Updated libxpm packages fix security vulnerability
Publication date: 07 Feb 2023Modification date: 06 Feb 2023
Type: security
Affected Mageia releases : 8
CVE: CVE-2022-4883 , CVE-2022-44617 , CVE-2022-46285
Description
libXpm incorrectly handled calling external helper binaries. If libXpm was being used by a setuid binary, a local attacker could possibly use this issue to escalate privileges. (CVE-2022-4883) libXpm incorrectly handled certain XPM files. If a user or automated system were tricked into opening a specially crafted XPM file, a remote attacker could possibly use this issue to cause libXpm to stop responding, resulting in a denial of service. (CVE-2022-44617, CVE-2022-46285)
References
- https://bugs.mageia.org/show_bug.cgi?id=31425
- https://lists.x.org/archives/xorg-announce/2023-January/003312.html
- https://lists.x.org/archives/xorg-announce/2023-January/003313.html
- https://ubuntu.com/security/notices/USN-5807-1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/BJ2J3EVQMPPSES6ILLTGGH5XVLNDMCRP/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4883
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44617
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46285
SRPMS
8/core
- libxpm-3.5.15-1.mga8