Show plain JSON{"affected_release": [{"advisory": "RHSA-2023:0377", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "libXpm-0:3.5.12-2.el7_9", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2023-01-23T00:00:00Z"}, {"advisory": "RHSA-2023:0379", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "libXpm-0:3.5.12-9.el8_7", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2023-01-23T00:00:00Z"}, {"advisory": "RHSA-2023:0384", "cpe": "cpe:/a:redhat:rhel_e4s:8.1", "package": "libXpm-0:3.5.12-9.el8_1", "product_name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions", "release_date": "2023-01-23T00:00:00Z"}, {"advisory": "RHSA-2023:0380", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "libXpm-0:3.5.12-9.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2023-01-23T00:00:00Z"}, {"advisory": "RHSA-2023:0380", "cpe": "cpe:/a:redhat:rhel_tus:8.2", "package": "libXpm-0:3.5.12-9.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "release_date": "2023-01-23T00:00:00Z"}, {"advisory": "RHSA-2023:0380", "cpe": "cpe:/a:redhat:rhel_e4s:8.2", "package": "libXpm-0:3.5.12-9.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "release_date": "2023-01-23T00:00:00Z"}, {"advisory": "RHSA-2023:0382", "cpe": "cpe:/a:redhat:rhel_eus:8.4", "package": "libXpm-0:3.5.12-9.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Extended Update Support", "release_date": "2023-01-23T00:00:00Z"}, {"advisory": "RHSA-2023:0378", "cpe": "cpe:/a:redhat:rhel_eus:8.6", "package": "libXpm-0:3.5.12-9.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support", "release_date": "2023-01-23T00:00:00Z"}, {"advisory": "RHSA-2023:0383", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "libXpm-0:3.5.13-8.el9_1", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2023-01-23T00:00:00Z"}, {"advisory": "RHSA-2023:0381", "cpe": "cpe:/a:redhat:rhel_eus:9.0", "package": "libXpm-0:3.5.13-8.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "release_date": "2023-01-23T00:00:00Z"}], "bugzilla": {"description": "libXpm: compression commands depend on $PATH", "id": "2160213", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160213"}, "csaw": false, "cvss3": {"cvss3_base_score": "8.1", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "status": "verified"}, "cwe": "CWE-426", "details": ["A flaw was found in libXpm. When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable.", "A flaw was found in libXpm. When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable."], "mitigation": {"lang": "en:us", "value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."}, "name": "CVE-2022-4883", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "libXpm", "product_name": "Red Hat Enterprise Linux 6"}], "public_date": "2023-01-17T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2022-4883\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-4883\nhttps://lists.x.org/archives/xorg-announce/2023-January/003312.html"], "statement": "Red Hat Enterprise Linux 6 is affected but out of support scope because libXpm is not listed in Red Hat Enterprise Linux 6 ELS Inclusion List[1].\n[1]. https://access.redhat.com/articles/4997301", "threat_severity": "Important"}