First published: Tue Mar 12 2013(Updated: )
Inkscape before 0.48.4 reads .eps files from /tmp instead of the current directory, which might cause Inkspace to process unintended files, allow local users to obtain sensitive information, and possibly have other unspecified impacts.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Inkscape Inkscape | <=0.48.3.1 | |
Inkscape Inkscape | =0.37 | |
Inkscape Inkscape | =0.38.1 | |
Inkscape Inkscape | =0.39 | |
Inkscape Inkscape | =0.40 | |
Inkscape Inkscape | =0.41 | |
Inkscape Inkscape | =0.42 | |
Inkscape Inkscape | =0.42.2 | |
Inkscape Inkscape | =0.43 | |
Inkscape Inkscape | =0.44 | |
Inkscape Inkscape | =0.44.1 | |
Inkscape Inkscape | =0.45.1 | |
Inkscape Inkscape | =0.46 | |
Inkscape Inkscape | =0.47 | |
Inkscape Inkscape | =0.47-pre0 | |
Inkscape Inkscape | =0.47-pre1 | |
Inkscape Inkscape | =0.47-pre2 | |
Inkscape Inkscape | =0.47-pre3 | |
Inkscape Inkscape | =0.47-pre4 | |
Inkscape Inkscape | =0.48 | |
Inkscape Inkscape | =0.48-pre0 | |
Inkscape Inkscape | =0.48-pre1 | |
Inkscape Inkscape | =0.48.1 | |
Inkscape Inkscape | =0.48.2 | |
Inkscape Inkscape | =0.48.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.