Release date:
2023-07-06 21:26:39 UTC
Description:
* SECURITY UPDATE: local privilege escalation for some Sudo configurations
- debian/patches/CVE-2023-26604.patch: set LESSSECURE to 1
- CVE-2023-26604
* test issue: udev-test.pl is stopped by a timeout in a virtual environment
- debian/patches/fix-udev-test.patch: skip this test in some cases
Updated packages:
-
libnss-myhostname_237-3ubuntu10.57+tuxcare.els1_amd64.deb
sha:db670d1dd5a79aaa3191b8af974b2c1264b0b00d
-
libnss-mymachines_237-3ubuntu10.57+tuxcare.els1_amd64.deb
sha:fa88b2b08cda0129c7ed7e52ab5d3bdef5c3be9e
-
libnss-resolve_237-3ubuntu10.57+tuxcare.els1_amd64.deb
sha:84d9042dbcd7101ac9acfb418dcbcde3cf273e06
-
libnss-systemd_237-3ubuntu10.57+tuxcare.els1_amd64.deb
sha:54733295e6a372e8d5e0b3a6b087b4bdf62c9f7e
-
libpam-systemd_237-3ubuntu10.57+tuxcare.els1_amd64.deb
sha:bd1264168b2340da1ba0bec0d04514ee9fb9c9d7
-
libsystemd-dev_237-3ubuntu10.57+tuxcare.els1_amd64.deb
sha:2e89d4c4aa6da5312394f5193653e7824ce9d5a7
-
libsystemd0_237-3ubuntu10.57+tuxcare.els1_amd64.deb
sha:b83a7634225a4583732e3dbfb49858a824ccfc33
-
libudev-dev_237-3ubuntu10.57+tuxcare.els1_amd64.deb
sha:6367ebed0a2ce9add948ee1a99c67b31d3c459f7
-
libudev1_237-3ubuntu10.57+tuxcare.els1_amd64.deb
sha:f4f82cc5f100df10af8544e7f642579ad63c3e92
-
systemd_237-3ubuntu10.57+tuxcare.els1_amd64.deb
sha:68cee5a96e2c2d841869a8c43781c5a6e07bdd24
-
systemd-container_237-3ubuntu10.57+tuxcare.els1_amd64.deb
sha:43db1681d892d93d7a8f10f7f87730911c58d265
-
systemd-coredump_237-3ubuntu10.57+tuxcare.els1_amd64.deb
sha:189195589b3bc44e73a1b32d70e769371b2ac7eb
-
systemd-journal-remote_237-3ubuntu10.57+tuxcare.els1_amd64.deb
sha:846dd16a30c6f8db38d2b535c73dec5e6f306afb
-
systemd-sysv_237-3ubuntu10.57+tuxcare.els1_amd64.deb
sha:ce7c23e065b87a535cc156b7f87ab7fa7c7ae99d
-
systemd-tests_237-3ubuntu10.57+tuxcare.els1_amd64.deb
sha:54a48d3c2679fac4c61858067acc409adce8891b
-
udev_237-3ubuntu10.57+tuxcare.els1_amd64.deb
sha:e9943a1718f761ec09bb4b7293f95dc5107776ca
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.