Mageia 2023-0097: ruby-git security update
Summary
ruby-git versions prior to v1.13.0 allows a remote authenticated attacker
to execute an arbitrary ruby code by having a user to load a repository
containing a specially crafted filename to the product. (CVE-2022-46648,
CVE-2022-47318)
References
- https://bugs.mageia.org/show_bug.cgi?id=31497
- https://www.debian.org/lts/security/2023/dla-3303
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/4KPFLSZPUM7APWVBRM5DCAY5OUVQBF4K/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46648
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47318
Resolution
MGASA-2023-0097 - Updated ruby-git packages fix security vulnerability
SRPMS
- 8/core/ruby-git-1.6.0-1.2.mga8