Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-44617 (GCVE-0-2022-44617)
Vulnerability from cvelistv5 – Published: 2023-02-06 00:00 – Updated: 2025-03-25 20:05- CWE-20 - >CWE-835
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T13:54:04.007Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160193"
},
{
"tags": [
"x_transferred"
],
"url": "https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb28"
},
{
"tags": [
"x_transferred"
],
"url": "https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.x.org/archives/xorg-announce/2023-January/003312.html"
},
{
"name": "[debian-lts-announce] 20230620 [SECURITY] [DLA 3459-1] libxpm security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-44617",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-25T20:01:52.011717Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-25T20:05:14.184Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "libXpm",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "3.5.15"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20-\u003eCWE-835",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-20T00:00:00.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160193"
},
{
"url": "https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb28"
},
{
"url": "https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9"
},
{
"url": "https://lists.x.org/archives/xorg-announce/2023-January/003312.html"
},
{
"name": "[debian-lts-announce] 20230620 [SECURITY] [DLA 3459-1] libxpm security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2022-44617",
"datePublished": "2023-02-06T00:00:00.000Z",
"dateReserved": "2023-01-09T00:00:00.000Z",
"dateUpdated": "2025-03-25T20:05:14.184Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-44617",
"date": "2026-05-21",
"epss": "0.00073",
"percentile": "0.22013"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:x.org:libxpm:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.5.15\", \"matchCriteriaId\": \"D98D97AA-EDDE-48F7-B4DE-E51BFB5A72D3\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library.\"}, {\"lang\": \"es\", \"value\": \"Se encontr\\u00f3 una falla en libXpm. Al procesar un archivo con un ancho de 0 y una altura muy grande, algunas funciones del analizador se llamar\\u00e1n repetidamente y pueden generar un bucle infinito, lo que resultar\\u00e1 en una denegaci\\u00f3n de servicio en la aplicaci\\u00f3n vinculada a la librer\\u00eda.\"}]",
"id": "CVE-2022-44617",
"lastModified": "2024-11-21T07:28:12.390",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2023-02-06T23:15:09.787",
"references": "[{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2160193\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb28\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.x.org/archives/xorg-announce/2023-January/003312.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2160193\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb28\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.x.org/archives/xorg-announce/2023-January/003312.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-835\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-44617\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2023-02-06T23:15:09.787\",\"lastModified\":\"2025-03-25T20:15:15.493\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una falla en libXpm. Al procesar un archivo con un ancho de 0 y una altura muy grande, algunas funciones del analizador se llamar\u00e1n repetidamente y pueden generar un bucle infinito, lo que resultar\u00e1 en una denegaci\u00f3n de servicio en la aplicaci\u00f3n vinculada a la librer\u00eda.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-835\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:x.org:libxpm:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.15\",\"matchCriteriaId\":\"D98D97AA-EDDE-48F7-B4DE-E51BFB5A72D3\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2160193\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb28\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.x.org/archives/xorg-announce/2023-January/003312.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2160193\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb28\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.x.org/archives/xorg-announce/2023-January/003312.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2160193\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb28\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.x.org/archives/xorg-announce/2023-January/003312.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html\", \"name\": \"[debian-lts-announce] 20230620 [SECURITY] [DLA 3459-1] libxpm security update\", \"tags\": [\"mailing-list\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T13:54:04.007Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-44617\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-25T20:01:52.011717Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-25T20:01:25.247Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"libXpm\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.5.15\"}]}], \"references\": [{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2160193\"}, {\"url\": \"https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb28\"}, {\"url\": \"https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9\"}, {\"url\": \"https://lists.x.org/archives/xorg-announce/2023-January/003312.html\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html\", \"name\": \"[debian-lts-announce] 20230620 [SECURITY] [DLA 3459-1] libxpm security update\", \"tags\": [\"mailing-list\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20-\u003eCWE-835\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2023-06-20T00:00:00.000Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-44617\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-25T20:05:14.184Z\", \"dateReserved\": \"2023-01-09T00:00:00.000Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2023-02-06T00:00:00.000Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2023-AVI-0318
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans VMware. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | Isolation Segment versions 2.12.x antérieures à 2.12.19 | ||
| VMware | Tanzu | VMware Tanzu Application Service for VMs versions 2.12.x antérieures à 2.12.24 | ||
| VMware | N/A | Canonical Ubuntu 18.04 | ||
| VMware | Tanzu | VMware Tanzu Application Service for VMs versions 2.13.x antérieures à 2.13.17 | ||
| VMware | N/A | Platform Automation Toolkit versions 4.0.x antérieures à to 4.0.13 | ||
| VMware | Tanzu | VMware Tanzu Application Service for VMs versions 2.11.x antérieures à 2.11.35 | ||
| VMware | N/A | Platform Automation Toolkit versions 4.3.x versions antérieures à 4.3.5 | ||
| VMware | N/A | Platform Automation Toolkit versions 5.1.x versions antérieures à 5.1.0 | ||
| VMware | N/A | Operations Manager versions 3.0.x antérieures à 3.0.4 | ||
| VMware | N/A | Operations Manager versions 2.10.x antérieures à 2.10.51 | ||
| VMware | N/A | Isolation Segment versions 3.0.x antérieures à 3.0.7 (avec Jammy Stemcells versions antérieures à 1.80) | ||
| VMware | N/A | Isolation Segment versions 2.11.x antérieures à 2.11.29 | ||
| VMware | N/A | Platform Automation Toolkit versions 4.2.x antérieures à 4.2.8 | ||
| VMware | N/A | Canonical Ubuntu 16.04 | ||
| VMware | N/A | Platform Automation Toolkit versions 4.4.x versions antérieures à 4.4.30 | ||
| VMware | N/A | Canonical Ubuntu 22.04 | ||
| VMware | Tanzu | VMware Tanzu Application Service for VMs versions 3.0.x antérieures à 3.0.7 (avec Jammy Stemcells versions 1.80) | ||
| VMware | N/A | Platform Automation Toolkit versions 5.0.x versions antérieures à 5.0.23 | ||
| VMware | N/A | Isolation Segment versions 2.13.x antérieures à 2.13.14 | ||
| VMware | Tanzu | Tanzu Greenplum for Kubernetes versions antérieures à 1.4.0 | ||
| VMware | N/A | Platform Automation Toolkit versions 4.1.x antérieures à 4.1.13 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Isolation Segment versions 2.12.x ant\u00e9rieures \u00e0 2.12.19",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu Application Service for VMs versions 2.12.x ant\u00e9rieures \u00e0 2.12.24",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Canonical Ubuntu 18.04",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu Application Service for VMs versions 2.13.x ant\u00e9rieures \u00e0 2.13.17",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions 4.0.x ant\u00e9rieures \u00e0 to 4.0.13",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu Application Service for VMs versions 2.11.x ant\u00e9rieures \u00e0 2.11.35",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions 4.3.x versions ant\u00e9rieures \u00e0 4.3.5",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions 5.1.x versions ant\u00e9rieures \u00e0 5.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Operations Manager versions 3.0.x ant\u00e9rieures \u00e0 3.0.4",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Operations Manager versions 2.10.x ant\u00e9rieures \u00e0 2.10.51",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segment versions 3.0.x ant\u00e9rieures \u00e0 3.0.7 (avec Jammy Stemcells versions ant\u00e9rieures \u00e0 1.80)",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segment versions 2.11.x ant\u00e9rieures \u00e0 2.11.29",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions 4.2.x ant\u00e9rieures \u00e0 4.2.8",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Canonical Ubuntu 16.04",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions 4.4.x versions ant\u00e9rieures \u00e0 4.4.30",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Canonical Ubuntu 22.04",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu Application Service for VMs versions 3.0.x ant\u00e9rieures \u00e0 3.0.7 (avec Jammy Stemcells versions 1.80)",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions 5.0.x versions ant\u00e9rieures \u00e0 5.0.23",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segment versions 2.13.x ant\u00e9rieures \u00e0 2.13.14",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum for Kubernetes versions ant\u00e9rieures \u00e0 1.4.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions 4.1.x ant\u00e9rieures \u00e0 4.1.13",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-24809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24809"
},
{
"name": "CVE-2022-47629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47629"
},
{
"name": "CVE-2022-24805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24805"
},
{
"name": "CVE-2022-44792",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44792"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2022-4883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4883"
},
{
"name": "CVE-2022-44793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44793"
},
{
"name": "CVE-2022-3165",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3165"
},
{
"name": "CVE-2022-0417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0417"
},
{
"name": "CVE-2022-24807",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24807"
},
{
"name": "CVE-2022-24810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24810"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2022-44617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44617"
},
{
"name": "CVE-2021-3682",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3682"
},
{
"name": "CVE-2021-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23222"
},
{
"name": "CVE-2022-2962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2962"
},
{
"name": "CVE-2023-22809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22809"
},
{
"name": "CVE-2022-0392",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0392"
},
{
"name": "CVE-2022-33070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33070"
},
{
"name": "CVE-2022-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0216"
},
{
"name": "CVE-2022-40898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40898"
},
{
"name": "CVE-2022-24806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24806"
},
{
"name": "CVE-2022-46285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46285"
},
{
"name": "CVE-2021-3930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3930"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2022-24808",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24808"
},
{
"name": "CVE-2021-3750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3750"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0318",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-04-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eVMware\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de\nprivil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5795-1 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5787-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5795-2 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5787-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5787-2 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5772-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5765-1 du 13 avril 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5821-1 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5821-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5801-1 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5795-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5811-1 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5811-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5787-1 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5767-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5806-1 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5801-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5807-1 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5807-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5787-1 du 12 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5765-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5806-2 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5806-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5772-1 du 13 avril 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5767-1 du 13 avril 2023",
"url": null
}
]
}
CERTFR-2023-AVI-0318
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans VMware. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | Isolation Segment versions 2.12.x antérieures à 2.12.19 | ||
| VMware | Tanzu | VMware Tanzu Application Service for VMs versions 2.12.x antérieures à 2.12.24 | ||
| VMware | N/A | Canonical Ubuntu 18.04 | ||
| VMware | Tanzu | VMware Tanzu Application Service for VMs versions 2.13.x antérieures à 2.13.17 | ||
| VMware | N/A | Platform Automation Toolkit versions 4.0.x antérieures à to 4.0.13 | ||
| VMware | Tanzu | VMware Tanzu Application Service for VMs versions 2.11.x antérieures à 2.11.35 | ||
| VMware | N/A | Platform Automation Toolkit versions 4.3.x versions antérieures à 4.3.5 | ||
| VMware | N/A | Platform Automation Toolkit versions 5.1.x versions antérieures à 5.1.0 | ||
| VMware | N/A | Operations Manager versions 3.0.x antérieures à 3.0.4 | ||
| VMware | N/A | Operations Manager versions 2.10.x antérieures à 2.10.51 | ||
| VMware | N/A | Isolation Segment versions 3.0.x antérieures à 3.0.7 (avec Jammy Stemcells versions antérieures à 1.80) | ||
| VMware | N/A | Isolation Segment versions 2.11.x antérieures à 2.11.29 | ||
| VMware | N/A | Platform Automation Toolkit versions 4.2.x antérieures à 4.2.8 | ||
| VMware | N/A | Canonical Ubuntu 16.04 | ||
| VMware | N/A | Platform Automation Toolkit versions 4.4.x versions antérieures à 4.4.30 | ||
| VMware | N/A | Canonical Ubuntu 22.04 | ||
| VMware | Tanzu | VMware Tanzu Application Service for VMs versions 3.0.x antérieures à 3.0.7 (avec Jammy Stemcells versions 1.80) | ||
| VMware | N/A | Platform Automation Toolkit versions 5.0.x versions antérieures à 5.0.23 | ||
| VMware | N/A | Isolation Segment versions 2.13.x antérieures à 2.13.14 | ||
| VMware | Tanzu | Tanzu Greenplum for Kubernetes versions antérieures à 1.4.0 | ||
| VMware | N/A | Platform Automation Toolkit versions 4.1.x antérieures à 4.1.13 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Isolation Segment versions 2.12.x ant\u00e9rieures \u00e0 2.12.19",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu Application Service for VMs versions 2.12.x ant\u00e9rieures \u00e0 2.12.24",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Canonical Ubuntu 18.04",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu Application Service for VMs versions 2.13.x ant\u00e9rieures \u00e0 2.13.17",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions 4.0.x ant\u00e9rieures \u00e0 to 4.0.13",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu Application Service for VMs versions 2.11.x ant\u00e9rieures \u00e0 2.11.35",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions 4.3.x versions ant\u00e9rieures \u00e0 4.3.5",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions 5.1.x versions ant\u00e9rieures \u00e0 5.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Operations Manager versions 3.0.x ant\u00e9rieures \u00e0 3.0.4",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Operations Manager versions 2.10.x ant\u00e9rieures \u00e0 2.10.51",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segment versions 3.0.x ant\u00e9rieures \u00e0 3.0.7 (avec Jammy Stemcells versions ant\u00e9rieures \u00e0 1.80)",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segment versions 2.11.x ant\u00e9rieures \u00e0 2.11.29",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions 4.2.x ant\u00e9rieures \u00e0 4.2.8",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Canonical Ubuntu 16.04",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions 4.4.x versions ant\u00e9rieures \u00e0 4.4.30",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Canonical Ubuntu 22.04",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu Application Service for VMs versions 3.0.x ant\u00e9rieures \u00e0 3.0.7 (avec Jammy Stemcells versions 1.80)",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions 5.0.x versions ant\u00e9rieures \u00e0 5.0.23",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segment versions 2.13.x ant\u00e9rieures \u00e0 2.13.14",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum for Kubernetes versions ant\u00e9rieures \u00e0 1.4.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions 4.1.x ant\u00e9rieures \u00e0 4.1.13",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-24809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24809"
},
{
"name": "CVE-2022-47629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47629"
},
{
"name": "CVE-2022-24805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24805"
},
{
"name": "CVE-2022-44792",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44792"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2022-4883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4883"
},
{
"name": "CVE-2022-44793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44793"
},
{
"name": "CVE-2022-3165",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3165"
},
{
"name": "CVE-2022-0417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0417"
},
{
"name": "CVE-2022-24807",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24807"
},
{
"name": "CVE-2022-24810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24810"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2022-44617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44617"
},
{
"name": "CVE-2021-3682",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3682"
},
{
"name": "CVE-2021-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23222"
},
{
"name": "CVE-2022-2962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2962"
},
{
"name": "CVE-2023-22809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22809"
},
{
"name": "CVE-2022-0392",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0392"
},
{
"name": "CVE-2022-33070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33070"
},
{
"name": "CVE-2022-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0216"
},
{
"name": "CVE-2022-40898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40898"
},
{
"name": "CVE-2022-24806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24806"
},
{
"name": "CVE-2022-46285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46285"
},
{
"name": "CVE-2021-3930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3930"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2022-24808",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24808"
},
{
"name": "CVE-2021-3750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3750"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0318",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-04-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eVMware\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de\nprivil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5795-1 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5787-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5795-2 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5787-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5787-2 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5772-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5765-1 du 13 avril 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5821-1 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5821-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5801-1 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5795-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5811-1 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5811-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5787-1 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5767-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5806-1 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5801-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5807-1 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5807-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5787-1 du 12 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5765-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5806-2 du 13 avril 2023",
"url": "https://tanzu.vmware.com/security/usn-5806-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5772-1 du 13 avril 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware USN-5767-1 du 13 avril 2023",
"url": null
}
]
}
alsa-2023:0379
Vulnerability from osv_almalinux
X.Org X11 libXpm runtime library.
Security Fix(es):
- libXpm: compression commands depend on $PATH (CVE-2022-4883)
- libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617)
- libXpm: Infinite loop on unclosed comments (CVE-2022-46285)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libXpm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.5.12-9.el8_7"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libXpm-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.5.12-9.el8_7"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "X.Org X11 libXpm runtime library.\n\nSecurity Fix(es):\n\n* libXpm: compression commands depend on $PATH (CVE-2022-4883)\n* libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617)\n* libXpm: Infinite loop on unclosed comments (CVE-2022-46285)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2023:0379",
"modified": "2023-03-13T16:36:45Z",
"published": "2023-01-23T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2023:0379"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-44617"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-46285"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-4883"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2160092"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2160193"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2160213"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2023-0379.html"
}
],
"related": [
"CVE-2022-4883",
"CVE-2022-44617",
"CVE-2022-46285"
],
"summary": "Important: libXpm security update"
}
alsa-2023:0383
Vulnerability from osv_almalinux
X.Org X11 libXpm runtime library.
Security Fix(es):
- libXpm: compression commands depend on $PATH (CVE-2022-4883)
- libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617)
- libXpm: Infinite loop on unclosed comments (CVE-2022-46285)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "libXpm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.5.13-8.el9_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "libXpm-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.5.13-8.el9_1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "X.Org X11 libXpm runtime library.\n\nSecurity Fix(es):\n\n* libXpm: compression commands depend on $PATH (CVE-2022-4883)\n* libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617)\n* libXpm: Infinite loop on unclosed comments (CVE-2022-46285)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2023:0383",
"modified": "2023-03-13T16:36:46Z",
"published": "2023-01-23T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2023:0383"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-44617"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-46285"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-4883"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2160092"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2160193"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2160213"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2023-0383.html"
}
],
"related": [
"CVE-2022-4883",
"CVE-2022-44617",
"CVE-2022-46285"
],
"summary": "Important: libXpm security update"
}
BDU:2023-00389
Vulnerability from fstec - Published: 17.01.2023{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., Canonical Ltd., \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, X.Org Foundation, \u0410\u041e \u00ab\u041d\u0422\u0426 \u0418\u0422 \u0420\u041e\u0421\u0410\u00bb, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\"",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "7 (Red Hat Enterprise Linux), 18.04 LTS (Ubuntu), 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 8 (Red Hat Enterprise Linux), 10 (Debian GNU/Linux), 8.0 Update Services for SAP Solutions (Red Hat Enterprise Linux), 20.04 LTS (Ubuntu), 8.4 Extended Update Support (Red Hat Enterprise Linux), 7.3 (\u0420\u0415\u0414 \u041e\u0421), 1.7 (Astra Linux Special Edition), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f), 22.04 LTS (Ubuntu), 9 (Red Hat Enterprise Linux), 4.7 (Astra Linux Special Edition), 22.10 (Ubuntu), 8.2 Telecommunications Update Service (Red Hat Enterprise Linux), 8.2 Update Services for SAP Solutions (Red Hat Enterprise Linux), 8.6 Extended Update Support (Red Hat Enterprise Linux), 9.0 Extended Update Support (Red Hat Enterprise Linux), 8.2 Advanced Update Support (Red Hat Enterprise Linux), \u0434\u043e 3.5.15 (libXpm), 12.4 (\u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c), \u0434\u043e 2.8 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f libXpm:\nhttps://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb287c0030c9913b046643\nhttps://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/c5ab17bcc34914c0b0707d2135dbebe9a367c5f0 \n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2022-44617\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/CVE-2022-44617\n\n\u0414\u043b\u044f Ubuntu:\nhttps://ubuntu.com/security/notices/USN-5807-1\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430\n\n\u0414\u043b\u044f Astra Linux Special Edition 1.7: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2023-0303SE17MD\n\n\u0414\u043b\u044f Astra Linux Special Edition \u0434\u043b\u044f \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b ARM \u0434\u043b\u044f 4.7: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2023-0316SE47MD\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f libxpm \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 1:3.5.12-1.1\n\n\u0414\u043b\u044f \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c: https://abf.rosalinux.ru/advisories/ROSA-SA-2023-2259\n\n\u0414\u043b\u044f Astra Linux 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 libxpm \u0434\u043e 1:3.5.17-1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20231214SE16",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "17.01.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "26.12.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "25.01.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-00389",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-44617",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Ubuntu, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Debian GNU/Linux, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), libXpm, \u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161607), \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 7 , Canonical Ltd. Ubuntu 18.04 LTS , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Red Hat Inc. Red Hat Enterprise Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , Red Hat Inc. Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions , Canonical Ltd. Ubuntu 20.04 LTS , Red Hat Inc. Red Hat Enterprise Linux 8.4 Extended Update Support , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f - (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), Canonical Ltd. Ubuntu 22.04 LTS , Red Hat Inc. Red Hat Enterprise Linux 9 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 ARM (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Canonical Ltd. Ubuntu 22.10 , Red Hat Inc. Red Hat Enterprise Linux 8.2 Telecommunications Update Service , Red Hat Inc. Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions , Red Hat Inc. Red Hat Enterprise Linux 8.6 Extended Update Support , Red Hat Inc. Red Hat Enterprise Linux 9.0 Extended Update Support , Red Hat Inc. Red Hat Enterprise Linux 8.2 Advanced Update Support , \u0410\u041e \u00ab\u041d\u0422\u0426 \u0418\u0422 \u0420\u041e\u0421\u0410\u00bb \u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c 12.4 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161607), \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.8 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 ParsePixels () \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u0434\u043b\u044f \u0440\u0430\u0431\u043e\u0442\u044b \u0441 \u0444\u0430\u0439\u043b\u0430\u043c\u0438 \u0438\u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u0439 X Pixmap (XPM) libXpm, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-20)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 ParsePixels () \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u0434\u043b\u044f \u0440\u0430\u0431\u043e\u0442\u044b \u0441 \u0444\u0430\u0439\u043b\u0430\u043c\u0438 \u0438\u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u0439 X Pixmap (XPM) libXpm \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430 XPM \u0441 \u0448\u0438\u0440\u0438\u043d\u043e\u0439, \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u043d\u0430 0",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb287c0030c9913b046643\nhttps://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/c5ab17bcc34914c0b0707d2135dbebe9a367c5f0 \nhttp://repo.red-soft.ru/redos/7.3c/x86_64/updates/\nhttps://security-tracker.debian.org/tracker/CVE-2022-44617\nhttps://access.redhat.com/security/cve/CVE-2022-44617\nhttps://ubuntu.com/security/notices/USN-5807-1\nhttps://altsp.su/obnovleniya-bezopasnosti/\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2023-0303SE17MD\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2023-0316SE47MD\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.8/\nhttps://abf.rosalinux.ru/advisories/ROSA-SA-2023-2259\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20231214SE16",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-20",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)"
}
FKIE_CVE-2022-44617
Vulnerability from fkie_nvd - Published: 2023-02-06 23:15 - Updated: 2025-03-25 20:157.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2160193 | Issue Tracking, Patch, Third Party Advisory | |
| secalert@redhat.com | https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb28 | ||
| secalert@redhat.com | https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9 | ||
| secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html | ||
| secalert@redhat.com | https://lists.x.org/archives/xorg-announce/2023-January/003312.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2160193 | Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb28 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.x.org/archives/xorg-announce/2023-January/003312.html |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:x.org:libxpm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D98D97AA-EDDE-48F7-B4DE-E51BFB5A72D3",
"versionEndExcluding": "3.5.15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una falla en libXpm. Al procesar un archivo con un ancho de 0 y una altura muy grande, algunas funciones del analizador se llamar\u00e1n repetidamente y pueden generar un bucle infinito, lo que resultar\u00e1 en una denegaci\u00f3n de servicio en la aplicaci\u00f3n vinculada a la librer\u00eda."
}
],
"id": "CVE-2022-44617",
"lastModified": "2025-03-25T20:15:15.493",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2023-02-06T23:15:09.787",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160193"
},
{
"source": "secalert@redhat.com",
"url": "https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb28"
},
{
"source": "secalert@redhat.com",
"url": "https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.x.org/archives/xorg-announce/2023-January/003312.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160193"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb28"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.x.org/archives/xorg-announce/2023-January/003312.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-835"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-XWJC-M85H-PR32
Vulnerability from github – Published: 2023-02-07 00:30 – Updated: 2023-02-14 21:30A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library.
{
"affected": [],
"aliases": [
"CVE-2022-44617"
],
"database_specific": {
"cwe_ids": [
"CWE-20",
"CWE-835"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-02-06T23:15:00Z",
"severity": "HIGH"
},
"details": "A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library.",
"id": "GHSA-xwjc-m85h-pr32",
"modified": "2023-02-14T21:30:28Z",
"published": "2023-02-07T00:30:24Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44617"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160193"
},
{
"type": "WEB",
"url": "https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb28"
},
{
"type": "WEB",
"url": "https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html"
},
{
"type": "WEB",
"url": "https://lists.x.org/archives/xorg-announce/2023-January/003312.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2022-44617
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-44617",
"description": "A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library.",
"id": "GSD-2022-44617",
"references": [
"https://alas.aws.amazon.com/cve/html/CVE-2022-44617.html",
"https://advisories.mageia.org/CVE-2022-44617.html",
"https://access.redhat.com/errata/RHSA-2023:0378",
"https://access.redhat.com/errata/RHSA-2023:0379",
"https://access.redhat.com/errata/RHSA-2023:0380",
"https://access.redhat.com/errata/RHSA-2023:0381",
"https://access.redhat.com/errata/RHSA-2023:0382",
"https://access.redhat.com/errata/RHSA-2023:0383",
"https://access.redhat.com/errata/RHSA-2023:0384",
"https://www.suse.com/security/cve/CVE-2022-44617.html",
"https://ubuntu.com/security/CVE-2022-44617"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-44617"
],
"details": "A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library.",
"id": "GSD-2022-44617",
"modified": "2023-12-13T01:19:25.497509Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2022-44617",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "libXpm",
"version": {
"version_data": [
{
"version_value": "3.5.15"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20-\u003eCWE-835"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2160193",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160193"
},
{
"name": "https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb28",
"refsource": "MISC",
"url": "https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb28"
},
{
"name": "https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9",
"refsource": "MISC",
"url": "https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9"
},
{
"name": "https://lists.x.org/archives/xorg-announce/2023-January/003312.html",
"refsource": "MISC",
"url": "https://lists.x.org/archives/xorg-announce/2023-January/003312.html"
},
{
"name": "[debian-lts-announce] 20230620 [SECURITY] [DLA 3459-1] libxpm security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:x.org:libxpm:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.5.15",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2022-44617"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2160193",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160193"
},
{
"name": "https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb28",
"refsource": "MISC",
"tags": [],
"url": "https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb28"
},
{
"name": "https://lists.x.org/archives/xorg-announce/2023-January/003312.html",
"refsource": "MISC",
"tags": [],
"url": "https://lists.x.org/archives/xorg-announce/2023-January/003312.html"
},
{
"name": "https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9",
"refsource": "MISC",
"tags": [],
"url": "https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9"
},
{
"name": "[debian-lts-announce] 20230620 [SECURITY] [DLA 3459-1] libxpm security update",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-10-17T15:55Z",
"publishedDate": "2023-02-06T23:15Z"
}
}
}
MSRC_CVE-2022-44617
Vulnerability from csaf_microsoft - Published: 2023-02-01 00:00 - Updated: 2023-02-07 00:00| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2023/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2023/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2022-44617 A flaw was found in libXpm. When processing a file with width of 0 and a very large height some parser functions will be called repeatedly and can lead to an infinite loop resulting in a Denial of Service in the application linked to the library. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2022-44617.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "A flaw was found in libXpm. When processing a file with width of 0 and a very large height some parser functions will be called repeatedly and can lead to an infinite loop resulting in a Denial of Service in the application linked to the library.",
"tracking": {
"current_release_date": "2023-02-07T00:00:00.000Z",
"generator": {
"date": "2025-10-20T00:15:36.640Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2022-44617",
"initial_release_date": "2023-02-01T00:00:00.000Z",
"revision_history": [
{
"date": "2023-02-07T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 libXpm 3.5.17-1",
"product": {
"name": "\u003ccbl2 libXpm 3.5.17-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 libXpm 3.5.17-1",
"product": {
"name": "cbl2 libXpm 3.5.17-1",
"product_id": "18291"
}
}
],
"category": "product_name",
"name": "libXpm"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 libXpm 3.5.17-1 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 libXpm 3.5.17-1 as a component of CBL Mariner 2.0",
"product_id": "18291-17086"
},
"product_reference": "18291",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-44617",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "general",
"text": "redhat",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"18291-17086"
],
"known_affected": [
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-44617 A flaw was found in libXpm. When processing a file with width of 0 and a very large height some parser functions will be called repeatedly and can lead to an infinite loop resulting in a Denial of Service in the application linked to the library. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2022-44617.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-07T00:00:00.000Z",
"details": "3.5.17-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"17086-1"
]
}
],
"title": "A flaw was found in libXpm. When processing a file with width of 0 and a very large height some parser functions will be called repeatedly and can lead to an infinite loop resulting in a Denial of Service in the application linked to the library."
}
]
}
OPENSUSE-SU-2024:12617-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-3.5.14-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-3.5.14-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-3.5.14-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-3.5.14-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-3.5.14-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-3.5.14-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-3.5.14-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-3.5.14-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-3.5.14-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-3.5.14-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-3.5.14-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-3.5.14-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://www.suse.com/security/cve/CVE-2022-44617/ | self |
| https://www.suse.com/security/cve/CVE-2022-46285/ | self |
| https://www.suse.com/security/cve/CVE-2022-4883/ | self |
| https://www.suse.com/security/cve/CVE-2022-44617 | external |
| https://bugzilla.suse.com/1207030 | external |
| https://bugzilla.suse.com/1214751 | external |
| https://www.suse.com/security/cve/CVE-2022-46285 | external |
| https://bugzilla.suse.com/1207029 | external |
| https://bugzilla.suse.com/1214751 | external |
| https://bugzilla.suse.com/1215682 | external |
| https://bugzilla.suse.com/1215686 | external |
| https://www.suse.com/security/cve/CVE-2022-4883 | external |
| https://bugzilla.suse.com/1207031 | external |
| https://bugzilla.suse.com/1208055 | external |
| https://bugzilla.suse.com/1208351 | external |
| https://bugzilla.suse.com/1208654 | external |
| https://bugzilla.suse.com/1209322 | external |
| https://bugzilla.suse.com/1209940 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libXpm-devel-3.5.14-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libXpm-devel-3.5.14-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12617",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12617-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-44617 page",
"url": "https://www.suse.com/security/cve/CVE-2022-44617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-46285 page",
"url": "https://www.suse.com/security/cve/CVE-2022-46285/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4883 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4883/"
}
],
"title": "libXpm-devel-3.5.14-2.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12617-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libXpm-devel-3.5.14-2.1.aarch64",
"product": {
"name": "libXpm-devel-3.5.14-2.1.aarch64",
"product_id": "libXpm-devel-3.5.14-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libXpm-devel-32bit-3.5.14-2.1.aarch64",
"product": {
"name": "libXpm-devel-32bit-3.5.14-2.1.aarch64",
"product_id": "libXpm-devel-32bit-3.5.14-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libXpm-tools-3.5.14-2.1.aarch64",
"product": {
"name": "libXpm-tools-3.5.14-2.1.aarch64",
"product_id": "libXpm-tools-3.5.14-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libXpm4-3.5.14-2.1.aarch64",
"product": {
"name": "libXpm4-3.5.14-2.1.aarch64",
"product_id": "libXpm4-3.5.14-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libXpm4-32bit-3.5.14-2.1.aarch64",
"product": {
"name": "libXpm4-32bit-3.5.14-2.1.aarch64",
"product_id": "libXpm4-32bit-3.5.14-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libXpm-devel-3.5.14-2.1.ppc64le",
"product": {
"name": "libXpm-devel-3.5.14-2.1.ppc64le",
"product_id": "libXpm-devel-3.5.14-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libXpm-devel-32bit-3.5.14-2.1.ppc64le",
"product": {
"name": "libXpm-devel-32bit-3.5.14-2.1.ppc64le",
"product_id": "libXpm-devel-32bit-3.5.14-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libXpm-tools-3.5.14-2.1.ppc64le",
"product": {
"name": "libXpm-tools-3.5.14-2.1.ppc64le",
"product_id": "libXpm-tools-3.5.14-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libXpm4-3.5.14-2.1.ppc64le",
"product": {
"name": "libXpm4-3.5.14-2.1.ppc64le",
"product_id": "libXpm4-3.5.14-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libXpm4-32bit-3.5.14-2.1.ppc64le",
"product": {
"name": "libXpm4-32bit-3.5.14-2.1.ppc64le",
"product_id": "libXpm4-32bit-3.5.14-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libXpm-devel-3.5.14-2.1.s390x",
"product": {
"name": "libXpm-devel-3.5.14-2.1.s390x",
"product_id": "libXpm-devel-3.5.14-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libXpm-devel-32bit-3.5.14-2.1.s390x",
"product": {
"name": "libXpm-devel-32bit-3.5.14-2.1.s390x",
"product_id": "libXpm-devel-32bit-3.5.14-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libXpm-tools-3.5.14-2.1.s390x",
"product": {
"name": "libXpm-tools-3.5.14-2.1.s390x",
"product_id": "libXpm-tools-3.5.14-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libXpm4-3.5.14-2.1.s390x",
"product": {
"name": "libXpm4-3.5.14-2.1.s390x",
"product_id": "libXpm4-3.5.14-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libXpm4-32bit-3.5.14-2.1.s390x",
"product": {
"name": "libXpm4-32bit-3.5.14-2.1.s390x",
"product_id": "libXpm4-32bit-3.5.14-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libXpm-devel-3.5.14-2.1.x86_64",
"product": {
"name": "libXpm-devel-3.5.14-2.1.x86_64",
"product_id": "libXpm-devel-3.5.14-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libXpm-devel-32bit-3.5.14-2.1.x86_64",
"product": {
"name": "libXpm-devel-32bit-3.5.14-2.1.x86_64",
"product_id": "libXpm-devel-32bit-3.5.14-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libXpm-tools-3.5.14-2.1.x86_64",
"product": {
"name": "libXpm-tools-3.5.14-2.1.x86_64",
"product_id": "libXpm-tools-3.5.14-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libXpm4-3.5.14-2.1.x86_64",
"product": {
"name": "libXpm4-3.5.14-2.1.x86_64",
"product_id": "libXpm4-3.5.14-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libXpm4-32bit-3.5.14-2.1.x86_64",
"product": {
"name": "libXpm4-32bit-3.5.14-2.1.x86_64",
"product_id": "libXpm4-32bit-3.5.14-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libXpm-devel-3.5.14-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.aarch64"
},
"product_reference": "libXpm-devel-3.5.14-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libXpm-devel-3.5.14-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.ppc64le"
},
"product_reference": "libXpm-devel-3.5.14-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libXpm-devel-3.5.14-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.s390x"
},
"product_reference": "libXpm-devel-3.5.14-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libXpm-devel-3.5.14-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.x86_64"
},
"product_reference": "libXpm-devel-3.5.14-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libXpm-devel-32bit-3.5.14-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.aarch64"
},
"product_reference": "libXpm-devel-32bit-3.5.14-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libXpm-devel-32bit-3.5.14-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.ppc64le"
},
"product_reference": "libXpm-devel-32bit-3.5.14-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libXpm-devel-32bit-3.5.14-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.s390x"
},
"product_reference": "libXpm-devel-32bit-3.5.14-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libXpm-devel-32bit-3.5.14-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.x86_64"
},
"product_reference": "libXpm-devel-32bit-3.5.14-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libXpm-tools-3.5.14-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.aarch64"
},
"product_reference": "libXpm-tools-3.5.14-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libXpm-tools-3.5.14-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.ppc64le"
},
"product_reference": "libXpm-tools-3.5.14-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libXpm-tools-3.5.14-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.s390x"
},
"product_reference": "libXpm-tools-3.5.14-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libXpm-tools-3.5.14-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.x86_64"
},
"product_reference": "libXpm-tools-3.5.14-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libXpm4-3.5.14-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libXpm4-3.5.14-2.1.aarch64"
},
"product_reference": "libXpm4-3.5.14-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libXpm4-3.5.14-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libXpm4-3.5.14-2.1.ppc64le"
},
"product_reference": "libXpm4-3.5.14-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libXpm4-3.5.14-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libXpm4-3.5.14-2.1.s390x"
},
"product_reference": "libXpm4-3.5.14-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libXpm4-3.5.14-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libXpm4-3.5.14-2.1.x86_64"
},
"product_reference": "libXpm4-3.5.14-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libXpm4-32bit-3.5.14-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.aarch64"
},
"product_reference": "libXpm4-32bit-3.5.14-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libXpm4-32bit-3.5.14-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.ppc64le"
},
"product_reference": "libXpm4-32bit-3.5.14-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libXpm4-32bit-3.5.14-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.s390x"
},
"product_reference": "libXpm4-32bit-3.5.14-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libXpm4-32bit-3.5.14-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.x86_64"
},
"product_reference": "libXpm4-32bit-3.5.14-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-44617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-44617"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-44617",
"url": "https://www.suse.com/security/cve/CVE-2022-44617"
},
{
"category": "external",
"summary": "SUSE Bug 1207030 for CVE-2022-44617",
"url": "https://bugzilla.suse.com/1207030"
},
{
"category": "external",
"summary": "SUSE Bug 1214751 for CVE-2022-44617",
"url": "https://bugzilla.suse.com/1214751"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-44617"
},
{
"cve": "CVE-2022-46285",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-46285"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in libXpm. This issue occurs when parsing a file with a comment not closed; the end-of-file condition will not be detected, leading to an infinite loop and resulting in a Denial of Service in the application linked to the library.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-46285",
"url": "https://www.suse.com/security/cve/CVE-2022-46285"
},
{
"category": "external",
"summary": "SUSE Bug 1207029 for CVE-2022-46285",
"url": "https://bugzilla.suse.com/1207029"
},
{
"category": "external",
"summary": "SUSE Bug 1214751 for CVE-2022-46285",
"url": "https://bugzilla.suse.com/1214751"
},
{
"category": "external",
"summary": "SUSE Bug 1215682 for CVE-2022-46285",
"url": "https://bugzilla.suse.com/1215682"
},
{
"category": "external",
"summary": "SUSE Bug 1215686 for CVE-2022-46285",
"url": "https://bugzilla.suse.com/1215686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-46285"
},
{
"cve": "CVE-2022-4883",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4883"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in libXpm. When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4883",
"url": "https://www.suse.com/security/cve/CVE-2022-4883"
},
{
"category": "external",
"summary": "SUSE Bug 1207031 for CVE-2022-4883",
"url": "https://bugzilla.suse.com/1207031"
},
{
"category": "external",
"summary": "SUSE Bug 1208055 for CVE-2022-4883",
"url": "https://bugzilla.suse.com/1208055"
},
{
"category": "external",
"summary": "SUSE Bug 1208351 for CVE-2022-4883",
"url": "https://bugzilla.suse.com/1208351"
},
{
"category": "external",
"summary": "SUSE Bug 1208654 for CVE-2022-4883",
"url": "https://bugzilla.suse.com/1208654"
},
{
"category": "external",
"summary": "SUSE Bug 1209322 for CVE-2022-4883",
"url": "https://bugzilla.suse.com/1209322"
},
{
"category": "external",
"summary": "SUSE Bug 1209940 for CVE-2022-4883",
"url": "https://bugzilla.suse.com/1209940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-devel-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-devel-32bit-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm-tools-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm4-3.5.14-2.1.x86_64",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.aarch64",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.ppc64le",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.s390x",
"openSUSE Tumbleweed:libXpm4-32bit-3.5.14-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-4883"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.