First published: Mon Jan 23 2023(Updated: )
X.Org X11 libXpm runtime library.<br>Security Fix(es):<br><li> libXpm: compression commands depend on $PATH (CVE-2022-4883)</li> <li> libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617)</li> <li> libXpm: Infinite loop on unclosed comments (CVE-2022-46285)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE libXpm |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2023:0380 addresses multiple security vulnerabilities in the X.Org X11 libXpm runtime library that have varying levels of severity.
To fix RHSA-2023:0380, update your libXpm package to the latest version provided by your Linux distribution.
Key vulnerabilities addressed in RHSA-2023:0380 include a dependency on $PATH in compression commands and several issues that can cause infinite loops.
Yes, RHSA-2023:0380 includes fixes for several CVEs including CVE-2022-4883, CVE-2022-44617, and CVE-2022-46285.
RHSA-2023:0380 is essential for maintaining system security as it mitigates vulnerabilities that could be exploited by attackers.