Back to bug 2151583

Who When What Removed Added
TEJ RATHI 2022-12-22 10:46:45 UTC Blocks 2155779
Avinash Hanwate 2022-12-22 13:06:47 UTC Depends On 2155815, 2155817, 2155818, 2155816
Avinash Hanwate 2022-12-23 03:21:45 UTC Depends On 2155964, 2155963, 2155962
Lon Hohberger 2023-01-10 13:17:32 UTC Link ID OpenStack gerrit 869611
Nick Tait 2023-01-12 18:42:41 UTC Severity high medium
CC adudiak, kshier, stcannon, tfister
Priority high medium
Red Hat Bugzilla 2023-01-20 05:18:50 UTC CC cwelton
Yadnyawalk Tale 2023-01-23 15:02:24 UTC CC ytale
Yadnyawalk Tale 2023-01-23 15:03:58 UTC Depends On 2163464
Vipul Nair 2023-02-20 13:31:59 UTC Doc Text A remote code execution vulnerability exists in Git-python. An attacker by injecting a malicious URL into the clone command can exploit this vulnerability as the library ends up making external calls to git without any input sanitization thereby leading to complete system compromise.
RaTasha Tillery-Smith 2023-02-20 15:32:22 UTC Doc Text A remote code execution vulnerability exists in Git-python. An attacker by injecting a malicious URL into the clone command can exploit this vulnerability as the library ends up making external calls to git without any input sanitization thereby leading to complete system compromise. A remote code execution vulnerability exists in Git-python. By injecting a malicious URL into the clone command, an attacker can exploit this vulnerability as the library makes external calls to git without any input sanitization. This issue leads to complete system compromise.
Red Hat Bugzilla 2023-07-07 08:34:45 UTC Assignee security-response-team nobody

Back to bug 2151583