Source: php-dompdf-svg-lib Version: 0.5.0-3 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerabilities were published for php-dompdf-svg-lib. CVE-2023-50251[0]: | php-svg-lib is an SVG file parsing / rendering library. Prior to | version 0.5.1, when parsing the attributes passed to a `use` tag | inside an svg document, an attacker can cause the system to go to an | infinite recursion. Depending on the system configuration and attack | pattern this could exhaust the memory available to the executing | process and/or to the server itself. An attacker sending multiple | request to a system to render the above payload can potentially | cause resource exhaustion to the point that the system is unable to | handle incoming request. Version 0.5.1 contains a patch for this | issue. CVE-2023-50252[1]: | php-svg-lib is an SVG file parsing / rendering library. Prior to | version 0.5.1, when handling `<use>` tag that references an | `<image>` tag, it merges the attributes from the `<use>` tag to the | `<image>` tag. The problem pops up especially when the `href` | attribute from the `<use>` tag has not been sanitized. This can lead | to an unsafe file read that can cause PHAR Deserialization | vulnerability in PHP prior to version 8. Version 0.5.1 contains a | patch for this issue. If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2023-50251 https://www.cve.org/CVERecord?id=CVE-2023-50251 https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-ff5x-7qg5-vwf2 [1] https://security-tracker.debian.org/tracker/CVE-2023-50252 https://www.cve.org/CVERecord?id=CVE-2023-50252 https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-jq98-9543-m4cr Regards, Salvatore