Release date:
2025-09-16 16:25:52 UTC
Description:
- CVE-2022-1941: fix parsing vulnerability in MessageSet type to prevent out of
memory failures and DoS attacks
Updated packages:
-
protobuf-3.14.0-13.el9.tuxcare.els2.i686.rpm
sha:cd115bfd628b62a6dfcb4aa285dc6d450f6219af517d32e197c3e5d5dbc97926
-
protobuf-3.14.0-13.el9.tuxcare.els2.x86_64.rpm
sha:74d60738749d4d07b6c269f26ba7222bbf25e5469675e9de4601ea6dd7dfe41b
-
protobuf-compiler-3.14.0-13.el9.tuxcare.els2.i686.rpm
sha:e226b7610d262ca7085c5306e530956c531f8cbf16b3f930e8024062fb7a0147
-
protobuf-compiler-3.14.0-13.el9.tuxcare.els2.x86_64.rpm
sha:c185a9b538c5650f3445d2b513c7842309759b7275dd92990f4670ce2c510f2c
-
protobuf-devel-3.14.0-13.el9.tuxcare.els2.i686.rpm
sha:ec21bf24fd411e89a427453f64a9a37b72682901fe42c892d0ae8e4e2f975d55
-
protobuf-devel-3.14.0-13.el9.tuxcare.els2.x86_64.rpm
sha:574febae4f692586f7f06dc5731b08c9bbffdaf8016433a300f39f5e8df3f0ee
-
protobuf-emacs-3.14.0-13.el9.tuxcare.els2.noarch.rpm
sha:f7d8ca1b87a8f5863ff4781dab5f6c3be213e2083b3b936c164933e9b37ccfc1
-
protobuf-lite-3.14.0-13.el9.tuxcare.els2.i686.rpm
sha:b733163b7c18ac0e9cd007d89ad43ec19ebe08c9e84e4a9d167fd21a18e587fe
-
protobuf-lite-3.14.0-13.el9.tuxcare.els2.x86_64.rpm
sha:1ab460bb3326bbd67ab7144f3067828d5cef93636a772e0762d2bbf3ca50c6a1
-
protobuf-lite-devel-3.14.0-13.el9.tuxcare.els2.i686.rpm
sha:aa463ce4397a0b093c3b7a00fdb8af646c3b9fde010605804028d10f4861b118
-
protobuf-lite-devel-3.14.0-13.el9.tuxcare.els2.x86_64.rpm
sha:8273a9de1747bdf1ac5f8ec1811512f5bb9f8381e38dbb10d5c884b4a6938535
-
protobuf-lite-static-3.14.0-13.el9.tuxcare.els2.x86_64.rpm
sha:da23d6c4ff2aa9cbf1e7119268a4b3c45367110881a9472b2161ad23dbaba51b
-
protobuf-static-3.14.0-13.el9.tuxcare.els2.x86_64.rpm
sha:d65f3f95168e2975ebdd744c0df6e6bfb09038a7eba792142027f8266ec212af
-
protobuf-vim-3.14.0-13.el9.tuxcare.els2.noarch.rpm
sha:48322ab3cf8501a1ce208195296179ca7bac883d92007321a92e9aec9c3e54ec
-
python3-protobuf-3.14.0-13.el9.tuxcare.els2.noarch.rpm
sha:99b651a040bbd4d101a01fcb17485bcd27be47a28f2480541ed5ffa9dcd2cf2b
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.