Lucene search

K
debianDebianDEBIAN:DLA-3382-1:3606A
HistoryApr 04, 2023 - 11:34 p.m.

[SECURITY] [DLA 3382-1] openimageio security update

2023-04-0423:34:51
lists.debian.org
9
arbitrary code execution
image file
denial of service
out-of-bounds read
debian lts
openimageio
buffer overflows
security update
debian 10

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

Low

0.005 Low

EPSS

Percentile

76.8%


Debian LTS Advisory DLA-3382-1 [email protected]
https://www.debian.org/lts/security/ Markus Koschany
April 05, 2023 https://wiki.debian.org/LTS

Package : openimageio
Version : 2.0.5~dfsg0-1+deb10u1
CVE ID : CVE-2022-36354 CVE-2022-41639 CVE-2022-41838 CVE-2022-41977
CVE-2022-41981 CVE-2022-41988 CVE-2022-41999 CVE-2022-43592
CVE-2022-43593 CVE-2022-43594 CVE-2022-43595 CVE-2022-43596
CVE-2022-43597 CVE-2022-43598 CVE-2022-43599 CVE-2022-43600
CVE-2022-43601 CVE-2022-43602 CVE-2022-43603
Debian Bug : 1027143 1027808

Multiple security vulnerabilities have been discovered in OpenImageIO, a
library for reading and writing images. Buffer overflows and out-of-bounds
read and write programming errors may lead to a denial of service
(application crash) or the execution of arbitrary code if a malformed image
file is processed.

For Debian 10 buster, these problems have been fixed in version
2.0.5~dfsg0-1+deb10u1.

We recommend that you upgrade your openimageio packages.

For the detailed security status of openimageio please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openimageio

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: This is a digitally signed message part

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

Low

0.005 Low

EPSS

Percentile

76.8%