It was discovered that ruby-image-processing, a ruby package that provides higher-level image processing helpers, is prone to a remote shell execution vulnerability when using the #apply method to apply a series of operations coming from unsanitized user input. For the stable distribution (bullseye), this problem has been fixed in version 1.10.3-1+deb11u1. We recommend that you upgrade your ruby-image-processing packages. For the detailed security status of ruby-image-processing please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ruby-image-processing
It was discovered that ruby-image-processing, a ruby package that provides higher-level image processing helpers, is prone to a remote shell execution vulnerability when using the #apply method to apply a series of operations coming from unsanitized user input.
For the stable distribution (bullseye), this problem has been fixed in version 1.10.3-1+deb11u1.
We recommend that you upgrade your ruby-image-processing packages.
For the detailed security status of ruby-image-processing please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ruby-image-processing