First published: Mon Jan 23 2023(Updated: )
X.Org X11 libXpm runtime library.<br>Security Fix(es):<br><li> libXpm: compression commands depend on $PATH (CVE-2022-4883)</li> <li> libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617)</li> <li> libXpm: Infinite loop on unclosed comments (CVE-2022-46285)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:0382 is classified as important due to multiple vulnerabilities in the libXpm runtime library.
You can fix RHSA-2023:0382 by updating the libXpm package to the available patched version in your operating system's repository.
RHSA-2023:0382 addresses vulnerabilities CVE-2022-4883, CVE-2022-44617, and CVE-2022-46285 in the libXpm library.
CVE-2022-4883 describes a security issue where compression commands may depend on the $PATH variable in libXpm.
If you are affected by RHSA-2023:0382, you should prioritize updating the libXpm library to mitigate vulnerabilities.