[CLSA-2024:1731432257] Fix CVE(s): CVE-2024-32020
Type:
security
Severity:
Low
Release date:
2024-11-12 17:24:22 UTC
Description:
* SECURITY UPDATE: When performing a local clone of a repository we end up either copying or hardlinking the source repository into the target repository. - debian/patches/CVE-2024-32020.patch: builtin/clone: refuse local clones of unsafe repositories - CVE-2024-32020
Updated packages:
  • git_2.7.4-0ubuntu1.10+tuxcare.els5_amd64.deb
    sha:b8999e99674805e11c7baa8607ae6485e9cb1cd0
  • git-all_2.7.4-0ubuntu1.10+tuxcare.els5_all.deb
    sha:3b93dee48c70a6fcc40e0500a9804e93926d595e
  • git-arch_2.7.4-0ubuntu1.10+tuxcare.els5_all.deb
    sha:917af929d4a0efebe36cb68427e8ee260b5c5dc8
  • git-core_2.7.4-0ubuntu1.10+tuxcare.els5_all.deb
    sha:f40d22a3e982ed041372b4d2e47fa3b8a3eb18df
  • git-cvs_2.7.4-0ubuntu1.10+tuxcare.els5_all.deb
    sha:5a020bad02d804463327cc22ea2464c59a0398bd
  • git-daemon-run_2.7.4-0ubuntu1.10+tuxcare.els5_all.deb
    sha:a5fc7b9d19578cb692b410d7b81a03c31ddeadab
  • git-daemon-sysvinit_2.7.4-0ubuntu1.10+tuxcare.els5_all.deb
    sha:88b06b52d515ac12f0c603f98cd4cbbe212c6b43
  • git-doc_2.7.4-0ubuntu1.10+tuxcare.els5_all.deb
    sha:3bb0f0079bff01ef0cd8c62343cf687fd675daf4
  • git-el_2.7.4-0ubuntu1.10+tuxcare.els5_all.deb
    sha:b246c68ee16417f91ab0121cbb0e39a666f06003
  • git-email_2.7.4-0ubuntu1.10+tuxcare.els5_all.deb
    sha:ce226b91f864e113854d60e122674df5684df679
  • git-gui_2.7.4-0ubuntu1.10+tuxcare.els5_all.deb
    sha:e96d56ab062767ef40e98da81ba53c74bd3accca
  • git-man_2.7.4-0ubuntu1.10+tuxcare.els5_all.deb
    sha:d186dbe372d3cd4929103e2f710b28017d66cc32
  • git-mediawiki_2.7.4-0ubuntu1.10+tuxcare.els5_all.deb
    sha:4a23aee70b41c58bce10bbe628b81f68e0084ad3
  • git-svn_2.7.4-0ubuntu1.10+tuxcare.els5_all.deb
    sha:434380ad65f38a24e16775683782bf34809cb7d0
  • gitk_2.7.4-0ubuntu1.10+tuxcare.els5_all.deb
    sha:3ed48cb2e10f8b95bd1eeb6325ee67083c5a477a
  • gitweb_2.7.4-0ubuntu1.10+tuxcare.els5_all.deb
    sha:884390343152cbaccdfbdb616ccf93eae6d7d2e1
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.