Release date:
2025-09-12 07:48:24 UTC
Description:
- CVE-2024-50349: fix ANSI escape sequence vulnerability that occurs
when asking for credentials interactively
Updated packages:
-
git-2.27.0-1.el8.tuxcare.els10.x86_64.rpm
sha:762d6913dd674479915671cb491e0c9e67a4a3466c448f4aee71ac6b975e0f0d
-
git-all-2.27.0-1.el8.tuxcare.els10.noarch.rpm
sha:65e81d303c4a9af0a21b35acf85bea1476784adcdeb308470577c46a759051bf
-
git-core-2.27.0-1.el8.tuxcare.els10.x86_64.rpm
sha:ef0754f54888c5b11fcd8d2ec6a25f65e0eccaf9d39755138a0d8c2fdec74695
-
git-core-doc-2.27.0-1.el8.tuxcare.els10.noarch.rpm
sha:5376c1f76f20af952aadddb17ee8f250e62500cc74b3a14cb070feec653ab8d9
-
git-credential-libsecret-2.27.0-1.el8.tuxcare.els10.x86_64.rpm
sha:b9a1c38ac8de101d405ce7ed6ef9b6bbea0ca1b4e78b0a9f5b3dc7cfe90950c5
-
git-daemon-2.27.0-1.el8.tuxcare.els10.x86_64.rpm
sha:24d2b9ea113e1b7f55a367eed72a96c67bff3d5a8cd2ea503188d4a2a3d4f96a
-
git-email-2.27.0-1.el8.tuxcare.els10.noarch.rpm
sha:ca6121973c453f7e724245655fcbc745a9679e8981ffbbcdccb3f6aa0e0548e1
-
git-gui-2.27.0-1.el8.tuxcare.els10.noarch.rpm
sha:7499f0920e0f4b35a672b2f7cc61f3a705389c8e84f5042f62b0e34bc13f3ea0
-
git-instaweb-2.27.0-1.el8.tuxcare.els10.noarch.rpm
sha:95bc5660215cf2da8a8b2a3958b01e39b4862d48fd2bd4aad379612ff8668a48
-
git-subtree-2.27.0-1.el8.tuxcare.els10.x86_64.rpm
sha:3862553ebf139ae3413196ea69a3fc764ec37ddc5f6ee44ff0ca061efdf8e0d8
-
git-svn-2.27.0-1.el8.tuxcare.els10.noarch.rpm
sha:0bb409497d5b9577232de014065b9131aa5a533e35a6946ca367cc1f224641f0
-
gitk-2.27.0-1.el8.tuxcare.els10.noarch.rpm
sha:a3ce10b102926cd70d57321e80d46412728b47e2db3907071a3a1db4a8abfb43
-
gitweb-2.27.0-1.el8.tuxcare.els10.noarch.rpm
sha:cc7ee47646ccc4c8108af96b05ca69b551362a5d39b56b07111b0de14f1171f4
-
perl-Git-2.27.0-1.el8.tuxcare.els10.noarch.rpm
sha:5ecd74819f8fa930ce7671dad0eeb82feba7986eb20a5bee8b0b52674655feda
-
perl-Git-SVN-2.27.0-1.el8.tuxcare.els10.noarch.rpm
sha:fcaa06123614e2650203ef5753891f24a02845cc2d720fb93d553f8c81226c30
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.