Bug 2169385 (CVE-2022-46648) - CVE-2022-46648 ruby-git: code injection vulnerability
Summary: CVE-2022-46648 ruby-git: code injection vulnerability
Keywords:
Status: NEW
Alias: CVE-2022-46648
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2169386 2169388 2169387
Blocks: 2158318
TreeView+ depends on / blocked
 
Reported: 2023-02-13 13:42 UTC by ybuenos
Modified: 2023-07-07 08:27 UTC (History)
10 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the ruby-git package, which allows a remote authenticated attacker to execute arbitrary code on the system, caused by a code injection flaw. An attacker can execute arbitrary code on the system by using a specially-crafted filename in the repository.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description ybuenos 2023-02-13 13:42:39 UTC
ruby-git is a Ruby library that can be used to create, read and operate Git repositories. ruby-git contains multiple code injection vulnerabilities. If a repository containing a specially crafted filename is loaded to the product, an arbitrary ruby code may be executed.

Comment 1 ybuenos 2023-02-13 13:42:58 UTC
Created rubygem-git tracking bugs for this issue:

Affects: epel-8 [bug 2169386]
Affects: fedora-36 [bug 2169387]


Note You need to log in before you can comment on or make changes to this bug.