ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-46648.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ruby-git | Ruby-git_project | * | 1.13.0 (excluding) |
Red Hat Satellite 6.11 for RHEL 7 | RedHat | tfm-rubygem-git-0:1.18.0-0.1.el7sat | * |
Red Hat Satellite 6.11 for RHEL 8 | RedHat | rubygem-git-0:1.18.0-0.1.el8sat | * |
Red Hat Satellite 6.12 for RHEL 8 | RedHat | rubygem-git-0:1.18.0-1.el8sat | * |
Red Hat Satellite 6.13 for RHEL 8 | RedHat | rubygem-git-0:1.18.0-1.el8sat | * |
Red Hat Satellite 6.14 for RHEL 8 | RedHat | rubygem-git-0:1.18.0-1.el8sat | * |
Ruby-git | Ubuntu | bionic | * |
Ruby-git | Ubuntu | esm-apps/bionic | * |
Ruby-git | Ubuntu | esm-apps/focal | * |
Ruby-git | Ubuntu | esm-apps/jammy | * |
Ruby-git | Ubuntu | esm-apps/xenial | * |
Ruby-git | Ubuntu | focal | * |
Ruby-git | Ubuntu | jammy | * |
Ruby-git | Ubuntu | kinetic | * |
Ruby-git | Ubuntu | trusty | * |
Ruby-git | Ubuntu | upstream | * |
Ruby-git | Ubuntu | xenial | * |