[DRE-maint] Bug#1007225: ruby-image-processing: CVE-2022-24720

Salvatore Bonaccorso carnil at debian.org
Sun Mar 13 21:47:01 GMT 2022


Source: ruby-image-processing
Version: 1.10.3-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>

Hi,

The following vulnerability was published for ruby-image-processing.

CVE-2022-24720[0]:
| image_processing is an image processing wrapper for libvips and
| ImageMagick/GraphicsMagick. Prior to version 1.12.2, using the
| `#apply` method from image_processing to apply a series of operations
| that are coming from unsanitized user input allows the attacker to
| execute shell commands. This method is called internally by Active
| Storage variants, so Active Storage is vulnerable as well. The
| vulnerability has been fixed in version 1.12.2 of image_processing. As
| a workaround, users who process based on user input should always
| sanitize the user input by allowing only a constrained set of
| operations.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-24720
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24720
[1] https://github.com/janko/image_processing/security/advisories/GHSA-cxf7-qrc5-9446
[2] https://github.com/janko/image_processing/commit/038e4574e8f4f4b636a62394e09983c71980dada

Regards,
Salvatore



More information about the Pkg-ruby-extras-maintainers mailing list