MGASA-2023-0292

Source
https://advisories.mageia.org/MGASA-2023-0292.html
Import Source
https://advisories.mageia.org/MGASA-2023-0292.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2023-0292
Related
Published
2023-10-20T08:34:20Z
Modified
2023-10-20T07:16:09Z
Summary
Updated libxpm packages fix security vulnerabilities
Details

A vulnerability was found in libXpm due to a boundary condition within the XpmCreateXpmImageFromBuffer() function. This flaw allows a local to trigger an out-of-bounds read error and read the contents of memory on the system. (CVE-2023-43788)

Out of bounds read on XPM with corrupted colormap. (CVE-2023-43789)

References
Credits

Affected packages

Mageia:8 / libxpm

Package

Name
libxpm
Purl
pkg:rpm/mageia/libxpm?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5.15-1.1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:9 / libxpm

Package

Name
libxpm
Purl
pkg:rpm/mageia/libxpm?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5.15-1.1.mga9

Ecosystem specific

{
    "section": "core"
}