Lucene search

K
debianDebianDEBIAN:DSA-5484-1:61DA4
HistoryAug 27, 2023 - 2:28 p.m.

[SECURITY] [DSA 5484-1] librsvg security update

2023-08-2714:28:48
lists.debian.org
8
directory traversal
debian
librsvg
security update

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

52.4%


Debian Security Advisory DSA-5484-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
August 27, 2023 https://www.debian.org/security/faq


Package : librsvg
CVE ID : CVE-2023-38633
Debian Bug : 1041810

Zac Sims discovered a directory traversal in the URL decoder of librsvg,
a SAX-based renderer library for SVG files, which could result in read
of arbitrary files when processing a specially crafted SVG file with an
include element.

For the oldstable distribution (bullseye), this problem has been fixed
in version 2.50.3+dfsg-1+deb11u1.

For the stable distribution (bookworm), this problem has been fixed in
version 2.54.7+dfsg-1~deb12u1.

We recommend that you upgrade your librsvg packages.

For the detailed security status of librsvg please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/librsvg

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

52.4%