Release date:
2024-07-16 10:06:06 UTC
Description:
- CVE-2021-35937: fix a possible privilege escalation through a symlink check
race condition
Updated packages:
-
python3-rpm-4.14.3-19.el8_5.tuxcare.els4.x86_64.rpm
sha:995b12b5a27049ecca5d4545f139fe6f22fde8ce
-
rpm-4.14.3-19.el8_5.tuxcare.els4.x86_64.rpm
sha:c389febc759ef82bf5f13c89b4cbf7f72fa8ceb6
-
rpm-apidocs-4.14.3-19.el8_5.tuxcare.els4.noarch.rpm
sha:96dc242f0973bda094532ea3128da2e22d964dc1
-
rpm-build-4.14.3-19.el8_5.tuxcare.els4.x86_64.rpm
sha:63bfb2b8f20e93e25173cfb05fed95e1743bae3e
-
rpm-build-libs-4.14.3-19.el8_5.tuxcare.els4.i686.rpm
sha:2b4515d4bbc7719c6a0af2a9573ecd9f9d41b730
-
rpm-build-libs-4.14.3-19.el8_5.tuxcare.els4.x86_64.rpm
sha:4f37a9740a4edea514b7c272c775488150815153
-
rpm-cron-4.14.3-19.el8_5.tuxcare.els4.noarch.rpm
sha:00c5133ba241956c3db639f1a308ef8305adc76b
-
rpm-devel-4.14.3-19.el8_5.tuxcare.els4.i686.rpm
sha:6096eae71b487184d935dad2d73fdb8407e1f823
-
rpm-devel-4.14.3-19.el8_5.tuxcare.els4.x86_64.rpm
sha:4358dd8061f6ef093770d3f67c471d77dcc0c117
-
rpm-libs-4.14.3-19.el8_5.tuxcare.els4.i686.rpm
sha:787a83520dff8c35162c67129bb0b3da8568a192
-
rpm-libs-4.14.3-19.el8_5.tuxcare.els4.x86_64.rpm
sha:218dfbb0ed7cccc664fe86869c56820a2cd7d6a5
-
rpm-plugin-fapolicyd-4.14.3-19.el8_5.tuxcare.els4.x86_64.rpm
sha:7ac88ae6ed3e051dd2be69a2fc8881e66e9711a0
-
rpm-plugin-ima-4.14.3-19.el8_5.tuxcare.els4.x86_64.rpm
sha:65f5b9a33251178b8c997eda6bf064b943deeb69
-
rpm-plugin-prioreset-4.14.3-19.el8_5.tuxcare.els4.x86_64.rpm
sha:fe979cb2985770a50604a98901ddd767f57633c2
-
rpm-plugin-selinux-4.14.3-19.el8_5.tuxcare.els4.x86_64.rpm
sha:0bac06b5731f77549da44ed9b410d1d5e080aeab
-
rpm-plugin-syslog-4.14.3-19.el8_5.tuxcare.els4.x86_64.rpm
sha:6974515fc544398ed38f9d5285abed1cfd84bdee
-
rpm-plugin-systemd-inhibit-4.14.3-19.el8_5.tuxcare.els4.x86_64.rpm
sha:fef4065c02d1d090892273d1f484b777981c04e2
-
rpm-sign-4.14.3-19.el8_5.tuxcare.els4.x86_64.rpm
sha:ce407f5b5fe993c6fc40559e4839ac5b7698470b
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.