Lucene search

K
debianDebianDEBIAN:DLA-3236-1:7D297
HistoryDec 11, 2022 - 11:52 p.m.

[SECURITY] [DLA 3236-1] openexr security update

2022-12-1123:52:53
lists.debian.org
23

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.002 Low

EPSS

Percentile

52.0%


Debian LTS Advisory DLA-3236-1 [email protected]
https://www.debian.org/lts/security/ Markus Koschany
December 12, 2022 https://wiki.debian.org/LTS

Package : openexr
Version : 2.2.1-4.1+deb10u2
CVE ID : CVE-2020-16587 CVE-2020-16588 CVE-2020-16589 CVE-2021-3474
CVE-2021-3475 CVE-2021-3476 CVE-2021-3477 CVE-2021-3478
CVE-2021-3479 CVE-2021-3598 CVE-2021-3605 CVE-2021-3933
CVE-2021-3941 CVE-2021-20296 CVE-2021-20298 CVE-2021-20299
CVE-2021-20300 CVE-2021-20302 CVE-2021-20303 CVE-2021-23215
CVE-2021-26260 CVE-2021-45942
Debian Bug : 986796 992703 990450 990899 1014828

Multiple security vulnerabilities have been found in OpenEXR, command-line
tools and a library for the OpenEXR image format. Buffer overflows or
out-of-bound reads could lead to a denial of service (application crash) if
a malformed image file is processed.

For Debian 10 buster, these problems have been fixed in version
2.2.1-4.1+deb10u2.

We recommend that you upgrade your openexr packages.

For the detailed security status of openexr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openexr

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: This is a digitally signed message part

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.002 Low

EPSS

Percentile

52.0%