Lucene search

K
suseSuseOPENSUSE-SU-2020:0682-1
HistoryMay 23, 2020 - 12:00 a.m.

Security update for openexr (moderate)

2020-05-2300:00:00
lists.opensuse.org
123

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

An update that solves 7 vulnerabilities and has one errata
is now available.

Description:

This update for openexr provides the following fix:

Security issues fixed:

  • CVE-2020-11765: Fixed an off-by-one error in use of the ImfXdr.h read
    function by DwaCompressor:Classifier:Classifier (bsc#1169575).
  • CVE-2020-11764: Fixed an out-of-bounds write in copyIntoFrameBuffer in
    ImfMisc.cpp (bsc#1169574).
  • CVE-2020-11763: Fixed an out-of-bounds read and write, as demonstrated
    by ImfTileOffsets.cpp (bsc#1169576).
  • CVE-2020-11762: Fixed an out-of-bounds read and write in
    DwaCompressor:uncompress in ImfDwaCompressor.cpp when handling the
    UNKNOWN compression case (bsc#1169549).
  • CVE-2020-11761: Fixed an out-of-bounds read during Huffman
    uncompression, as demonstrated by FastHufDecoder:refill in
    ImfFastHuf.cpp (bsc#1169578).
  • CVE-2020-11760: Fixed an out-of-bounds read during RLE uncompression in
    rleUncompress in ImfRle.cpp (bsc#1169580).
  • CVE-2020-11758: Fixed an out-of-bounds read in
    ImfOptimizedPixelReading.h (bsc#1169573).

Non-security issue fixed:

  • Enable tests when building the package on x86_64. (bsc#1146648)

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.1:

    zypper in -t patch openSUSE-2020-682=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.1i586< - openSUSE Leap 15.1 (i586 x86_64):- openSUSE Leap 15.1 (i586 x86_64):.i586.rpm
openSUSE Leap15.1x86_64< - openSUSE Leap 15.1 (i586 x86_64):- openSUSE Leap 15.1 (i586 x86_64):.x86_64.rpm
openSUSE Leap15.1x86_64< - openSUSE Leap 15.1 (x86_64):- openSUSE Leap 15.1 (x86_64):.x86_64.rpm

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P