ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-46648. https://github.com/ruby-git/ruby-git/pull/602 https://github.com/ruby-git/ruby-git https://jvn.jp/en/jp/JVN16765254/index.html
Created rubygem-git tracking bugs for this issue: Affects: epel-8 [bug 2161643]
*** This bug has been marked as a duplicate of bug 2159672 ***