Source: batik
Version: 1.14-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerabilities were published for batik.

CVE-2022-38398[0]:
| Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache
| XML Graphics allows an attacker to load a url thru the jar protocol.
| This issue affects Apache XML Graphics Batik 1.14.


CVE-2022-38648[1]:
| Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache
| XML Graphics allows an attacker to fetch external resources. This
| issue affects Apache XML Graphics Batik 1.14.


CVE-2022-40146[2]:
| Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache
| XML Graphics allows an attacker to access files using a Jar url. This
| issue affects Apache XML Graphics Batik 1.14.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-38398
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38398
    https://issues.apache.org/jira/browse/BATIK-1331
    http://svn.apache.org/viewvc?view=revision&revision=1903462
[1] https://security-tracker.debian.org/tracker/CVE-2022-38648
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38648
    https://issues.apache.org/jira/browse/BATIK-1333
    http://svn.apache.org/viewvc?view=revision&revision=1903625
[2] https://security-tracker.debian.org/tracker/CVE-2022-40146
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40146
    https://issues.apache.org/jira/browse/BATIK-1335
    http://svn.apache.org/viewvc?view=revision&revision=1903910

Regards,
Salvatore

Reply via email to