Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2016-6163

Published: 3 February 2017

The rsvg_pattern_fix_fallback function in rsvg-paint_server.c in librsvg2 2.40.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted svg file.

Notes

AuthorNote
sbeattie
reproducer in oss-security post
leosilva
could reproduce, but code in trusty is quite different than patch

Priority

Low

Cvss 3 Severity Score

5.5

Score breakdown

Status

Package Release Status
librsvg
Launchpad, Ubuntu, Debian
artful Not vulnerable

bionic Not vulnerable

cosmic Not vulnerable

disco Not vulnerable

precise Ignored
(end of life)
trusty Does not exist
(trusty was needed)
upstream
Released (2.40.9-2)
wily Not vulnerable
(2.40.10-1)
xenial Not vulnerable

yakkety Not vulnerable

zesty Not vulnerable

Patches:
upstream: https://git.gnome.org/browse/librsvg/commit/?id=8ee18b22ece0f869cb4e2e021c01138cbb8a0226
upstream: https://git.gnome.org/browse/librsvg/commit/?id=0035e95118a60c0cd3949c2300472d805e16a022

Severity score breakdown

Parameter Value
Base score 5.5
Attack vector Local
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H