Package: gh / 2.46.0-4
Metadata
| Package | Version | Patches format |
|---|---|---|
| gh | 2.46.0-4 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| 0001 set defaultEditor as per debian policy.patch | (download) |
pkg/surveyext/editor.go |
2 2 + 0 - 0 ! |
change default editor from nano to /usr/bin/editor MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit |
| 0002 Skip failed TestHTTPClientSanitizeJSONControlCharact.patch | (download) |
api/http_client_test.go |
1 1 + 0 - 0 ! |
skip failed testhttpclientsanitizejsoncontrolcharactersc0 on go1.22 Go1.22 changes json encoding behavior. https://github.com/golang/go/issues/64346 |
| 0003 Update test to be compatible with Glamour v0.8.patch | (download) |
pkg/cmd/gist/view/view_test.go |
4 2 + 2 - 0 ! |
update test to be compatible with glamour v0.8.0 Bug-Debian: https://bugs.debian.org/1091585 |
| 0004 fix CVE 2024 52308.patch | (download) |
internal/codespaces/rpc/invoker.go |
11 11 + 0 - 0 ! |
adding username validation to the invoker ssh server This is a fix for the gh codespace ssh and similar commands which retrieve the remote username from the running dev container on GitHub. If connecting to a malicious container image, it could trigger a remote code execution on the local system running gh by providing a username that includes additional command-line arguments to ssh. This patch adds validation to ensure that only a reasonable username is accepted from the container. |
| 0005 fix CVE 2024 54132.patch | (download) |
pkg/cmd/run/download/download.go |
15 14 + 1 - 0 ! |
validate artifact name is a valid filename The command gh run download was not validating that an artifact name might be a a reserved path name of . or .. which could lead to writing files outside the expected working directory. This patch applies a patch from upstream that validates the path before downloading artifacts. |
| 0006 fix CVE 2024 53858.patch | (download) |
git/client.go |
84 77 + 7 - 0 ! |
support secure credential pattern with submodules When cloning a repository recursively that utilized submodules, authentication tokens intended for the parent repository could be leaked to the server hosting the child submodule. This patch adds checks to ensure that only the matching server URL gets the appropriate tokens. |
| 0007 fix flaky run download test.patch | (download) |
pkg/cmd/run/download/download_test.go |
605 326 + 279 - 0 ! |
fix flaky gh run download test Use consistent slice ordering in run download tests. The previous implementation was relying on the iteration order of a map when responding with a list of test artifacts from the fakePlatform, which resulted in flakiness. This PR makes use of a slice instead. |
