Lucene search

K
debianDebianDEBIAN:DSA-5384-1:C42DB
HistoryApr 10, 2023 - 9:18 a.m.

[SECURITY] [DSA 5384-1] openimageio security update

2023-04-1009:18:20
lists.debian.org
13
debian bug 1027143
cve-2022-43603
cve-2022-41981
cve-2022-41999
cve-2022-43598
bullseye
debian bug 1027808
cve-2022-43602
cve-2022-36354
cve-2022-43600
arbitrary code execution
debian
debian
cve-2022-43596
cve-2022-41684
denial of service
cve-2022-43601
cve-2022-41837
cve-2022-43593
cve-2022-43597
cve-2022-43594
cve-2022-41838
cve-2022-41639
cve-2022-41649
openimageio
cve-2022-41794
security tracker.
buffer overflows
cve-2022-41988
cve-2022-41977
cve-2022-43595
security update
cve-2022-43599
cve-2022-43592

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

Low

0.005 Low

EPSS

Percentile

76.8%


Debian Security Advisory DSA-5384-1 [email protected]
https://www.debian.org/security/ Markus Koschany
April 10, 2023 https://www.debian.org/security/faq


Package : openimageio
CVE ID : CVE-2022-36354 CVE-2022-41639 CVE-2022-41649 CVE-2022-41684
CVE-2022-41794 CVE-2022-41837 CVE-2022-41838 CVE-2022-41977
CVE-2022-41981 CVE-2022-41988 CVE-2022-41999 CVE-2022-43592
CVE-2022-43593 CVE-2022-43594 CVE-2022-43595 CVE-2022-43596
CVE-2022-43597 CVE-2022-43598 CVE-2022-43599 CVE-2022-43600
CVE-2022-43601 CVE-2022-43602 CVE-2022-43603
Debian Bug : 1027143 1027808

Multiple security vulnerabilities have been discovered in OpenImageIO, a
library for reading and writing images. Buffer overflows and out-of-bounds
read and write programming errors may lead to a denial of service
(application crash) or the execution of arbitrary code if a malformed image
file is processed.

For the stable distribution (bullseye), these problems have been fixed in
version 2.2.10.1+dfsg-1+deb11u1.

We recommend that you upgrade your openimageio packages.

For the detailed security status of openimageio please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openimageio

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

Low

0.005 Low

EPSS

Percentile

76.8%