It was discovered that OpenEXR incorrectly handled certain malformed EXR image files. If a user were tricked into opening a crafted EXR image file, a remote attacker could cause a denial of service, or possibly execute arbitrary code.
{ "binaries": [ { "binary_name": "libopenexr-dev", "binary_version": "2.2.0-10ubuntu2.3" }, { "binary_name": "libopenexr22", "binary_version": "2.2.0-10ubuntu2.3" }, { "binary_name": "libopenexr22-dbgsym", "binary_version": "2.2.0-10ubuntu2.3" }, { "binary_name": "openexr", "binary_version": "2.2.0-10ubuntu2.3" }, { "binary_name": "openexr-dbgsym", "binary_version": "2.2.0-10ubuntu2.3" }, { "binary_name": "openexr-doc", "binary_version": "2.2.0-10ubuntu2.3" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "libopenexr-dev", "binary_version": "2.2.0-11.1ubuntu1.3" }, { "binary_name": "libopenexr22", "binary_version": "2.2.0-11.1ubuntu1.3" }, { "binary_name": "libopenexr22-dbgsym", "binary_version": "2.2.0-11.1ubuntu1.3" }, { "binary_name": "openexr", "binary_version": "2.2.0-11.1ubuntu1.3" }, { "binary_name": "openexr-dbgsym", "binary_version": "2.2.0-11.1ubuntu1.3" }, { "binary_name": "openexr-doc", "binary_version": "2.2.0-11.1ubuntu1.3" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "libopenexr-dev", "binary_version": "2.3.0-6ubuntu0.2" }, { "binary_name": "libopenexr24", "binary_version": "2.3.0-6ubuntu0.2" }, { "binary_name": "libopenexr24-dbgsym", "binary_version": "2.3.0-6ubuntu0.2" }, { "binary_name": "openexr", "binary_version": "2.3.0-6ubuntu0.2" }, { "binary_name": "openexr-dbgsym", "binary_version": "2.3.0-6ubuntu0.2" }, { "binary_name": "openexr-doc", "binary_version": "2.3.0-6ubuntu0.2" } ], "availability": "No subscription required" }