Release date:
2025-09-12 07:49:29 UTC
Description:
- CVE-2024-50349: fix ANSI escape sequence vulnerability that occurs
when asking for credentials interactively
Updated packages:
-
git-2.27.0-1.el8.tuxcare.els10.x86_64.rpm
sha:b25903808834458b6a37209f43a683d288ab7a443f6ba4a26de002168bdcb96a
-
git-all-2.27.0-1.el8.tuxcare.els10.noarch.rpm
sha:cf3508eb31ef7bdfbab7a04b76348e4ab94cc0eed968c8a6b33703f952520b57
-
git-core-2.27.0-1.el8.tuxcare.els10.x86_64.rpm
sha:bfa0297178ec9b8af90853a81f158271e63d6f6711fe40d1b6d8a86268872eba
-
git-core-doc-2.27.0-1.el8.tuxcare.els10.noarch.rpm
sha:037db878dc52d5e1464b02a889a3eeca3e014e1b3b84aad94e1c3732744c9456
-
git-credential-libsecret-2.27.0-1.el8.tuxcare.els10.x86_64.rpm
sha:26c0f5ebd6fe1f1e8e158b877acc0d74637df067fe600408d1754650d6bb7434
-
git-daemon-2.27.0-1.el8.tuxcare.els10.x86_64.rpm
sha:2c97d1cba33863272551cc6fb85ed17173ec2e414e5d2ff91c8fa6c3f6be5818
-
git-email-2.27.0-1.el8.tuxcare.els10.noarch.rpm
sha:1e21143f6a39f74a2dd0d9d366a7ce15f0fba047a397b04f9df3ed037fbc6558
-
git-gui-2.27.0-1.el8.tuxcare.els10.noarch.rpm
sha:5af1208a01d058ac58969b41e4bb5e4a7910b5b94cf9e60786b42f8ae8dea366
-
git-instaweb-2.27.0-1.el8.tuxcare.els10.noarch.rpm
sha:8ff44f515fa5958590a339e6dd20690062289d2fc2e0ed753ec7316c9da35720
-
git-subtree-2.27.0-1.el8.tuxcare.els10.x86_64.rpm
sha:79e45d88d5e5d4513555360a4eddc46e13608aa9982233c13f4c7cdbd1dd962a
-
git-svn-2.27.0-1.el8.tuxcare.els10.noarch.rpm
sha:16c5e15317640bd303062f342ae7be9fc2ac985cb11828ec91070b6c97656dc0
-
gitk-2.27.0-1.el8.tuxcare.els10.noarch.rpm
sha:2b62cbdac27b1cc5efd76652d8407d6c8c0f5ff600a413c82a20a60d403d944b
-
gitweb-2.27.0-1.el8.tuxcare.els10.noarch.rpm
sha:a8832edc02638b04961be911d64bb8061d09542f2050e2413bb1d3b4c78572da
-
perl-Git-2.27.0-1.el8.tuxcare.els10.noarch.rpm
sha:ce482c3714ec199d56212dc52464b92098dd937d144e7e77fd4be44c5ae2b260
-
perl-Git-SVN-2.27.0-1.el8.tuxcare.els10.noarch.rpm
sha:4491cd7a71f6e2ba5e647f5906b1bcfd98d51c162b08d6b14bba4487f94a6094
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.