Back to bug 2151583
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| TEJ RATHI | 2022-12-22 10:46:45 UTC | Blocks | 2155779 | |
| Avinash Hanwate | 2022-12-22 13:06:47 UTC | Depends On | 2155815, 2155817, 2155818, 2155816 | |
| Avinash Hanwate | 2022-12-23 03:21:45 UTC | Depends On | 2155964, 2155963, 2155962 | |
| Lon Hohberger | 2023-01-10 13:17:32 UTC | Link ID | OpenStack gerrit 869611 | |
| Nick Tait | 2023-01-12 18:42:41 UTC | Severity | high | medium |
| CC | adudiak, kshier, stcannon, tfister | |||
| Priority | high | medium | ||
| Red Hat Bugzilla | 2023-01-20 05:18:50 UTC | CC | cwelton | |
| Yadnyawalk Tale | 2023-01-23 15:02:24 UTC | CC | ytale | |
| Yadnyawalk Tale | 2023-01-23 15:03:58 UTC | Depends On | 2163464 | |
| Vipul Nair | 2023-02-20 13:31:59 UTC | Doc Text | A remote code execution vulnerability exists in Git-python. An attacker by injecting a malicious URL into the clone command can exploit this vulnerability as the library ends up making external calls to git without any input sanitization thereby leading to complete system compromise. | |
| RaTasha Tillery-Smith | 2023-02-20 15:32:22 UTC | Doc Text | A remote code execution vulnerability exists in Git-python. An attacker by injecting a malicious URL into the clone command can exploit this vulnerability as the library ends up making external calls to git without any input sanitization thereby leading to complete system compromise. | A remote code execution vulnerability exists in Git-python. By injecting a malicious URL into the clone command, an attacker can exploit this vulnerability as the library makes external calls to git without any input sanitization. This issue leads to complete system compromise. |
| Red Hat Bugzilla | 2023-07-07 08:34:45 UTC | Assignee | security-response-team | nobody |
Back to bug 2151583