Release date:
2025-11-17 22:29:56 UTC
Description:
* SECURITY UPDATE: Privilege chaining vulnerability
- debian/patches/CVE-2019-3843.patch: introduce functionality
for blocking chmod() for suid/sgid files with new unit
setting RestrictSUIDSGID=
- CVE-2019-3843
* SECURITY UPDATE: Privilege chaining vulnerability
- debian/patches/CVE-2019-3844.patch: imply NNP and SUID/SGID
restriction for DynamicUser=yes service
- CVE-2019-3844
Updated packages:
-
libnss-myhostname_241-7~deb10u10+tuxcare.els1_amd64.deb
sha:c93e46cd89482d3c53f148a719861a7187dfd1dd
-
libnss-mymachines_241-7~deb10u10+tuxcare.els1_amd64.deb
sha:c0ccd484177469975c5ce03d7a93497d5b0573b1
-
libnss-resolve_241-7~deb10u10+tuxcare.els1_amd64.deb
sha:975b748e22bbe1705eedb8e80ab445be218f5254
-
libnss-systemd_241-7~deb10u10+tuxcare.els1_amd64.deb
sha:5c00a018c6fffcbf7076b40a49278eb5d6763116
-
libpam-systemd_241-7~deb10u10+tuxcare.els1_amd64.deb
sha:fc5a6842739d0190acaf3db471910746d25c3811
-
libsystemd-dev_241-7~deb10u10+tuxcare.els1_amd64.deb
sha:ff379d8e785baf4718190b94358bc882a427d5af
-
libsystemd0_241-7~deb10u10+tuxcare.els1_amd64.deb
sha:a98bfb7981cff195f6f626906897634ec2c5038e
-
libudev-dev_241-7~deb10u10+tuxcare.els1_amd64.deb
sha:f370bd0cf41fc303c4d059ecb2246dedb52ff94e
-
libudev1_241-7~deb10u10+tuxcare.els1_amd64.deb
sha:ae252555b09f60b5fd30354556a5cf6ba4354926
-
systemd_241-7~deb10u10+tuxcare.els1_amd64.deb
sha:c9e1287f3f72664f0278094822e5ed295a182a11
-
systemd-container_241-7~deb10u10+tuxcare.els1_amd64.deb
sha:e6c312927461ec4c46ef9d6f0b4a2015315648b8
-
systemd-coredump_241-7~deb10u10+tuxcare.els1_amd64.deb
sha:4feb70e8d3ef2a25585a958674cae86c96336655
-
systemd-journal-remote_241-7~deb10u10+tuxcare.els1_amd64.deb
sha:76d7f7eb751f67db26a0254c17cc3c6601320c0a
-
systemd-sysv_241-7~deb10u10+tuxcare.els1_amd64.deb
sha:8c343ffc8a3b1cca61e2d6cd265f6a0af6381e30
-
systemd-tests_241-7~deb10u10+tuxcare.els1_amd64.deb
sha:512e6b6db4a15603c23eac430559779355c8b2c6
-
udev_241-7~deb10u10+tuxcare.els1_amd64.deb
sha:0cb720ab21ed8146d4c0d4f286cce9055f4d4a50
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.