Headline
Debian Security Advisory 5310-1
Debian Linux Security Advisory 5310-1 - It was discovered that ruby-image-processing, a ruby package that provides higher-level image processing helpers, is prone to a remote shell execution vulnerability when using the #apply method to apply a series of operations coming from unsanitized user input.
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512- -------------------------------------------------------------------------Debian Security Advisory DSA-5310-1 [email protected]://www.debian.org/security/ Salvatore BonaccorsoDecember 31, 2022 https://www.debian.org/security/faq- -------------------------------------------------------------------------Package : ruby-image-processingCVE ID : CVE-2022-24720Debian Bug : 1007225It was discovered that ruby-image-processing, a ruby package thatprovides higher-level image processing helpers, is prone to a remoteshell execution vulnerability when using the #apply method to apply aseries of operations coming from unsanitized user input.For the stable distribution (bullseye), this problem has been fixed inversion 1.10.3-1+deb11u1.We recommend that you upgrade your ruby-image-processing packages.For the detailed security status of ruby-image-processing please referto its security tracker page at:https://security-tracker.debian.org/tracker/ruby-image-processingFurther information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/Mailing list: [email protected] PGP SIGNATURE-----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GQyz-----END PGP SIGNATURE-----
Related news
image_processing is an image processing wrapper for libvips and ImageMagick/GraphicsMagick. Prior to version 1.12.2, using the `#apply` method from image_processing to apply a series of operations that are coming from unsanitized user input allows the attacker to execute shell commands. This method is called internally by Active Storage variants, so Active Storage is vulnerable as well. The vulnerability has been fixed in version 1.12.2 of image_processing. As a workaround, users who process based on user input should always sanitize the user input by allowing only a constrained set of operations.