Security
Headlines
HeadlinesLatestCVEs

Headline

Red Hat Security Advisory 2023-3067-01

Red Hat Security Advisory 2023-3067-01 - AutoTrace is a program for converting bitmaps to vector graphics. Issues addressed include a buffer overflow vulnerability.

Packet Storm
#vulnerability#linux#red_hat#js#buffer_overflow

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: autotrace security update
Advisory ID: RHSA-2023:3067-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2023:3067
Issue date: 2023-05-16
CVE Names: CVE-2022-32323
====================================================================

  1. Summary:

An update for autotrace is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux CRB (v. 8) - aarch64, ppc64le, s390x, x86_64

  1. Description:

AutoTrace is a program for converting bitmaps to vector graphics.

Security Fix(es):

  • autotrace: heap-buffer overflow via the ReadImage() at input-bmp.c
    (CVE-2022-32323)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.8 Release Notes linked from the References section.

  1. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

2107471 - CVE-2022-32323 autotrace: heap-buffer overflow via the ReadImage() at input-bmp.c

  1. Package List:

Red Hat Enterprise Linux CRB (v. 8):

Source:
autotrace-0.31.1-55.el8.src.rpm

aarch64:
autotrace-0.31.1-55.el8.aarch64.rpm
autotrace-debuginfo-0.31.1-55.el8.aarch64.rpm
autotrace-debugsource-0.31.1-55.el8.aarch64.rpm

ppc64le:
autotrace-0.31.1-55.el8.ppc64le.rpm
autotrace-debuginfo-0.31.1-55.el8.ppc64le.rpm
autotrace-debugsource-0.31.1-55.el8.ppc64le.rpm

s390x:
autotrace-0.31.1-55.el8.s390x.rpm
autotrace-debuginfo-0.31.1-55.el8.s390x.rpm
autotrace-debugsource-0.31.1-55.el8.s390x.rpm

x86_64:
autotrace-0.31.1-55.el8.i686.rpm
autotrace-0.31.1-55.el8.x86_64.rpm
autotrace-debuginfo-0.31.1-55.el8.i686.rpm
autotrace-debuginfo-0.31.1-55.el8.x86_64.rpm
autotrace-debugsource-0.31.1-55.el8.i686.rpm
autotrace-debugsource-0.31.1-55.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2022-32323
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index

  1. Contact:

The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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Q1x0
-----END PGP SIGNATURE-----

RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

Related news

RHSA-2023:3067: Red Hat Security Advisory: autotrace security update

An update for autotrace is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32323: A buffer overflow flaw was found in the autotrace package. This flaw allows an attacker to trick the user into opening a maliciously crafted BMP image, triggering arbitrary code execution or causing the application to crash.

RHSA-2023:2589: Red Hat Security Advisory: autotrace security update

An update for autotrace is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32323: A buffer overflow flaw was found in the autotrace package. This flaw allows an attacker to trick the user into opening a maliciously crafted BMP image, triggering arbitrary code execution or causing the application to crash.

CVE-2022-32323: Merge pull request #72 from lemenkov/misleading_indentation · autotrace/autotrace@2b44c17

AutoTrace v0.40.0 was discovered to contain a heap overflow via the ReadImage function at input-bmp.c:660.

Packet Storm: Latest News

Ubuntu Security Notice USN-7089-6