[CLSA-2026:1769507695] Fix CVE(s): CVE-2024-50349
Type:
security
Severity:
Moderate
Release date:
2026-01-27 09:54:59 UTC
Description:
* SECURITY UPDATE: Confusing users into sending their passwords to sites under the attacker’s control using crafted URLs - debian/patches/CVE-2024-50349.patch: also encode [:] in credential_format(), sanitize the user prompt - CVE-2024-50349
Updated packages:
  • git_2.7.4-0ubuntu1.10+tuxcare.els12_amd64.deb
    sha:9410f1de1b54791c4aa8fdfbd0bd287533df7110
  • git-all_2.7.4-0ubuntu1.10+tuxcare.els12_all.deb
    sha:9a52bb247dc23283139a568a3e1c1616116a7918
  • git-arch_2.7.4-0ubuntu1.10+tuxcare.els12_all.deb
    sha:54eeed9b3d46936c12ef464cea5ba4c72f8fa68b
  • git-core_2.7.4-0ubuntu1.10+tuxcare.els12_all.deb
    sha:554507af644b1a8ed397cac7c7907bdfc358bb2a
  • git-cvs_2.7.4-0ubuntu1.10+tuxcare.els12_all.deb
    sha:7aea86e398e33188f4bc33d27b37bf757e0ffe81
  • git-daemon-run_2.7.4-0ubuntu1.10+tuxcare.els12_all.deb
    sha:ce0b0976939135096dec3802871d348c542dce76
  • git-daemon-sysvinit_2.7.4-0ubuntu1.10+tuxcare.els12_all.deb
    sha:c7d30a66bfadc2f3bd587d25a446533da74a0d09
  • git-doc_2.7.4-0ubuntu1.10+tuxcare.els12_all.deb
    sha:194856468b146ea6f7aee9f035cc383ae5f3fa84
  • git-el_2.7.4-0ubuntu1.10+tuxcare.els12_all.deb
    sha:99885d870ccb5462596c28a6d36ae9c2791cd5e4
  • git-email_2.7.4-0ubuntu1.10+tuxcare.els12_all.deb
    sha:3efa843135f9ee37f3dc228b92263b30a305e6de
  • git-gui_2.7.4-0ubuntu1.10+tuxcare.els12_all.deb
    sha:1a45f4386bd17b1169a2247cc5dd8c4ac84bd2e3
  • git-man_2.7.4-0ubuntu1.10+tuxcare.els12_all.deb
    sha:18cc5b99ab273adaf85053d19be362f9684419de
  • git-mediawiki_2.7.4-0ubuntu1.10+tuxcare.els12_all.deb
    sha:67f5f12f09d3bc43915fdee9350a9fd823a28f7c
  • git-svn_2.7.4-0ubuntu1.10+tuxcare.els12_all.deb
    sha:699394e092c14f81a3d2549fa487568781bfdd90
  • gitk_2.7.4-0ubuntu1.10+tuxcare.els12_all.deb
    sha:89aeccdfea6907439887f216c1f984477cb20608
  • gitweb_2.7.4-0ubuntu1.10+tuxcare.els12_all.deb
    sha:7fba79cc2d46d978d0becec454eefbe31d2f152f
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.