Bug 56178 - libxpm: Multiple issues (5.0)
libxpm: Multiple issues (5.0)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 5.0
All Linux
: P3 normal (vote)
: UCS 5.0-4-errata
Assigned To: Quality Assurance
Philipp Hahn
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2023-06-21 06:36 CEST by Quality Assurance
Modified: 2023-06-21 12:33 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2023-06-21 06:36:02 CEST
New Debian libxpm 1:3.5.12-1+deb10u1 fixes:
This update addresses the following issues:
1:3.5.12-1+deb10u1 (Mon, 19 Jun 2023 20:27:53 +0000)
* Non-maintainer upload by the LTS Security Team.
* Switch to dpkg-source 3.0 (quilt) format
* Fix CVE-2022-4883: When processing files with .Z or .gz extensions, the  library calls external programs to compress and uncompress files, relying  on the PATH environment variable to find these programs, which could allow  a malicious user to execute other programs by manipulating the PATH  environment variable.
* Fix CVE-2022-44617: When processing a file with width of 0 and a very large  height, some parser functions will be called repeatedly and can lead to an  infinite loop, resulting in a Denial of Service in the application linked  to the library.
* Fix CVE-2022-46285: when parsing a file with a comment not closed an  end-of-file condition will not be detected, leading to an infinite loop and  resulting in a Denial of Service in the application linked to the library.
Comment 1 Quality Assurance univentionstaff 2023-06-21 07:35:15 CEST
--- mirror/ftp/pool/main/libx/libxpm/libxpm_3.5.12-1.dsc
+++ apt/ucs_5.0-0-errata5.0-4/source/libxpm_3.5.12-1+deb10u1.dsc
@@ -1,3 +1,23 @@
+1:3.5.12-1+deb10u1 [Mon, 19 Jun 2023 20:27:53 +0000] Bastien Roucaries <rouca@debian.org>:
+
+  * Non-maintainer upload by the LTS Security Team.
+  * Switch to dpkg-source 3.0 (quilt) format
+  * Fix CVE-2022-4883: When processing files with
+    .Z or .gz extensions, the library calls external programs
+    to compress and uncompress files, relying on the
+    PATH environment variable to find these programs,
+    which could allow a malicious user to execute other programs
+    by manipulating the PATH environment variable.
+  * Fix CVE-2022-44617: When processing a file with width of 0
+    and a very large height, some parser functions will be
+    called repeatedly and can lead to an infinite loop,
+    resulting in a Denial of Service in the application linked
+    to the library.
+  * Fix CVE-2022-46285: when parsing a file with a comment
+    not closed an end-of-file condition will not be detected,
+    leading to an infinite loop and resulting in a
+    Denial of Service in the application linked to the library.
+
 1:3.5.12-1 [Thu, 22 Dec 2016 17:17:47 +0100] Emilio Pozuelo Monfort <pochu@debian.org>:
 
   [ Andreas Boll ]

<http://piuparts.knut.univention.de/5.0-4/#1905262265880957335>
Comment 2 Philipp Hahn univentionstaff 2023-06-21 07:56:02 CEST
OK: bug
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[5.0-4] cc9e2c6189 Bug #56178: libxpm 1:3.5.12-1+deb10u1
 doc/errata/staging/libxpm.yaml | 17 +++++++----------
 1 file changed, 7 insertions(+), 10 deletions(-)

[5.0-4] 273fd0251a Bug #56178: libxpm 1:3.5.12-1+deb10u1
 doc/errata/staging/libxpm.yaml | 28 ++++++++++++++++++++++++++++
 1 file changed, 28 insertions(+)