openSUSE Security Update : librsvg (openSUSE-2018-466)

high Nessus Plugin ID 109879

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for librsvg fixes the following issues :

- CVE-2018-1000041: Input validation issue could lead to credentials leak. (bsc#1083232)

Update to version 2.40.20 :

+ Except for emergencies, this will be the LAST RELEASE of the librsvg-2.40.x series. We are moving to 2.41, which is vastly improved over the 2.40 series. The API/ABI there remain unchaged, so we strongly encourage you to upgrade your sources and binaries to librsvg-2.41.x.

+ bgo#761175 - Allow masks and clips to reuse a node being drawn.

+ Don't access the file system when deciding whether to load a remote file with a UNC path for a paint server (i.e. don't try to load it at all).

+ Vistual Studio: fixed and integrated introspection builds, so introspection data is built directly from the Visual Studio project (Chun-wei Fan).

+ Visual Studio: We now use HIGHENTROPYVA linker option on x64 builds, to enhance the security of built binaries (Chun-wei Fan).

+ Fix generation of Vala bindings when compiling in read-only source directories (Emmanuele Bassi).

Update to version 2.40.19 :

+ bgo#621088: Using text objects as clipping paths is now supported.

+ bgo#587721: Fix rendering of text elements with transformations (Massimo).

+ bgo#777833 - Fix memory leaks when an RsvgHandle is disposed before being closed (Philip Withnall).

+ bgo#782098 - Don't pass deprecated options to gtk-doc (Ting-Wei Lan).

+ bgo#786372 - Fix the default for the 'type' attribute of the <style> element.

+ bgo#785276 - Don't crash on single-byte files.

+ bgo#634514: Don't render unknown elements and their sub-elements.

+ bgo#777155 - Ignore patterns that have close-to-zero dimensions.

+ bgo#634324 - Fix Gaussian blurs with negative scaling.

+ Fix the <switch> element; it wasn't working at all.

+ Fix loading when rsvg_handle_write() is called one byte at a time.

+ bgo#787895 - Fix incorrect usage of libxml2. Thanks to Nick Wellnhofer for advice on this.

+ Backported the test suite machinery from the master branch (Chun-wei Fan, Federico Mena).

+ We now require Pango 1.38.0 or later (released in 2015).

+ We now require libxml2 2.9.0 or later (released in 2012).

This update was imported from the SUSE:SLE-12-SP2:Update update project.

Solution

Update the affected librsvg packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1083232

Plugin Details

Severity: High

ID: 109879

File Name: openSUSE-2018-466.nasl

Version: 1.4

Type: local

Agent: unix

Published: 5/17/2018

Updated: 10/4/2024

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2018-1000041

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:typelib-1_0-rsvg-2_0, p-cpe:/a:novell:opensuse:librsvg-2-2, p-cpe:/a:novell:opensuse:rsvg-view-debuginfo, p-cpe:/a:novell:opensuse:gdk-pixbuf-loader-rsvg, p-cpe:/a:novell:opensuse:gdk-pixbuf-loader-rsvg-debuginfo-32bit, p-cpe:/a:novell:opensuse:gdk-pixbuf-loader-rsvg-debuginfo, p-cpe:/a:novell:opensuse:librsvg-2-2-32bit, p-cpe:/a:novell:opensuse:rsvg-thumbnailer, p-cpe:/a:novell:opensuse:librsvg-2-2-debuginfo, p-cpe:/a:novell:opensuse:librsvg-2-2-debuginfo-32bit, p-cpe:/a:novell:opensuse:rsvg-view, p-cpe:/a:novell:opensuse:gdk-pixbuf-loader-rsvg-32bit, p-cpe:/a:novell:opensuse:librsvg-debugsource, cpe:/o:novell:opensuse:42.3, p-cpe:/a:novell:opensuse:librsvg-devel

Required KB Items: Host/cpu, Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 5/16/2018

Reference Information

CVE: CVE-2018-1000041