64.rpm
    sha:782dd94fdf296da689b84ae79650205cb5031f1e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.