First published: Mon Jan 23 2023(Updated: )
X.Org X11 libXpm runtime library.<br>Security Fix(es):<br><li> libXpm: compression commands depend on $PATH (CVE-2022-4883)</li> <li> libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617)</li> <li> libXpm: Infinite loop on unclosed comments (CVE-2022-46285)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE libXpm |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2023:0378 addresses multiple vulnerabilities in the X.Org X11 libXpm runtime library, which are considered significant due to potential denial-of-service attacks.
To fix RHSA-2023:0378, update your X.Org X11 libXpm runtime library to the latest version provided by your package manager.
RHSA-2023:0378 fixes vulnerabilities including CVE-2022-4883, CVE-2022-44617, and CVE-2022-46285 in the libXpm runtime library.
If your system uses the X.Org X11 libXpm runtime library, it may be affected by the vulnerabilities addressed by RHSA-2023:0378.
Failing to address RHSA-2023:0378 may expose your system to denial-of-service attacks and other exploitation risks associated with the vulnerabilities.