The function that calls the diff tool in Diffy 3.4.1 does not properly handle double quotes in a filename when run in a windows environment. This allows attackers to execute arbitrary commands via a crafted string. Reference: https://github.com/samg/diffy/commit/478f392082b66d38f54a02b4bb9c41be32fd6593 https://bugzilla.suse.com/show_bug.cgi?id=1200896
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-33127