cvrf2cusa/cvrf/2023/cvrf-openEuler-SA-2023-1078.xml

217 lines
15 KiB
XML
Raw Permalink Normal View History

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for libXpm is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2023-1078</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2023-02-10</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2023-02-10</InitialReleaseDate>
<CurrentReleaseDate>2023-02-10</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2023-02-10</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">libXpm security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for libXpm is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">X.Org X11 libXpm runtime library
Security Fix(es):
A flaw was found in libXpm. When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable.(CVE-2022-4883)
A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library.(CVE-2022-44617)
A flaw was found in libXpm. This issue occurs when parsing a file with a comment not closed; the end-of-file condition will not be detected, leading to an infinite loop and resulting in a Denial of Service in the application linked to the library.(CVE-2022-46285)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for libXpm is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">libXpm</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1078</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-4883</URL>
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-44617</URL>
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-46285</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2022-4883</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2022-44617</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2022-46285</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-20.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">openEuler-20.03-LTS-SP1</FullProductName>
<FullProductName ProductID="openEuler-20.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">openEuler-20.03-LTS-SP3</FullProductName>
<FullProductName ProductID="openEuler-22.03-LTS" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">openEuler-22.03-LTS</FullProductName>
<FullProductName ProductID="openEuler-22.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">openEuler-22.03-LTS-SP1</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="aarch64">
<FullProductName ProductID="libXpm-debuginfo-3.5.13-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libXpm-debuginfo-3.5.13-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libXpm-3.5.13-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libXpm-3.5.13-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libXpm-debugsource-3.5.13-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libXpm-debugsource-3.5.13-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libXpm-devel-3.5.13-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libXpm-devel-3.5.13-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libXpm-debuginfo-3.5.13-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libXpm-debuginfo-3.5.13-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libXpm-debugsource-3.5.13-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libXpm-debugsource-3.5.13-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libXpm-devel-3.5.13-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libXpm-devel-3.5.13-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libXpm-3.5.13-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libXpm-3.5.13-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libXpm-debuginfo-3.5.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libXpm-debuginfo-3.5.13-4.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="libXpm-devel-3.5.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libXpm-devel-3.5.13-4.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="libXpm-debugsource-3.5.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libXpm-debugsource-3.5.13-4.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="libXpm-3.5.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libXpm-3.5.13-4.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="libXpm-3.5.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libXpm-3.5.13-4.oe2203sp1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libXpm-devel-3.5.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libXpm-devel-3.5.13-4.oe2203sp1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libXpm-debugsource-3.5.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libXpm-debugsource-3.5.13-4.oe2203sp1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libXpm-debuginfo-3.5.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libXpm-debuginfo-3.5.13-4.oe2203sp1.aarch64.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="noarch">
<FullProductName ProductID="libXpm-help-3.5.13-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libXpm-help-3.5.13-2.oe1.noarch.rpm</FullProductName>
<FullProductName ProductID="libXpm-help-3.5.13-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libXpm-help-3.5.13-2.oe1.noarch.rpm</FullProductName>
<FullProductName ProductID="libXpm-help-3.5.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libXpm-help-3.5.13-4.oe2203.noarch.rpm</FullProductName>
<FullProductName ProductID="libXpm-help-3.5.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libXpm-help-3.5.13-4.oe2203sp1.noarch.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="libXpm-3.5.13-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libXpm-3.5.13-2.oe1.src.rpm</FullProductName>
<FullProductName ProductID="libXpm-3.5.13-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libXpm-3.5.13-2.oe1.src.rpm</FullProductName>
<FullProductName ProductID="libXpm-3.5.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libXpm-3.5.13-4.oe2203.src.rpm</FullProductName>
<FullProductName ProductID="libXpm-3.5.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libXpm-3.5.13-4.oe2203sp1.src.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="x86_64">
<FullProductName ProductID="libXpm-debugsource-3.5.13-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libXpm-debugsource-3.5.13-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libXpm-3.5.13-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libXpm-3.5.13-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libXpm-devel-3.5.13-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libXpm-devel-3.5.13-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libXpm-debuginfo-3.5.13-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libXpm-debuginfo-3.5.13-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libXpm-debuginfo-3.5.13-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libXpm-debuginfo-3.5.13-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libXpm-devel-3.5.13-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libXpm-devel-3.5.13-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libXpm-debugsource-3.5.13-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libXpm-debugsource-3.5.13-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libXpm-3.5.13-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libXpm-3.5.13-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libXpm-devel-3.5.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libXpm-devel-3.5.13-4.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="libXpm-3.5.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libXpm-3.5.13-4.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="libXpm-debugsource-3.5.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libXpm-debugsource-3.5.13-4.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="libXpm-debuginfo-3.5.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libXpm-debuginfo-3.5.13-4.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="libXpm-debuginfo-3.5.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libXpm-debuginfo-3.5.13-4.oe2203sp1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libXpm-devel-3.5.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libXpm-devel-3.5.13-4.oe2203sp1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libXpm-3.5.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libXpm-3.5.13-4.oe2203sp1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libXpm-debugsource-3.5.13-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libXpm-debugsource-3.5.13-4.oe2203sp1.x86_64.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libXpm. When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable.</Note>
</Notes>
<ReleaseDate>2023-02-10</ReleaseDate>
<CVE>CVE-2022-4883</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP3</ProductID>
<ProductID>openEuler-22.03-LTS</ProductID>
<ProductID>openEuler-22.03-LTS-SP1</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>8.1</BaseScore>
<Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>libXpm security update</Description>
<DATE>2023-02-10</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1078</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="2" xml:lang="en">A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library.</Note>
</Notes>
<ReleaseDate>2023-02-10</ReleaseDate>
<CVE>CVE-2022-44617</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP3</ProductID>
<ProductID>openEuler-22.03-LTS</ProductID>
<ProductID>openEuler-22.03-LTS-SP1</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>7.5</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>libXpm security update</Description>
<DATE>2023-02-10</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1078</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="3" xml:lang="en">A flaw was found in libXpm. This issue occurs when parsing a file with a comment not closed; the end-of-file condition will not be detected, leading to an infinite loop and resulting in a Denial of Service in the application linked to the library.</Note>
</Notes>
<ReleaseDate>2023-02-10</ReleaseDate>
<CVE>CVE-2022-46285</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP3</ProductID>
<ProductID>openEuler-22.03-LTS</ProductID>
<ProductID>openEuler-22.03-LTS-SP1</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>7.5</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>libXpm security update</Description>
<DATE>2023-02-10</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1078</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>