Amazon Linux 2 Security Advisory: ALAS-2023-1962
Advisory Release Date: 2023-02-17 00:12 Pacific
Advisory Updated Date: 2023-02-22 01:53 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library. (CVE-2022-44617)
A flaw was found in libXpm. This issue occurs when parsing a file with a comment not closed; the end-of-file condition will not be detected, leading to an infinite loop and resulting in a Denial of Service in the application linked to the library. (CVE-2022-46285)
A flaw was found in libXpm. When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable. (CVE-2022-4883)
Affected Packages:
libXpm
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update libXpm to update your system.
aarch64:
libXpm-3.5.12-9.amzn2.0.1.aarch64
libXpm-devel-3.5.12-9.amzn2.0.1.aarch64
libXpm-debuginfo-3.5.12-9.amzn2.0.1.aarch64
i686:
libXpm-3.5.12-9.amzn2.0.1.i686
libXpm-devel-3.5.12-9.amzn2.0.1.i686
libXpm-debuginfo-3.5.12-9.amzn2.0.1.i686
src:
libXpm-3.5.12-9.amzn2.0.1.src
x86_64:
libXpm-3.5.12-9.amzn2.0.1.x86_64
libXpm-devel-3.5.12-9.amzn2.0.1.x86_64
libXpm-debuginfo-3.5.12-9.amzn2.0.1.x86_64