Debian LTS: DLA-3619-1: batik security update
Summary
CVE-2020-11987
A server-side request forgery was found,
caused by improper input validation by the NodePickerPanel.
By using a specially-crafted argument, an attacker could exploit
this vulnerability to cause the underlying server to make
arbitrary GET requests.
CVE-2022-38398
A Server-Side Request Forgery (SSRF) vulnerability
was found that allows an attacker to load a url thru the jar
protocol.
CVE-2022-38648
A Server-Side Request Forgery (SSRF) vulnerability
was found that allows an attacker to fetch external resources.
CVE-2022-40146
A Server-Side Request Forgery (SSRF) vulnerability
was found that allows an attacker to access files using a Jar url.
CVE-2022-44729
A Server-Side Request Forgery (SSRF) vulnerability
was found. A malicious SVG could trigger loading external resources
by default, causing resource consumption or in some
cases even information disclosure.
CVE-2022-44730
A Server-Side Request Forgery (SSRF) vulnerability
was found. A malicious SVG can probe user profile / data and send
it directly as parameter to a URL.
For Debian 10 buster, these problems have been fixed in version
1.10-2+deb10u3.
We recommend that you upgrade your batik packages.
For the detailed security status of batik please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/batik
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS