CVE-2023-38633
Publication date 22 July 2023
Last updated 26 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
A directory traversal problem in the URL decoder of librsvg before 2.56.3 could be used by local or remote attackers to disclose files (on the local filesystem outside of the expected area), as demonstrated by href=".?../../../../../../../../../../etc/passwd" in an xi:include element.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| librsvg | ||
| 22.04 LTS jammy |
Fixed 2.52.5+dfsg-3ubuntu0.2
|
|
| 20.04 LTS focal |
Fixed 2.48.9-1ubuntu0.20.04.4
|
|
| 18.04 LTS bionic |
Not affected
|
|
| 16.04 LTS xenial |
Not affected
|
|
| 14.04 LTS trusty | Ignored end of standard support |
Notes
Patch details
| Package | Patch details |
|---|---|
| librsvg |
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | Low |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | None |
| Availability impact | None |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-6266-1
- librsvg vulnerability
- 1 August 2023