Lucene search

K
mageiaGentoo FoundationMGASA-2023-0292
HistoryOct 20, 2023 - 11:34 a.m.

Updated libxpm packages fix security vulnerabilities

2023-10-2011:34:20
Gentoo Foundation
advisories.mageia.org
39
libxpm
packages
boundary condition
vulnerability
out-of-bounds read
memory
system
cve-2023-43788
corrupted colormap
unix

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0

Percentile

5.1%

A vulnerability was found in libXpm due to a boundary condition within the XpmCreateXpmImageFromBuffer() function. This flaw allows a local to trigger an out-of-bounds read error and read the contents of memory on the system. (CVE-2023-43788) Out of bounds read on XPM with corrupted colormap. (CVE-2023-43789)

OSVersionArchitecturePackageVersionFilename
Mageia8noarchlibxpm< 3.5.15-1.1libxpm-3.5.15-1.1.mga8
Mageia9noarchlibxpm< 3.5.15-1.1libxpm-3.5.15-1.1.mga9

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0

Percentile

5.1%