[CLSA-2025:1753121050] Fix CVE(s): CVE-2025-48384
Type:
security
Severity:
Important
Release date:
2025-07-21 18:04:15 UTC
Description:
* SECURITY UPDATE: security vulnerability addressed - debian/patches/CVE-2025-48384.patch: quote values containing CR character to prevent unintended behavior - CVE-2025-48384
Updated packages:
  • git_2.7.4-0ubuntu1.10+tuxcare.els8_amd64.deb
    sha:5dcb6f03515eea6d8b7eaf5ce5e479dfb97d64e2
  • git-all_2.7.4-0ubuntu1.10+tuxcare.els8_all.deb
    sha:18fb2cb34218dfacaa126599279db25fce4da5cb
  • git-arch_2.7.4-0ubuntu1.10+tuxcare.els8_all.deb
    sha:3ebb0e4cef2aa92ff91e7dfdb1ee6c97a8079ff8
  • git-core_2.7.4-0ubuntu1.10+tuxcare.els8_all.deb
    sha:15bf1fd129c2c2b451aaa653dd49bd22d22cfa01
  • git-cvs_2.7.4-0ubuntu1.10+tuxcare.els8_all.deb
    sha:3380e3833081876e4d16e1598582e9affb0e2382
  • git-daemon-run_2.7.4-0ubuntu1.10+tuxcare.els8_all.deb
    sha:a4faa1f7df9c6522270c25472f29c8b2b0d284cb
  • git-daemon-sysvinit_2.7.4-0ubuntu1.10+tuxcare.els8_all.deb
    sha:0736a0fee924e3debe5747bbdb5a82542220ff84
  • git-doc_2.7.4-0ubuntu1.10+tuxcare.els8_all.deb
    sha:24c33a113264d62c667abc710ea7f4a8bd17285b
  • git-el_2.7.4-0ubuntu1.10+tuxcare.els8_all.deb
    sha:06ba10e6bb96cb1daff9bfac4079669d4edbdea1
  • git-email_2.7.4-0ubuntu1.10+tuxcare.els8_all.deb
    sha:b2f87d59e487a2060e803525a6b3e9a1fb9e3e6b
  • git-gui_2.7.4-0ubuntu1.10+tuxcare.els8_all.deb
    sha:32bc7ab28d8ab128bdadedd417240003d2ee1b2a
  • git-man_2.7.4-0ubuntu1.10+tuxcare.els8_all.deb
    sha:d5849e5a570617d48604b8a8df6bbcb1b698bff2
  • git-mediawiki_2.7.4-0ubuntu1.10+tuxcare.els8_all.deb
    sha:7f49794010b171056a6951c471740c9ad45027d6
  • git-svn_2.7.4-0ubuntu1.10+tuxcare.els8_all.deb
    sha:a2417f4c84b3ed2f1416f1a495dbc890b10f91e6
  • gitk_2.7.4-0ubuntu1.10+tuxcare.els8_all.deb
    sha:737f261a1a190b5119103e9ed6ab21d96389962d
  • gitweb_2.7.4-0ubuntu1.10+tuxcare.els8_all.deb
    sha:f493e5f7bacc01e0b909b0a796884c86acb77cbd
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.