PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-6163 Gnome CVE debrief

CVE-2016-6163 is a denial-of-service vulnerability in librsvg2 2.40.2. NVD describes the flaw as an out-of-bounds read in rsvg_pattern_fix_fallback in rsvg-paint_server.c, reachable through a crafted SVG file. The weakness is classified as CWE-125, and NVD rates the impact as availability-only loss with no confidentiality or integrity impact. The affected product entry in the NVD record is gnome:librsvg:2.40.2. Organizations that render or ingest untrusted SVG content with this library should treat the issue as a crash-risk bug and prioritize patching or version replacement in any pipeline that parses user-supplied graphics.

Vendor
Gnome
Product
CVE-2016-6163
CVSS
MEDIUM 5.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-03
Original CVE updated
2026-05-13
Advisory published
2017-02-03
Advisory updated
2026-05-13

Who should care

Administrators and developers using gnome librsvg/librsvg2 2.40.2 to parse or render untrusted SVG content, especially in document conversion, thumbnailing, preview, or web upload workflows.

Technical summary

According to the NVD record, rsvg_pattern_fix_fallback in rsvg-paint_server.c can read out of bounds when processing a crafted SVG file, producing a denial of service condition. The record maps the weakness to CWE-125 and lists the vulnerable CPE as cpe:2.3:a:gnome:librsvg:2.40.2:*:*:*:*:*:*:*. NVD also assigns CVSS v3.0 5.5/Medium with vector CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H.

Defensive priority

Medium. The issue is limited to availability, but it can still disrupt any service or application that automatically processes SVG input.

Recommended defensive actions

  • Inventory systems that use gnome librsvg/librsvg2 2.40.2 or bundle it indirectly.
  • Prioritize upgrading or replacing the vulnerable librsvg2 version in any component that renders untrusted SVG.
  • Restrict or sandbox SVG parsing in upload, preview, conversion, and thumbnailing paths until patched.
  • Treat unexpected crashes during SVG processing as a potential sign of this issue and investigate affected inputs.
  • Use the linked vendor or issue-tracking references to confirm the fixed build available in your environment.

Evidence notes

The vulnerability description, affected version, and weakness classification come from the official NVD record and its referenced sources. NVD lists the flaw as an out-of-bounds read in rsvg_pattern_fix_fallback within rsvg-paint_server.c, names gnome:librsvg:2.40.2 as vulnerable, and maps the weakness to CWE-125. The linked references include two oss-security mailing list advisories and a Red Hat Bugzilla patch reference. Note: the prose description says 'remote attackers,' while the CVSS vector in the NVD record uses AV:L/UI:R; this debrief preserves both source facts without resolving that discrepancy.

Official resources

Published by NVD on 2017-02-03 and last modified on 2026-05-13. No Known Exploited Vulnerabilities (KEV) listing is present in the supplied record.