Lucene search

K
debianDebianDEBIAN:DSA-5426-1:F3F68
HistoryJun 14, 2023 - 2:25 a.m.

[SECURITY] [DSA 5426-1] owslib security update

2023-06-1402:25:54
lists.debian.org
4
debian owslib xml

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L

0.001 Low

EPSS

Percentile

51.0%


Debian Security Advisory DSA-5426-1 [email protected]
https://www.debian.org/security/ Aron Xu
June 14, 2023 https://www.debian.org/security/faq


Package : owslib
CVE ID : CVE-2023-27476
Debian Bug : 1034182

An arbitrary file reads from malformed XML payload vulnerbility was
discovered in owslib, the Python client library for Open Geospatial (OGC)
web services. This issue has been addressed by always using lxml as the
XML parser with entity resolution disabled.

For the oldstable distribution (bullseye), this problem has been fixed
in version 0.23.0-1+deb11u1.

We recommend that you upgrade your owslib packages.

For the detailed security status of owslib please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/owslib

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L

0.001 Low

EPSS

Percentile

51.0%