Release date:
2025-09-12 07:50:14 UTC
Description:
- CVE-2024-50349: fix ANSI escape sequence vulnerability that occurs
when asking for credentials interactively
Updated packages:
-
git-2.43.0-1.el8.tuxcare.els8.x86_64.rpm
sha:25d4a0893c1b52ec955ea776b3ad45d67b87f5a80b387b674da935b3378c6755
-
git-all-2.43.0-1.el8.tuxcare.els8.noarch.rpm
sha:c4ad2f7b7299c1c851d933039849a24fb934301a90b1f5ca7ec85d3fe5ad7713
-
git-core-2.43.0-1.el8.tuxcare.els8.x86_64.rpm
sha:6876d9804f34b001618cfb58a07b37245d61cf7a1fca740cafbf8722a2a1dd3b
-
git-core-doc-2.43.0-1.el8.tuxcare.els8.noarch.rpm
sha:95a3b984ddb1b4a1e8d3ba19f15d93665f69df1aef202c826cee34379eb69fe4
-
git-credential-libsecret-2.43.0-1.el8.tuxcare.els8.x86_64.rpm
sha:5b0bbed74bd95da685a3beef0ba254079ee4c31624a48d941a52fdd8be6b8c87
-
git-daemon-2.43.0-1.el8.tuxcare.els8.x86_64.rpm
sha:97d892657179c1408f42c862603dda969e1b3cfdf0794b7347033cd1dba1e859
-
git-email-2.43.0-1.el8.tuxcare.els8.noarch.rpm
sha:2bc2aff167b81ba4235eaab15c85edcfe4a41c23759084b2cebfd998a67f7b2e
-
git-gui-2.43.0-1.el8.tuxcare.els8.noarch.rpm
sha:bddba49c625e5a5def26eaa31aa7ea5cef6ea62e74c08ae8b13fa70ee2bd1781
-
git-instaweb-2.43.0-1.el8.tuxcare.els8.noarch.rpm
sha:8fc9f9eb18c3027c5ebd4628693cab424042e15b98068409b2754f2747ffcc7b
-
git-subtree-2.43.0-1.el8.tuxcare.els8.x86_64.rpm
sha:1d43ee0574a84855cba77d7ce60c15501fa2311acaaaaa37467c355ddfa4ea1c
-
git-svn-2.43.0-1.el8.tuxcare.els8.noarch.rpm
sha:5018fdc8234ca0b206097d7eb8cd878a77d4830337bc9f219ad867f4fb11f2d2
-
gitk-2.43.0-1.el8.tuxcare.els8.noarch.rpm
sha:c153b56c64351481ef99e0dc73d621c67a2673e6c7f121f500595e6ab53d5118
-
gitweb-2.43.0-1.el8.tuxcare.els8.noarch.rpm
sha:97a0555ee74bebb4106a3aac0763f731cb2f267229485a83ee2c008ddc332e10
-
perl-Git-2.43.0-1.el8.tuxcare.els8.noarch.rpm
sha:a248f6193aef07bd26bbb6be14a881b9e6adffeb68904cdace680f7f9dcadc1b
-
perl-Git-SVN-2.43.0-1.el8.tuxcare.els8.noarch.rpm
sha:2b948824df91164548e9554323198a781255e3d63af6c6614407394675f0f43d
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.