{"id":"CVE-2022-4883","details":"A flaw was found in libXpm. When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable.","modified":"2026-04-02T08:30:16.839201Z","published":"2023-02-07T19:15:09.223Z","related":["ALSA-2023:0379","ALSA-2023:0383","MGASA-2023-0031","SUSE-SU-2023:0165-1","SUSE-SU-2023:0171-1","openSUSE-SU-2024:12617-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00021.html"},{"type":"WEB","url":"https://lists.x.org/archives/xorg-announce/2023-January/003312.html"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2160213"},{"type":"FIX","url":"https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/515294bb8023a45ff91669"},{"type":"FIX","url":"https://gitlab.freedesktop.org/xorg/lib/libxpm/-/merge_requests/9"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.freedesktop.org/xorg/lib/libxpm","events":[{"introduced":"0"},{"fixed":"ddd8339e262cbb7b25993599299ad40e0c95ccf6"},{"fixed":"515294bb8023a45ff91669"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.5.15"}]}}],"versions":["CYGWIN-6_8_0-MERGE","CYGWIN-6_8_1-MERGE","CYGWIN-6_8_2-MERGE","CYGWIN-HEAD-LAST-MERGE","CYGWIN-HEAD-MERGE","CYGWIN-PRE-6_8_0-MERGE","CYGWIN-RELEASE-1-MERGE","DAMAGE-XFIXES-BASE","IPv6-REVIEW-BASE","MODULAR_COPY","XACE-SELINUX-BASE","XACE-SELINUX-MERGE","XEVIE-BASE","XEVIE-MERGE","XORG-6_7_0","XORG-6_7_99_1","XORG-6_7_99_2","XORG-6_7_99_901","XORG-6_7_99_902","XORG-6_7_99_903","XORG-6_7_99_904","XORG-6_8_0","XORG-6_8_1","XORG-6_8_1_901","XORG-6_8_1_902","XORG-6_8_1_903","XORG-6_8_1_904","XORG-6_8_2","XORG-6_8_99_1","XORG-6_8_99_10","XORG-6_8_99_11","XORG-6_8_99_12","XORG-6_8_99_13","XORG-6_8_99_14","XORG-6_8_99_15","XORG-6_8_99_16","XORG-6_8_99_2","XORG-6_8_99_3","XORG-6_8_99_4","XORG-6_8_99_5","XORG-6_8_99_6","XORG-6_8_99_7","XORG-6_8_99_8","XORG-6_8_99_9","XORG-6_8_99_900","XORG-6_8_99_901","XORG-6_8_99_902","XORG-6_8_99_903","XORG-6_99_99_900","XORG-6_99_99_901","XORG-6_99_99_902","XORG-6_99_99_903","XORG-6_99_99_904","XORG-7_0","XORG-7_0_99_901","XORG-7_1","XORG-CURRENT-CLOSED","XORG-CURRENT-premerge-release-1","XORG-CYGWIN-LAST-MERGE","XORG-CYGWIN-MERGE","XORG-RELEASE-1-BASE","XORG-RELEASE-1-MERGE","XORG-RELEASE-1-STSF-FORK","XORG-RELEASE-1-TM-BASE","XORG-RELEASE-1-TM-CLOSED","XORG-RELEASE-1-TM-MERGE","XORG-TM-CYGWIN-LAST-MERGE","XORG-TM-CYGWIN-MERGE","XPRINT_BASE","XPRINT_BEGIN","before_20040421_xprint_branch_landing","lg3d-base","lg3d-rel-0-6-2","lg3d-rel-0-7-0","libXpm-3.5.10","libXpm-3.5.11","libXpm-3.5.12","libXpm-3.5.13","libXpm-3.5.14","libXpm-3.5.6","libXpm-3.5.7","libXpm-3.5.8","libXpm-3.5.9","libXpm-3_5_5","rel-0-6-1","sco_port_update-base","xf86-012804-2330","xf86-4_3_0_1","xf86-4_3_99_16","xf86-4_3_99_901","xf86-4_3_99_902","xf86-4_3_99_903","xf86-4_3_99_903_special","xf86-4_4_0","xf86-4_4_99_1","xo-6_7_0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-4883.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}