First published: Tue Aug 01 2023(Updated: )
Zac Sims discovered that librsvg incorrectly handled decoding URLs. A remote attacker could possibly use this issue to read arbitrary files by using an include element.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/librsvg2-2 | <2.54.5+dfsg-1ubuntu2.1 | 2.54.5+dfsg-1ubuntu2.1 |
=23.04 | ||
All of | ||
ubuntu/librsvg2-2 | <2.52.5+dfsg-3ubuntu0.2 | 2.52.5+dfsg-3ubuntu0.2 |
=22.04 | ||
All of | ||
ubuntu/librsvg2-2 | <2.48.9-1ubuntu0.20.04.4 | 2.48.9-1ubuntu0.20.04.4 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this advisory is USN-6266-1.
The title of this advisory is USN-6266-1: librsvg vulnerability.
Zac Sims discovered the vulnerability.
The vulnerability allows remote attackers to read arbitrary files using an include element.
To fix this vulnerability, update to version 2.54.5+dfsg-1ubuntu2.1 or later for Ubuntu 23.04, version 2.52.5+dfsg-3ubuntu0.2 or later for Ubuntu 22.04, or version 2.48.9-1ubuntu0.20.04.4 or later for Ubuntu 20.04.