From ${URL} : In Apache FOP before 2.2, files lying on the filesystem of the server which uses FOP can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack. References: https://xmlgraphics.apache.org/security.html http://seclists.org/oss-sec/2017/q2/86 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
@maintainer(s): ping FOP 2.3 is available (https://xmlgraphics.apache.org/fop/2.3/) which also contains the fix. Demetris Nakos - Gentoo Security Padawan -
Maintainer(s): Ping. FOP is now at version 2.5 upstream. Fix for CVE-2017-5661 was released with 2.2. https://xmlgraphics.apache.org/fop/2.5/
Maintainers, please update the vulnerable package, or consider removing from tree if there are no plans to update.
Thanks!