MGASA-2023-0031 - Updated libxpm packages fix security vulnerability Publication date: 07 Feb 2023 URL: https://advisories.mageia.org/MGASA-2023-0031.html Type: security Affected Mageia releases: 8 CVE: CVE-2022-4883, CVE-2022-44617, CVE-2022-46285 libXpm incorrectly handled calling external helper binaries. If libXpm was being used by a setuid binary, a local attacker could possibly use this issue to escalate privileges. (CVE-2022-4883) libXpm incorrectly handled certain XPM files. If a user or automated system were tricked into opening a specially crafted XPM file, a remote attacker could possibly use this issue to cause libXpm to stop responding, resulting in a denial of service. (CVE-2022-44617, CVE-2022-46285) References: - https://bugs.mageia.org/show_bug.cgi?id=31425 - https://lists.x.org/archives/xorg-announce/2023-January/003312.html - https://lists.x.org/archives/xorg-announce/2023-January/003313.html - https://ubuntu.com/security/notices/USN-5807-1 - https://lists.fedoraproject.org/archives/list/[email protected]/thread/BJ2J3EVQMPPSES6ILLTGGH5XVLNDMCRP/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4883 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44617 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46285 SRPMS: - 8/core/libxpm-3.5.15-1.mga8