Source: ruby-git Version: 1.9.1-1 Severity: important Tags: security upstream Forwarded: https://github.com/ruby-git/ruby-git/pull/569 X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for ruby-git. CVE-2022-25648[0]: | The package git before 1.11.0 are vulnerable to Command Injection via | git argument injection. When calling the fetch(remote = 'origin', opts | = {}) function, the remote parameter is passed to the git fetch | subcommand in a way that additional flags can be set. The additional | flags can be used to perform a command injection. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2022-25648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25648 [1] https://github.com/ruby-git/ruby-git/pull/569 [2] https://security.snyk.io/vuln/SNYK-RUBY-GIT-2421270 [3] https://github.com/ruby-git/ruby-git/commit/291ca0946bec7164b90ad5c572ac147f512c7159 Please adjust the affected versions in the BTS as needed. Regards, Salvatore