Harsh Jaiswal discovered a remote shell execution vulnerability in ruby-mini-magick, a Ruby library providing a wrapper around ImageMagick or GraphicsMagick, exploitable when using MiniMagick::Image.open with specially crafted URLs coming from unsanitized user input. For the oldstable distribution (stretch), this problem has been fixed in version 4.5.1-1+deb9u1. For the stable distribution (buster), this problem has been fixed in version 4.9.2-1+deb10u1. We recommend that you upgrade your ruby-mini-magick packages. For the detailed security status of ruby-mini-magick please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ruby-mini-magick
Harsh Jaiswal discovered a remote shell execution vulnerability in ruby-mini-magick, a Ruby library providing a wrapper around ImageMagick or GraphicsMagick, exploitable when using MiniMagick::Image.open with specially crafted URLs coming from unsanitized user input.
For the oldstable distribution (stretch), this problem has been fixed in version 4.5.1-1+deb9u1.
For the stable distribution (buster), this problem has been fixed in version 4.9.2-1+deb10u1.
We recommend that you upgrade your ruby-mini-magick packages.
For the detailed security status of ruby-mini-magick please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ruby-mini-magick