An update for OpenEXR is now available for openEuler-20.03-LTS-SP1 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2021-1167 Final 1.0 1.0 2021-05-06 Initial 2021-05-06 2021-05-06 openEuler SA Tool V1.0 2021-05-06 OpenEXR security update An update for OpenEXR is now available for openEuler-20.03-LTS-SP1. OpenEXR is a high dynamic-range (HDR) image file format originally developed by Industrial Light & Magic for use in computer imaging applications. Security Fix(es): There's a flaw in OpenEXR in versions before 3.0.0-beta. A crafted input file that is processed by OpenEXR could cause a shift overflow in the FastHufDecoder, potentially leading to problems with application availability.(CVE-2021-3474) There's a flaw in OpenEXR's deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability.(CVE-2021-3477) There is a flaw in OpenEXR in versions before 3.0.0-beta. An attacker who can submit a crafted file to be processed by OpenEXR could cause an integer overflow, potentially leading to problems with application availability.(CVE-2021-3475) A flaw was found in OpenEXR in versions before 3.0.0-beta. A crafted input file supplied by an attacker, that is processed by the Dwa decompression functionality of OpenEXR's IlmImf library, could cause a NULL pointer dereference. The highest threat from this vulnerability is to system availability.(CVE-2021-20296) A flaw was found in OpenEXR's B44 uncompression functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to OpenEXR could trigger shift overflows, potentially affecting application availability.(CVE-2021-3476) There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.(CVE-2021-3479) An update for OpenEXR is now available for openEuler-20.03-LTS-SP1. openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Medium OpenEXR https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1167 https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-3474 https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-3477 https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-3475 https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-20296 https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-3476 https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-3479 https://nvd.nist.gov/vuln/detail/CVE-2021-3474 https://nvd.nist.gov/vuln/detail/CVE-2021-3477 https://nvd.nist.gov/vuln/detail/CVE-2021-3475 https://nvd.nist.gov/vuln/detail/CVE-2021-20296 https://nvd.nist.gov/vuln/detail/CVE-2021-3476 https://nvd.nist.gov/vuln/detail/CVE-2021-3479 openEuler-20.03-LTS-SP1 OpenEXR-libs-2.2.0-19.oe1.aarch64.rpm OpenEXR-debuginfo-2.2.0-19.oe1.aarch64.rpm OpenEXR-devel-2.2.0-19.oe1.aarch64.rpm OpenEXR-debugsource-2.2.0-19.oe1.aarch64.rpm OpenEXR-2.2.0-19.oe1.aarch64.rpm OpenEXR-2.2.0-19.oe1.src.rpm OpenEXR-libs-2.2.0-19.oe1.x86_64.rpm OpenEXR-debugsource-2.2.0-19.oe1.x86_64.rpm OpenEXR-devel-2.2.0-19.oe1.x86_64.rpm OpenEXR-debuginfo-2.2.0-19.oe1.x86_64.rpm OpenEXR-2.2.0-19.oe1.x86_64.rpm There's a flaw in OpenEXR in versions before 3.0.0-beta. A crafted input file that is processed by OpenEXR could cause a shift overflow in the FastHufDecoder, potentially leading to problems with application availability. 2021-05-06 CVE-2021-3474 openEuler-20.03-LTS-SP1 Medium 5.3 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L OpenEXR security update 2021-05-06 https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1167 There's a flaw in OpenEXR's deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability. 2021-05-06 CVE-2021-3477 openEuler-20.03-LTS-SP1 Medium 5.5 AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H OpenEXR security update 2021-05-06 https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1167 There is a flaw in OpenEXR in versions before 3.0.0-beta. An attacker who can submit a crafted file to be processed by OpenEXR could cause an integer overflow, potentially leading to problems with application availability. 2021-05-06 CVE-2021-3475 openEuler-20.03-LTS-SP1 Medium 5.3 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L OpenEXR security update 2021-05-06 https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1167 A flaw was found in OpenEXR in versions before 3.0.0-beta. A crafted input file supplied by an attacker, that is processed by the Dwa decompression functionality of OpenEXR's IlmImf library, could cause a NULL pointer dereference. The highest threat from this vulnerability is to system availability. 2021-05-06 CVE-2021-20296 openEuler-20.03-LTS-SP1 Medium 5.3 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L OpenEXR security update 2021-05-06 https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1167 A flaw was found in OpenEXR's B44 uncompression functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to OpenEXR could trigger shift overflows, potentially affecting application availability. 2021-05-06 CVE-2021-3476 openEuler-20.03-LTS-SP1 Medium 5.3 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L OpenEXR security update 2021-05-06 https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1167 There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability. 2021-05-06 CVE-2021-3479 openEuler-20.03-LTS-SP1 Medium 5.5 AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H OpenEXR security update 2021-05-06 https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1167