There's a flaw in OpenEXR's deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability.
{ "binaries": [ { "binary_name": "libopenexr-dev", "binary_version": "2.2.0-10ubuntu2.6" }, { "binary_name": "libopenexr22", "binary_version": "2.2.0-10ubuntu2.6" }, { "binary_name": "libopenexr22-dbgsym", "binary_version": "2.2.0-10ubuntu2.6" }, { "binary_name": "openexr", "binary_version": "2.2.0-10ubuntu2.6" }, { "binary_name": "openexr-dbgsym", "binary_version": "2.2.0-10ubuntu2.6" }, { "binary_name": "openexr-doc", "binary_version": "2.2.0-10ubuntu2.6" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "libopenexr-dev", "binary_version": "2.2.0-11.1ubuntu1.6" }, { "binary_name": "libopenexr22", "binary_version": "2.2.0-11.1ubuntu1.6" }, { "binary_name": "libopenexr22-dbgsym", "binary_version": "2.2.0-11.1ubuntu1.6" }, { "binary_name": "openexr", "binary_version": "2.2.0-11.1ubuntu1.6" }, { "binary_name": "openexr-dbgsym", "binary_version": "2.2.0-11.1ubuntu1.6" }, { "binary_name": "openexr-doc", "binary_version": "2.2.0-11.1ubuntu1.6" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "libopenexr-dev", "binary_version": "2.3.0-6ubuntu0.5" }, { "binary_name": "libopenexr24", "binary_version": "2.3.0-6ubuntu0.5" }, { "binary_name": "libopenexr24-dbgsym", "binary_version": "2.3.0-6ubuntu0.5" }, { "binary_name": "openexr", "binary_version": "2.3.0-6ubuntu0.5" }, { "binary_name": "openexr-dbgsym", "binary_version": "2.3.0-6ubuntu0.5" }, { "binary_name": "openexr-doc", "binary_version": "2.3.0-6ubuntu0.5" } ], "availability": "No subscription required" }