Source: php-dompdf-svg-lib
Version: 0.5.0-3
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerabilities were published for php-dompdf-svg-lib.

CVE-2023-50251[0]:
| php-svg-lib is an SVG file parsing / rendering library. Prior to
| version 0.5.1, when parsing the attributes passed to a `use` tag
| inside an svg document, an attacker can cause the system to go to an
| infinite recursion. Depending on the system configuration and attack
| pattern this could exhaust the memory available to the executing
| process and/or to the server itself. An attacker sending multiple
| request to a system to render the above payload can potentially
| cause resource exhaustion to the point that the system is unable to
| handle incoming request. Version 0.5.1 contains a patch for this
| issue.


CVE-2023-50252[1]:
| php-svg-lib is an SVG file parsing / rendering library. Prior to
| version 0.5.1, when handling `<use>` tag that references an
| `<image>` tag, it merges the attributes from the `<use>` tag to the
| `<image>` tag. The problem pops up especially when the `href`
| attribute from the `<use>` tag has not been sanitized. This can lead
| to an unsafe file read that can cause PHAR Deserialization
| vulnerability in PHP prior to version 8. Version 0.5.1 contains a
| patch for this issue.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-50251
    https://www.cve.org/CVERecord?id=CVE-2023-50251
    
https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-ff5x-7qg5-vwf2
[1] https://security-tracker.debian.org/tracker/CVE-2023-50252
    https://www.cve.org/CVERecord?id=CVE-2023-50252
    
https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-jq98-9543-m4cr

Regards,
Salvatore

Reply via email to