An update for OpenEXR is now available for openEuler-20.03-LTS-SP1
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2021-1167
Final
1.0
1.0
2021-05-06
Initial
2021-05-06
2021-05-06
openEuler SA Tool V1.0
2021-05-06
OpenEXR security update
An update for OpenEXR is now available for openEuler-20.03-LTS-SP1.
OpenEXR is a high dynamic-range (HDR) image file format originally developed by Industrial Light & Magic for use in computer imaging applications.
Security Fix(es):
There's a flaw in OpenEXR in versions before 3.0.0-beta. A crafted input file that is processed by OpenEXR could cause a shift overflow in the FastHufDecoder, potentially leading to problems with application availability.(CVE-2021-3474)
There's a flaw in OpenEXR's deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability.(CVE-2021-3477)
There is a flaw in OpenEXR in versions before 3.0.0-beta. An attacker who can submit a crafted file to be processed by OpenEXR could cause an integer overflow, potentially leading to problems with application availability.(CVE-2021-3475)
A flaw was found in OpenEXR in versions before 3.0.0-beta. A crafted input file supplied by an attacker, that is processed by the Dwa decompression functionality of OpenEXR's IlmImf library, could cause a NULL pointer dereference. The highest threat from this vulnerability is to system availability.(CVE-2021-20296)
A flaw was found in OpenEXR's B44 uncompression functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to OpenEXR could trigger shift overflows, potentially affecting application availability.(CVE-2021-3476)
There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.(CVE-2021-3479)
An update for OpenEXR is now available for openEuler-20.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Medium
OpenEXR
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1167
https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-3474
https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-3477
https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-3475
https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-20296
https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-3476
https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-3479
https://nvd.nist.gov/vuln/detail/CVE-2021-3474
https://nvd.nist.gov/vuln/detail/CVE-2021-3477
https://nvd.nist.gov/vuln/detail/CVE-2021-3475
https://nvd.nist.gov/vuln/detail/CVE-2021-20296
https://nvd.nist.gov/vuln/detail/CVE-2021-3476
https://nvd.nist.gov/vuln/detail/CVE-2021-3479
openEuler-20.03-LTS-SP1
OpenEXR-libs-2.2.0-19.oe1.aarch64.rpm
OpenEXR-debuginfo-2.2.0-19.oe1.aarch64.rpm
OpenEXR-devel-2.2.0-19.oe1.aarch64.rpm
OpenEXR-debugsource-2.2.0-19.oe1.aarch64.rpm
OpenEXR-2.2.0-19.oe1.aarch64.rpm
OpenEXR-2.2.0-19.oe1.src.rpm
OpenEXR-libs-2.2.0-19.oe1.x86_64.rpm
OpenEXR-debugsource-2.2.0-19.oe1.x86_64.rpm
OpenEXR-devel-2.2.0-19.oe1.x86_64.rpm
OpenEXR-debuginfo-2.2.0-19.oe1.x86_64.rpm
OpenEXR-2.2.0-19.oe1.x86_64.rpm
There's a flaw in OpenEXR in versions before 3.0.0-beta. A crafted input file that is processed by OpenEXR could cause a shift overflow in the FastHufDecoder, potentially leading to problems with application availability.
2021-05-06
CVE-2021-3474
openEuler-20.03-LTS-SP1
Medium
5.3
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
OpenEXR security update
2021-05-06
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1167
There's a flaw in OpenEXR's deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability.
2021-05-06
CVE-2021-3477
openEuler-20.03-LTS-SP1
Medium
5.5
AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
OpenEXR security update
2021-05-06
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1167
There is a flaw in OpenEXR in versions before 3.0.0-beta. An attacker who can submit a crafted file to be processed by OpenEXR could cause an integer overflow, potentially leading to problems with application availability.
2021-05-06
CVE-2021-3475
openEuler-20.03-LTS-SP1
Medium
5.3
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
OpenEXR security update
2021-05-06
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1167
A flaw was found in OpenEXR in versions before 3.0.0-beta. A crafted input file supplied by an attacker, that is processed by the Dwa decompression functionality of OpenEXR's IlmImf library, could cause a NULL pointer dereference. The highest threat from this vulnerability is to system availability.
2021-05-06
CVE-2021-20296
openEuler-20.03-LTS-SP1
Medium
5.3
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
OpenEXR security update
2021-05-06
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1167
A flaw was found in OpenEXR's B44 uncompression functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to OpenEXR could trigger shift overflows, potentially affecting application availability.
2021-05-06
CVE-2021-3476
openEuler-20.03-LTS-SP1
Medium
5.3
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
OpenEXR security update
2021-05-06
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1167
There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.
2021-05-06
CVE-2021-3479
openEuler-20.03-LTS-SP1
Medium
5.5
AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
OpenEXR security update
2021-05-06
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1167