MGASA-2023-0259

Source
https://advisories.mageia.org/MGASA-2023-0259.html
Import Source
https://advisories.mageia.org/MGASA-2023-0259.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2023-0259
Related
Published
2023-09-11T13:07:54Z
Modified
2023-09-11T11:43:03Z
Summary
Updated librsvg packages fix security vulnerability
Details

A directory traversal problem in the URL decoder of librsvg before 2.56.3 could be used by local or remote attackers to disclose files (on the local filesystem outside of the expected area), as demonstrated by href=".?../../../../../../../../../../etc/passwd" in an xi:include element. (CVE-2023-38633)

References
Credits

Affected packages

Mageia:8 / librsvg

Package

Name
librsvg
Purl
pkg:rpm/mageia/librsvg?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.50.3-1.2.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:9 / librsvg

Package

Name
librsvg
Purl
pkg:rpm/mageia/librsvg?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.56.0-1.1.mga9

Ecosystem specific

{
    "section": "core"
}