First published: Mon Jan 23 2023(Updated: )
X.Org X11 libXpm runtime library.<br>Security Fix(es):<br><li> libXpm: compression commands depend on $PATH (CVE-2022-4883)</li> <li> libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617)</li> <li> libXpm: Infinite loop on unclosed comments (CVE-2022-46285)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE libXpm |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:0381 is classified as moderate.
To fix RHSA-2023:0381, update the libXpm package to the latest version available from your distribution's package manager.
RHSA-2023:0381 addresses vulnerabilities including CVE-2022-4883, CVE-2022-44617, and CVE-2022-46285.
RHSA-2023:0381 affects systems that utilize the X.Org X11 libXpm runtime library.
If RHSA-2023:0381 is not addressed, systems may be at risk of denial of service attacks due to the described vulnerabilities.