Arr-pm is an RPM reader/writer library written in Ruby. Versions prior to 0.0.12 are subject to OS command injection resulting in shell execution if the RPM contains a malicious "payload compressor" field. This vulnerability impacts the `extract` and `files` methods of the `RPM::File` class of this library. Version 0.0.12 patches these issues. A workaround for this issue is to ensure any RPMs being processed contain valid/known payload compressor values such as gzip, bzip2, xz, zstd, and lzma. The payload compressor field in an rpm can be checked by using the rpm command line tool.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6740 | Arr-pm is an RPM reader/writer library written in Ruby. Versions prior to 0.0.12 are subject to OS command injection resulting in shell execution if the RPM contains a malicious "payload compressor" field. This vulnerability impacts the `extract` and `files` methods of the `RPM::File` class of this library. Version 0.0.12 patches these issues. A workaround for this issue is to ensure any RPMs being processed contain valid/known payload compressor values such as gzip, bzip2, xz, zstd, and lzma. The payload compressor field in an rpm can be checked by using the rpm command line tool. |
Github GHSA |
GHSA-88cv-mj24-8w3q | arr-pm vulnerable to arbitrary shell execution when extracting or listing files contained in a malicious rpm. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 22 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-22T17:21:08.754Z
Reserved: 2022-09-02T00:00:00.000Z
Link: CVE-2022-39224
Updated: 2024-08-03T12:00:43.325Z
Status : Modified
Published: 2022-09-21T23:15:09.623
Modified: 2024-11-21T07:17:49.317
Link: CVE-2022-39224
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA