A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library.
References
Configurations
History
21 Nov 2024, 07:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2160193 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb28 - | |
References | () https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9 - | |
References | () https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html - | |
References | () https://lists.x.org/archives/xorg-announce/2023-January/003312.html - | |
Summary |
|
17 Oct 2023, 15:55
Type | Values Removed | Values Added |
---|---|---|
First Time |
X.org libxpm
X.org |
|
CPE | cpe:2.3:a:x.org:libxpm:*:*:*:*:*:*:*:* |
20 Jun 2023, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2023-02-06 23:15
Updated : 2024-11-21 07:28
NVD link : CVE-2022-44617
Mitre link : CVE-2022-44617
CVE.ORG link : CVE-2022-44617
JSON object : View
Products Affected
x.org
- libxpm