Mageia 2021-0168: batik security update
Summary
A flaw was found in the Apache Batik library, where it is vulnerable to a
Server-Side Request Forgery attack (SSRF) via "xlink:href" attributes. This
flaw allows an attacker to cause the underlying server to make arbitrary GET
requests. The highest threat from this vulnerability is to system integrity
(CVE-2019-17566).
The Apache Batik library is vulnerable to SSRF via the NodePickerPanel that
allow an attacker to cause the underlying server to make arbitrary GET requests
(CVE-2020-11987).
References
- https://bugs.mageia.org/show_bug.cgi?id=26800
- https://www.openwall.com/lists/oss-security/2021/02/24/2
- https://xmlgraphics.apache.org/security.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/N3V3MJVGDUNTVPXXGYR335PZJJK7LDXC/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17566
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11987
Resolution
MGASA-2021-0168 - Updated batik packages fix security vulnerabilities
SRPMS
- 7/core/batik-1.13-1.3.mga7