Mageia 2023-0031: libxpm security update
Summary
libXpm incorrectly handled calling external helper binaries. If libXpm
was being used by a setuid binary, a local attacker could possibly use
this issue to escalate privileges. (CVE-2022-4883)
libXpm incorrectly handled certain XPM files. If a user or automated
system were tricked into opening a specially crafted XPM file, a remote
attacker could possibly use this issue to cause libXpm to stop responding,
resulting in a denial of service. (CVE-2022-44617, CVE-2022-46285)
References
- https://bugs.mageia.org/show_bug.cgi?id=31425
- https://lists.x.org/archives/xorg-announce/2023-January/003312.html
- https://lists.x.org/archives/xorg-announce/2023-January/003313.html
- https://ubuntu.com/security/notices/USN-5807-1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/BJ2J3EVQMPPSES6ILLTGGH5XVLNDMCRP/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4883
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44617
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46285
Resolution
MGASA-2023-0031 - Updated libxpm packages fix security vulnerability
SRPMS
- 8/core/libxpm-3.5.15-1.mga8