Hide Forgot
By default, on all platforms except MinGW, libXpm will detect if a filename ends in .Z or .gz, and will when reading such a file fork off an uncompress or gunzip command to read from via a pipe, and when writing such a file will fork off a compress or gzip command to write to via a pipe. In libXpm 3.5.14 or older these are run via execlp(), relying on $PATH to find the commands. If libXpm is called from a program running with raised privileges, such as via setuid, then a malicious user could set $PATH to include programs of their choosing to be run with those privileges.
Created libXpm tracking bugs for this issue: Affects: fedora-all [bug 2161711]
Reference: https://lists.x.org/archives/xorg-announce/2023-January/003312.html Upstream patch: https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/515294bb8023a45ff91669 https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/8178eb0834d82242e1edbc
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:0377 https://access.redhat.com/errata/RHSA-2023:0377
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2023:0384 https://access.redhat.com/errata/RHSA-2023:0384
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2023:0380 https://access.redhat.com/errata/RHSA-2023:0380
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:0383 https://access.redhat.com/errata/RHSA-2023:0383
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0379 https://access.redhat.com/errata/RHSA-2023:0379
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:0378 https://access.redhat.com/errata/RHSA-2023:0378
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:0381 https://access.redhat.com/errata/RHSA-2023:0381
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2023:0382 https://access.redhat.com/errata/RHSA-2023:0382
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-4883