Search for packages
| purl | pkg:deb/debian/libxpm@1:3.5.11-1 |
| Next non-vulnerable version | 1:3.5.12-1.1+deb11u1 |
| Latest non-vulnerable version | 1:3.5.12-1.1+deb11u1 |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-2er3-yqx2-kkha
Aliases: CVE-2023-43788 |
Out-of-bounds Read A vulnerability was found in libXpm due to a boundary condition within the `XpmCreateXpmImageFromBuffer()` function. This flaw allows a local to trigger an out-of-bounds read error and read the contents of memory on the system. |
Affected by 0 other vulnerabilities. |
|
VCID-9dvt-v4ar-sfbn
Aliases: CVE-2016-10164 |
An integer overflow in libXpm might allow remote attackers to execute arbitrary code or cause a Denial of Service Condition. |
Affected by 6 other vulnerabilities. Affected by 5 other vulnerabilities. |
|
VCID-n7q9-a364-6uc2
Aliases: CVE-2022-44617 |
Loop with Unreachable Exit Condition ('Infinite Loop') A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library. |
Affected by 0 other vulnerabilities. |
|
VCID-ps42-12hh-37fh
Aliases: CVE-2023-43789 |
Out-of-bounds Read A vulnerability was found in libXpm where a vulnerability exists due to a boundary condition, a local user can trigger an out-of-bounds read error and read contents of memory on the system. |
Affected by 0 other vulnerabilities. |
|
VCID-r9ag-ykhs-h3cz
Aliases: CVE-2022-46285 |
Loop with Unreachable Exit Condition ('Infinite Loop') A flaw was found in libXpm. This issue occurs when parsing a file with a comment not closed; the end-of-file condition will not be detected, leading to an infinite loop and resulting in a Denial of Service in the application linked to the library. |
Affected by 0 other vulnerabilities. |
|
VCID-xq3s-t6bh-pydz
Aliases: CVE-2022-4883 |
Untrusted Search Path A flaw was found in libXpm. When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||