VARIoT IoT vulnerabilities database
| VAR-202004-1813 | CVE-2020-8319 | Lenovo System Interface Foundation Vulnerability related to authority management in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A privilege escalation vulnerability was reported in Lenovo System Interface Foundation prior to version 1.1.19.3 that could allow an authenticated user to execute code with elevated privileges. Lenovo System Interface Foundation Exists in a privilege management vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Lenovo System Interface Foundation is a set of software used by China Lenovo (Lenovo) to communicate with hardware devices. A security vulnerability exists in Lenovo System Interface Foundation
| VAR-202004-1812 | CVE-2020-8318 | Lenovo System Interface Foundation for LenovoSystemUpdatePlugin Vulnerability related to authority management in |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A privilege escalation vulnerability was reported in the LenovoSystemUpdatePlugin for Lenovo System Interface Foundation prior to version that could allow an authenticated user to execute code with elevated privileges. Lenovo System Interface Foundation for LenovoSystemUpdatePlugin Exists in a privilege management vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Lenovo System Interface Foundation is a set of software used by China Lenovo (Lenovo) to communicate with hardware devices. A security vulnerability exists in the LenovoSystemUpdatePlugin in the Lenovo System Interface Foundation
| VAR-202004-1811 | CVE-2020-8316 | Lenovo Vantage Vulnerability regarding information leakage in |
CVSS V2: 2.1 CVSS V3: 4.4 Severity: MEDIUM |
A vulnerability was reported in Lenovo Vantage prior to version 10.2003.10.0 that could allow an authenticated user to read files on the system with elevated privileges. Lenovo Vantage There is an information leakage vulnerability in.Information may be obtained. Lenovo Vantage is a computer management application program of Lenovo Corporation in China. The program supports features such as driver updates, device status diagnostics, and computer configuration
| VAR-202004-0475 | CVE-2020-11765 | OpenEXR Vulnerability in determining boundary conditions in |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: MEDIUM |
An issue was discovered in OpenEXR before 2.4.1. There is an off-by-one error in use of the ImfXdr.h read function by DwaCompressor::Classifier::Classifier, leading to an out-of-bounds read. OpenEXR There is a vulnerability in determining boundary conditions.Service operation interruption (DoS) It may be put into a state. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. A security vulnerability exists in LIM OpenEXR versions prior to 2.4.1. An attacker could exploit this vulnerability to crash the application or obtain information. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202107-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: OpenEXR: Multiple vulnerabilities
Date: July 11, 2021
Bugs: #717474, #746794, #762862, #770229, #776808
ID: 202107-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in OpenEXR, the worst of which
could result in the arbitrary execution of code.
Background
==========
OpenEXR is a high dynamic-range (HDR) image file format developed by
Industrial Light & Magic for use in computer imaging applications.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 media-libs/openexr < 2.5.6 >= 2.5.6
Description
===========
Multiple vulnerabilities have been discovered in OpenEXR. Please review
the CVE identifiers referenced below for details.
Impact
======
Please review the referenced CVE identifiers for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All OpenEXR users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/openexr-2.5.6"
References
==========
[ 1 ] CVE-2020-11758
https://nvd.nist.gov/vuln/detail/CVE-2020-11758
[ 2 ] CVE-2020-11759
https://nvd.nist.gov/vuln/detail/CVE-2020-11759
[ 3 ] CVE-2020-11760
https://nvd.nist.gov/vuln/detail/CVE-2020-11760
[ 4 ] CVE-2020-11761
https://nvd.nist.gov/vuln/detail/CVE-2020-11761
[ 5 ] CVE-2020-11762
https://nvd.nist.gov/vuln/detail/CVE-2020-11762
[ 6 ] CVE-2020-11763
https://nvd.nist.gov/vuln/detail/CVE-2020-11763
[ 7 ] CVE-2020-11764
https://nvd.nist.gov/vuln/detail/CVE-2020-11764
[ 8 ] CVE-2020-11765
https://nvd.nist.gov/vuln/detail/CVE-2020-11765
[ 9 ] CVE-2020-15304
https://nvd.nist.gov/vuln/detail/CVE-2020-15304
[ 10 ] CVE-2020-15305
https://nvd.nist.gov/vuln/detail/CVE-2020-15305
[ 11 ] CVE-2020-15306
https://nvd.nist.gov/vuln/detail/CVE-2020-15306
[ 12 ] CVE-2021-20296
https://nvd.nist.gov/vuln/detail/CVE-2021-20296
[ 13 ] CVE-2021-3474
https://nvd.nist.gov/vuln/detail/CVE-2021-3474
[ 14 ] CVE-2021-3475
https://nvd.nist.gov/vuln/detail/CVE-2021-3475
[ 15 ] CVE-2021-3476
https://nvd.nist.gov/vuln/detail/CVE-2021-3476
[ 16 ] CVE-2021-3477
https://nvd.nist.gov/vuln/detail/CVE-2021-3477
[ 17 ] CVE-2021-3478
https://nvd.nist.gov/vuln/detail/CVE-2021-3478
[ 18 ] CVE-2021-3479
https://nvd.nist.gov/vuln/detail/CVE-2021-3479
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202107-27
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2021 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. ==========================================================================
Ubuntu Security Notice USN-4339-1
April 27, 2020
openexr vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04
- Ubuntu 19.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in OpenEXR.
Software Description:
- openexr: tools for the OpenEXR image format
Details:
Brandon Perry discovered that OpenEXR incorrectly handled certain malformed
EXR image files. If a user were tricked into opening a crafted EXR image
file, a remote attacker could cause a denial of service, or possibly
execute arbitrary code. This issue only applied to Ubuntu 20.04 LTS.
(CVE-2017-9111, CVE-2017-9113, CVE-2017-9115)
Tan Jie discovered that OpenEXR incorrectly handled certain malformed EXR
image files. If a user were tricked into opening a crafted EXR image file,
a remote attacker could cause a denial of service, or possibly execute
arbitrary code. This issue only applied to Ubuntu 20.04 LTS.
(CVE-2018-18444)
Samuel Groß discovered that OpenEXR incorrectly handled certain malformed
EXR image files. If a user were tricked into opening a crafted EXR image
file, a remote attacker could cause a denial of service, or possibly
execute arbitrary code. (CVE-2020-11758, CVE-2020-11759, CVE-2020-11760,
CVE-2020-11761, CVE-2020-11762, CVE-2020-11763, CVE-2020-11764)
It was discovered that OpenEXR incorrectly handled certain malformed EXR
image files. If a user were tricked into opening a crafted EXR image
file, a remote attacker could cause a denial of service. (CVE-2020-11765)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04:
libopenexr24 2.3.0-6ubuntu0.1
openexr 2.3.0-6ubuntu0.1
Ubuntu 19.10:
libopenexr23 2.2.1-4.1ubuntu1.1
openexr 2.2.1-4.1ubuntu1.1
Ubuntu 18.04 LTS:
libopenexr22 2.2.0-11.1ubuntu1.2
openexr 2.2.0-11.1ubuntu1.2
Ubuntu 16.04 LTS:
libopenexr22 2.2.0-10ubuntu2.2
openexr 2.2.0-10ubuntu2.2
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4339-1
CVE-2017-9111, CVE-2017-9113, CVE-2017-9115, CVE-2018-18444,
CVE-2020-11758, CVE-2020-11759, CVE-2020-11760, CVE-2020-11761,
CVE-2020-11762, CVE-2020-11763, CVE-2020-11764, CVE-2020-11765
Package Information:
https://launchpad.net/ubuntu/+source/openexr/2.3.0-6ubuntu0.1
https://launchpad.net/ubuntu/+source/openexr/2.2.1-4.1ubuntu1.1
https://launchpad.net/ubuntu/+source/openexr/2.2.0-11.1ubuntu1.2
https://launchpad.net/ubuntu/+source/openexr/2.2.0-10ubuntu2.2
.
For the stable distribution (buster), these problems have been fixed in
version 2.2.1-4.1+deb10u1.
We recommend that you upgrade your openexr packages.
For the detailed security status of openexr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openexr
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=FDcC
-----END PGP SIGNATURE-----
| VAR-202004-0474 | CVE-2020-11764 | OpenEXR Out-of-bounds write vulnerability in |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: MEDIUM |
An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds write in copyIntoFrameBuffer in ImfMisc.cpp. OpenEXR Is vulnerable to out-of-bounds writes.Service operation interruption (DoS) It may be put into a state. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. A buffer error vulnerability exists in the 'copyIntoFrameBuffer' function of the ImfMisc.cpp file in LIM OpenEXR versions prior to 2.4.1. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202107-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: OpenEXR: Multiple vulnerabilities
Date: July 11, 2021
Bugs: #717474, #746794, #762862, #770229, #776808
ID: 202107-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in OpenEXR, the worst of which
could result in the arbitrary execution of code.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 media-libs/openexr < 2.5.6 >= 2.5.6
Description
===========
Multiple vulnerabilities have been discovered in OpenEXR. Please review
the CVE identifiers referenced below for details.
Impact
======
Please review the referenced CVE identifiers for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All OpenEXR users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/openexr-2.5.6"
References
==========
[ 1 ] CVE-2020-11758
https://nvd.nist.gov/vuln/detail/CVE-2020-11758
[ 2 ] CVE-2020-11759
https://nvd.nist.gov/vuln/detail/CVE-2020-11759
[ 3 ] CVE-2020-11760
https://nvd.nist.gov/vuln/detail/CVE-2020-11760
[ 4 ] CVE-2020-11761
https://nvd.nist.gov/vuln/detail/CVE-2020-11761
[ 5 ] CVE-2020-11762
https://nvd.nist.gov/vuln/detail/CVE-2020-11762
[ 6 ] CVE-2020-11763
https://nvd.nist.gov/vuln/detail/CVE-2020-11763
[ 7 ] CVE-2020-11764
https://nvd.nist.gov/vuln/detail/CVE-2020-11764
[ 8 ] CVE-2020-11765
https://nvd.nist.gov/vuln/detail/CVE-2020-11765
[ 9 ] CVE-2020-15304
https://nvd.nist.gov/vuln/detail/CVE-2020-15304
[ 10 ] CVE-2020-15305
https://nvd.nist.gov/vuln/detail/CVE-2020-15305
[ 11 ] CVE-2020-15306
https://nvd.nist.gov/vuln/detail/CVE-2020-15306
[ 12 ] CVE-2021-20296
https://nvd.nist.gov/vuln/detail/CVE-2021-20296
[ 13 ] CVE-2021-3474
https://nvd.nist.gov/vuln/detail/CVE-2021-3474
[ 14 ] CVE-2021-3475
https://nvd.nist.gov/vuln/detail/CVE-2021-3475
[ 15 ] CVE-2021-3476
https://nvd.nist.gov/vuln/detail/CVE-2021-3476
[ 16 ] CVE-2021-3477
https://nvd.nist.gov/vuln/detail/CVE-2021-3477
[ 17 ] CVE-2021-3478
https://nvd.nist.gov/vuln/detail/CVE-2021-3478
[ 18 ] CVE-2021-3479
https://nvd.nist.gov/vuln/detail/CVE-2021-3479
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202107-27
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2021 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: OpenEXR security update
Advisory ID: RHSA-2020:4039-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4039
Issue date: 2020-09-29
CVE Names: CVE-2020-11761 CVE-2020-11763 CVE-2020-11764
====================================================================
1. Summary:
An update for OpenEXR is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
3. Description:
OpenEXR is a high dynamic-range (HDR) image file format developed by
Industrial Light & Magic for use in computer imaging applications. This
package contains libraries and sample applications for handling the format.
Security Fix(es):
* OpenEXR: out-of-bounds read during Huffman uncompression (CVE-2020-11761)
* OpenEXR: std::vector out-of-bounds read and write in ImfTileOffsets.cpp
(CVE-2020-11763)
* OpenEXR: out-of-bounds write in copyIntoFrameBuffer function in
ImfMisc.cpp (CVE-2020-11764)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.9 Release Notes linked from the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
OpenEXR-1.7.1-8.el7.src.rpm
x86_64:
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-libs-1.7.1-8.el7.i686.rpm
OpenEXR-libs-1.7.1-8.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
OpenEXR-1.7.1-8.el7.x86_64.rpm
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-devel-1.7.1-8.el7.i686.rpm
OpenEXR-devel-1.7.1-8.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
OpenEXR-1.7.1-8.el7.src.rpm
x86_64:
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-libs-1.7.1-8.el7.i686.rpm
OpenEXR-libs-1.7.1-8.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
OpenEXR-1.7.1-8.el7.x86_64.rpm
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-devel-1.7.1-8.el7.i686.rpm
OpenEXR-devel-1.7.1-8.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
OpenEXR-1.7.1-8.el7.src.rpm
ppc64:
OpenEXR-debuginfo-1.7.1-8.el7.ppc.rpm
OpenEXR-debuginfo-1.7.1-8.el7.ppc64.rpm
OpenEXR-libs-1.7.1-8.el7.ppc.rpm
OpenEXR-libs-1.7.1-8.el7.ppc64.rpm
ppc64le:
OpenEXR-debuginfo-1.7.1-8.el7.ppc64le.rpm
OpenEXR-libs-1.7.1-8.el7.ppc64le.rpm
s390x:
OpenEXR-debuginfo-1.7.1-8.el7.s390.rpm
OpenEXR-debuginfo-1.7.1-8.el7.s390x.rpm
OpenEXR-libs-1.7.1-8.el7.s390.rpm
OpenEXR-libs-1.7.1-8.el7.s390x.rpm
x86_64:
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-libs-1.7.1-8.el7.i686.rpm
OpenEXR-libs-1.7.1-8.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
OpenEXR-1.7.1-8.el7.ppc64.rpm
OpenEXR-debuginfo-1.7.1-8.el7.ppc.rpm
OpenEXR-debuginfo-1.7.1-8.el7.ppc64.rpm
OpenEXR-devel-1.7.1-8.el7.ppc.rpm
OpenEXR-devel-1.7.1-8.el7.ppc64.rpm
ppc64le:
OpenEXR-1.7.1-8.el7.ppc64le.rpm
OpenEXR-debuginfo-1.7.1-8.el7.ppc64le.rpm
OpenEXR-devel-1.7.1-8.el7.ppc64le.rpm
s390x:
OpenEXR-1.7.1-8.el7.s390x.rpm
OpenEXR-debuginfo-1.7.1-8.el7.s390.rpm
OpenEXR-debuginfo-1.7.1-8.el7.s390x.rpm
OpenEXR-devel-1.7.1-8.el7.s390.rpm
OpenEXR-devel-1.7.1-8.el7.s390x.rpm
x86_64:
OpenEXR-1.7.1-8.el7.x86_64.rpm
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-devel-1.7.1-8.el7.i686.rpm
OpenEXR-devel-1.7.1-8.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
OpenEXR-1.7.1-8.el7.src.rpm
x86_64:
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-libs-1.7.1-8.el7.i686.rpm
OpenEXR-libs-1.7.1-8.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
OpenEXR-1.7.1-8.el7.x86_64.rpm
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-devel-1.7.1-8.el7.i686.rpm
OpenEXR-devel-1.7.1-8.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-11761
https://access.redhat.com/security/cve/CVE-2020-11763
https://access.redhat.com/security/cve/CVE-2020-11764
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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P3yT
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
For the stable distribution (buster), these problems have been fixed in
version 2.2.1-4.1+deb10u1.
We recommend that you upgrade your openexr packages.
For the detailed security status of openexr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openexr
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=FDcC
-----END PGP SIGNATURE-----
| VAR-202004-0473 | CVE-2020-11763 | OpenEXR Out-of-bounds read vulnerability in |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: MEDIUM |
An issue was discovered in OpenEXR before 2.4.1. There is an std::vector out-of-bounds read and write, as demonstrated by ImfTileOffsets.cpp. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. A buffer error vulnerability exists in the ImfTileOffsets.cpp file in LIM OpenEXR versions prior to 2.4.1. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202107-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: OpenEXR: Multiple vulnerabilities
Date: July 11, 2021
Bugs: #717474, #746794, #762862, #770229, #776808
ID: 202107-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in OpenEXR, the worst of which
could result in the arbitrary execution of code.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 media-libs/openexr < 2.5.6 >= 2.5.6
Description
===========
Multiple vulnerabilities have been discovered in OpenEXR. Please review
the CVE identifiers referenced below for details.
Impact
======
Please review the referenced CVE identifiers for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All OpenEXR users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/openexr-2.5.6"
References
==========
[ 1 ] CVE-2020-11758
https://nvd.nist.gov/vuln/detail/CVE-2020-11758
[ 2 ] CVE-2020-11759
https://nvd.nist.gov/vuln/detail/CVE-2020-11759
[ 3 ] CVE-2020-11760
https://nvd.nist.gov/vuln/detail/CVE-2020-11760
[ 4 ] CVE-2020-11761
https://nvd.nist.gov/vuln/detail/CVE-2020-11761
[ 5 ] CVE-2020-11762
https://nvd.nist.gov/vuln/detail/CVE-2020-11762
[ 6 ] CVE-2020-11763
https://nvd.nist.gov/vuln/detail/CVE-2020-11763
[ 7 ] CVE-2020-11764
https://nvd.nist.gov/vuln/detail/CVE-2020-11764
[ 8 ] CVE-2020-11765
https://nvd.nist.gov/vuln/detail/CVE-2020-11765
[ 9 ] CVE-2020-15304
https://nvd.nist.gov/vuln/detail/CVE-2020-15304
[ 10 ] CVE-2020-15305
https://nvd.nist.gov/vuln/detail/CVE-2020-15305
[ 11 ] CVE-2020-15306
https://nvd.nist.gov/vuln/detail/CVE-2020-15306
[ 12 ] CVE-2021-20296
https://nvd.nist.gov/vuln/detail/CVE-2021-20296
[ 13 ] CVE-2021-3474
https://nvd.nist.gov/vuln/detail/CVE-2021-3474
[ 14 ] CVE-2021-3475
https://nvd.nist.gov/vuln/detail/CVE-2021-3475
[ 15 ] CVE-2021-3476
https://nvd.nist.gov/vuln/detail/CVE-2021-3476
[ 16 ] CVE-2021-3477
https://nvd.nist.gov/vuln/detail/CVE-2021-3477
[ 17 ] CVE-2021-3478
https://nvd.nist.gov/vuln/detail/CVE-2021-3478
[ 18 ] CVE-2021-3479
https://nvd.nist.gov/vuln/detail/CVE-2021-3479
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202107-27
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2021 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: OpenEXR security update
Advisory ID: RHSA-2020:4039-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4039
Issue date: 2020-09-29
CVE Names: CVE-2020-11761 CVE-2020-11763 CVE-2020-11764
====================================================================
1. Summary:
An update for OpenEXR is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
3. Description:
OpenEXR is a high dynamic-range (HDR) image file format developed by
Industrial Light & Magic for use in computer imaging applications. This
package contains libraries and sample applications for handling the format.
Additional Changes:
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.9 Release Notes linked from the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
OpenEXR-1.7.1-8.el7.src.rpm
x86_64:
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-libs-1.7.1-8.el7.i686.rpm
OpenEXR-libs-1.7.1-8.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
OpenEXR-1.7.1-8.el7.x86_64.rpm
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-devel-1.7.1-8.el7.i686.rpm
OpenEXR-devel-1.7.1-8.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
OpenEXR-1.7.1-8.el7.src.rpm
x86_64:
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-libs-1.7.1-8.el7.i686.rpm
OpenEXR-libs-1.7.1-8.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
OpenEXR-1.7.1-8.el7.x86_64.rpm
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-devel-1.7.1-8.el7.i686.rpm
OpenEXR-devel-1.7.1-8.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
OpenEXR-1.7.1-8.el7.src.rpm
ppc64:
OpenEXR-debuginfo-1.7.1-8.el7.ppc.rpm
OpenEXR-debuginfo-1.7.1-8.el7.ppc64.rpm
OpenEXR-libs-1.7.1-8.el7.ppc.rpm
OpenEXR-libs-1.7.1-8.el7.ppc64.rpm
ppc64le:
OpenEXR-debuginfo-1.7.1-8.el7.ppc64le.rpm
OpenEXR-libs-1.7.1-8.el7.ppc64le.rpm
s390x:
OpenEXR-debuginfo-1.7.1-8.el7.s390.rpm
OpenEXR-debuginfo-1.7.1-8.el7.s390x.rpm
OpenEXR-libs-1.7.1-8.el7.s390.rpm
OpenEXR-libs-1.7.1-8.el7.s390x.rpm
x86_64:
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-libs-1.7.1-8.el7.i686.rpm
OpenEXR-libs-1.7.1-8.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
OpenEXR-1.7.1-8.el7.ppc64.rpm
OpenEXR-debuginfo-1.7.1-8.el7.ppc.rpm
OpenEXR-debuginfo-1.7.1-8.el7.ppc64.rpm
OpenEXR-devel-1.7.1-8.el7.ppc.rpm
OpenEXR-devel-1.7.1-8.el7.ppc64.rpm
ppc64le:
OpenEXR-1.7.1-8.el7.ppc64le.rpm
OpenEXR-debuginfo-1.7.1-8.el7.ppc64le.rpm
OpenEXR-devel-1.7.1-8.el7.ppc64le.rpm
s390x:
OpenEXR-1.7.1-8.el7.s390x.rpm
OpenEXR-debuginfo-1.7.1-8.el7.s390.rpm
OpenEXR-debuginfo-1.7.1-8.el7.s390x.rpm
OpenEXR-devel-1.7.1-8.el7.s390.rpm
OpenEXR-devel-1.7.1-8.el7.s390x.rpm
x86_64:
OpenEXR-1.7.1-8.el7.x86_64.rpm
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-devel-1.7.1-8.el7.i686.rpm
OpenEXR-devel-1.7.1-8.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
OpenEXR-1.7.1-8.el7.src.rpm
x86_64:
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-libs-1.7.1-8.el7.i686.rpm
OpenEXR-libs-1.7.1-8.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
OpenEXR-1.7.1-8.el7.x86_64.rpm
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-devel-1.7.1-8.el7.i686.rpm
OpenEXR-devel-1.7.1-8.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-11761
https://access.redhat.com/security/cve/CVE-2020-11763
https://access.redhat.com/security/cve/CVE-2020-11764
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIVAwUBX3OhUtzjgjWX9erEAQhyFQ/+J5Ul3SoJTvzk/7rqW/WA4GkT5/I6owm1
BnhvO6tELbBul8250MCo/jaUukdjQ3bJ/ZdjmPFrPgNR7UrmIN0LQdAiDlMtnhIF
7Ppw7RDniUBtv3Q2471W4FQxpeXKf+n5sqkq+blxZbeYLXI7Nya/2qKirO0dJ4M1
bAl1exBJ4cSp+kuUOn8oBsGQi6L2oM6ldPf4KklMswOU69qDexywZNtvQVfANmur
mNIx/9bmQG+WRlj941A1BFTsAdXsCyTc3qaBecC5iEFxKPkVlpfBhQJ+N6zxdKwj
CtVftLiGpcuiWck6THkpPbQg9HWqtJI3tQyW5NUZFHhUnwvOw3SGKgN3ufsnS/tF
9MsnwovV+6kuR/k1UWiDXuSZrdjEIOSz0We8oT5VhOKNkXcE0OY4yxLKpVTlP1HN
aM2OGkf3DiUdKEysSQ7yPa2tfimLYQS/XJo6w4FZPKapmOvF926/R7NgIIucvG4J
U51DVzqGpkt40pK790wQLrwUZ/E+HYyeZpPJC8QrmJmPNXsXFEm4iYxjCIyaecKf
hOlBFwy7mU6fuOLynrrfxeStoS0+zJFfYqdiKOfTpRoLozBqaA8Vt8VasOfOwGeY
Ar+nuTxwoQn3KCSGvHk533UkNyqKqpNDIfyqk3M8y8S5HjXvoMx9zxaN0ujT4/pB
vySbS8H4PEI=P3yT
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
For the stable distribution (buster), these problems have been fixed in
version 2.2.1-4.1+deb10u1.
We recommend that you upgrade your openexr packages.
For the detailed security status of openexr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openexr
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl9KkM8ACgkQEMKTtsN8
TjYiCxAAqny8A+WbtYBonQ42ciQ2Hc1f90CI6l1Gp/ZK7RARL7+cLOHTh+hEniIG
G6cwDGAwAgOtNPer+bT8Mwx6gF8bTii3nF5MMhiN22L7buzHruxsqpC+g94MeZHW
vn6GpkTCPSHW5m4+O3pwrYDK3lr5ucNwPVegcXqtJuG0SrhY9VyTrtmzwtoP0YVx
ANOpJhCLNEU5vIdEpzIfdjAoM6nsGG/FDN5sP2B9sEB69s7dQXAX5ksuu4Rg71bo
W7OjAWB+1MIuFT2blax4Z0qD9Nuiy252AM9MAzMmdBPsFnix0/E2lmyd2OGknUkY
l+sq61TR7pA7AVbtLpLBy2fKFS/Jj1KTFI6J+GmZiOBGAzHrWevjyclYBRI0exVg
zKnI2IdO9f0qdeTiZhtAcSEV8hb1mSoo0fPRM0ZGxdMV0MTNeOmj+doTTw+SlSJK
3iyKUDgRy60JjQMq8gBaPSRl6tuTjEdFzbJLsFPvZVY5vQsy4KIuh024RrEjri0c
R2oLvboIS2xddK+T/9NPc15vruZiUut0j/3EsBqbDn3hBXMpQb0NFv0kuC+uvmwZ
UgxRA32shnjcUES8+TBqeB+cvMnukTlOfqQEY2VNhG//45gcQH6rEcf45W07XTGD
djd3v06+rkeUhfuZHL9OAOj2BowTrp9CRooWT1dufPPUkL1aoUY=
=FDcC
-----END PGP SIGNATURE-----
| VAR-202004-0472 | CVE-2020-11762 | OpenEXR Out-of-bounds write vulnerability in |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: MEDIUM |
An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds read and write in DwaCompressor::uncompress in ImfDwaCompressor.cpp when handling the UNKNOWN compression case. OpenEXR There are vulnerabilities related to out-of-bounds writes and out-of-bounds reads.Service operation interruption (DoS) It may be put into a state. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. A buffer error vulnerability exists in the 'DwaCompressor::uncompress' function of the ImfDwaCompressor.cpp file in LIM OpenEXR versions prior to 2.4.1. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202107-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: OpenEXR: Multiple vulnerabilities
Date: July 11, 2021
Bugs: #717474, #746794, #762862, #770229, #776808
ID: 202107-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in OpenEXR, the worst of which
could result in the arbitrary execution of code.
Background
==========
OpenEXR is a high dynamic-range (HDR) image file format developed by
Industrial Light & Magic for use in computer imaging applications.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 media-libs/openexr < 2.5.6 >= 2.5.6
Description
===========
Multiple vulnerabilities have been discovered in OpenEXR. Please review
the CVE identifiers referenced below for details.
Impact
======
Please review the referenced CVE identifiers for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All OpenEXR users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/openexr-2.5.6"
References
==========
[ 1 ] CVE-2020-11758
https://nvd.nist.gov/vuln/detail/CVE-2020-11758
[ 2 ] CVE-2020-11759
https://nvd.nist.gov/vuln/detail/CVE-2020-11759
[ 3 ] CVE-2020-11760
https://nvd.nist.gov/vuln/detail/CVE-2020-11760
[ 4 ] CVE-2020-11761
https://nvd.nist.gov/vuln/detail/CVE-2020-11761
[ 5 ] CVE-2020-11762
https://nvd.nist.gov/vuln/detail/CVE-2020-11762
[ 6 ] CVE-2020-11763
https://nvd.nist.gov/vuln/detail/CVE-2020-11763
[ 7 ] CVE-2020-11764
https://nvd.nist.gov/vuln/detail/CVE-2020-11764
[ 8 ] CVE-2020-11765
https://nvd.nist.gov/vuln/detail/CVE-2020-11765
[ 9 ] CVE-2020-15304
https://nvd.nist.gov/vuln/detail/CVE-2020-15304
[ 10 ] CVE-2020-15305
https://nvd.nist.gov/vuln/detail/CVE-2020-15305
[ 11 ] CVE-2020-15306
https://nvd.nist.gov/vuln/detail/CVE-2020-15306
[ 12 ] CVE-2021-20296
https://nvd.nist.gov/vuln/detail/CVE-2021-20296
[ 13 ] CVE-2021-3474
https://nvd.nist.gov/vuln/detail/CVE-2021-3474
[ 14 ] CVE-2021-3475
https://nvd.nist.gov/vuln/detail/CVE-2021-3475
[ 15 ] CVE-2021-3476
https://nvd.nist.gov/vuln/detail/CVE-2021-3476
[ 16 ] CVE-2021-3477
https://nvd.nist.gov/vuln/detail/CVE-2021-3477
[ 17 ] CVE-2021-3478
https://nvd.nist.gov/vuln/detail/CVE-2021-3478
[ 18 ] CVE-2021-3479
https://nvd.nist.gov/vuln/detail/CVE-2021-3479
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202107-27
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2021 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. ==========================================================================
Ubuntu Security Notice USN-4339-1
April 27, 2020
openexr vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04
- Ubuntu 19.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in OpenEXR.
Software Description:
- openexr: tools for the OpenEXR image format
Details:
Brandon Perry discovered that OpenEXR incorrectly handled certain malformed
EXR image files. If a user were tricked into opening a crafted EXR image
file, a remote attacker could cause a denial of service, or possibly
execute arbitrary code. This issue only applied to Ubuntu 20.04 LTS.
(CVE-2017-9111, CVE-2017-9113, CVE-2017-9115)
Tan Jie discovered that OpenEXR incorrectly handled certain malformed EXR
image files. If a user were tricked into opening a crafted EXR image file,
a remote attacker could cause a denial of service, or possibly execute
arbitrary code. This issue only applied to Ubuntu 20.04 LTS.
(CVE-2018-18444)
Samuel Groß discovered that OpenEXR incorrectly handled certain malformed
EXR image files. If a user were tricked into opening a crafted EXR image
file, a remote attacker could cause a denial of service, or possibly
execute arbitrary code. (CVE-2020-11758, CVE-2020-11759, CVE-2020-11760,
CVE-2020-11761, CVE-2020-11762, CVE-2020-11763, CVE-2020-11764)
It was discovered that OpenEXR incorrectly handled certain malformed EXR
image files. If a user were tricked into opening a crafted EXR image
file, a remote attacker could cause a denial of service. (CVE-2020-11765)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04:
libopenexr24 2.3.0-6ubuntu0.1
openexr 2.3.0-6ubuntu0.1
Ubuntu 19.10:
libopenexr23 2.2.1-4.1ubuntu1.1
openexr 2.2.1-4.1ubuntu1.1
Ubuntu 18.04 LTS:
libopenexr22 2.2.0-11.1ubuntu1.2
openexr 2.2.0-11.1ubuntu1.2
Ubuntu 16.04 LTS:
libopenexr22 2.2.0-10ubuntu2.2
openexr 2.2.0-10ubuntu2.2
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4339-1
CVE-2017-9111, CVE-2017-9113, CVE-2017-9115, CVE-2018-18444,
CVE-2020-11758, CVE-2020-11759, CVE-2020-11760, CVE-2020-11761,
CVE-2020-11762, CVE-2020-11763, CVE-2020-11764, CVE-2020-11765
Package Information:
https://launchpad.net/ubuntu/+source/openexr/2.3.0-6ubuntu0.1
https://launchpad.net/ubuntu/+source/openexr/2.2.1-4.1ubuntu1.1
https://launchpad.net/ubuntu/+source/openexr/2.2.0-11.1ubuntu1.2
https://launchpad.net/ubuntu/+source/openexr/2.2.0-10ubuntu2.2
.
For the stable distribution (buster), these problems have been fixed in
version 2.2.1-4.1+deb10u1.
We recommend that you upgrade your openexr packages.
For the detailed security status of openexr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openexr
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl9KkM8ACgkQEMKTtsN8
TjYiCxAAqny8A+WbtYBonQ42ciQ2Hc1f90CI6l1Gp/ZK7RARL7+cLOHTh+hEniIG
G6cwDGAwAgOtNPer+bT8Mwx6gF8bTii3nF5MMhiN22L7buzHruxsqpC+g94MeZHW
vn6GpkTCPSHW5m4+O3pwrYDK3lr5ucNwPVegcXqtJuG0SrhY9VyTrtmzwtoP0YVx
ANOpJhCLNEU5vIdEpzIfdjAoM6nsGG/FDN5sP2B9sEB69s7dQXAX5ksuu4Rg71bo
W7OjAWB+1MIuFT2blax4Z0qD9Nuiy252AM9MAzMmdBPsFnix0/E2lmyd2OGknUkY
l+sq61TR7pA7AVbtLpLBy2fKFS/Jj1KTFI6J+GmZiOBGAzHrWevjyclYBRI0exVg
zKnI2IdO9f0qdeTiZhtAcSEV8hb1mSoo0fPRM0ZGxdMV0MTNeOmj+doTTw+SlSJK
3iyKUDgRy60JjQMq8gBaPSRl6tuTjEdFzbJLsFPvZVY5vQsy4KIuh024RrEjri0c
R2oLvboIS2xddK+T/9NPc15vruZiUut0j/3EsBqbDn3hBXMpQb0NFv0kuC+uvmwZ
UgxRA32shnjcUES8+TBqeB+cvMnukTlOfqQEY2VNhG//45gcQH6rEcf45W07XTGD
djd3v06+rkeUhfuZHL9OAOj2BowTrp9CRooWT1dufPPUkL1aoUY=
=FDcC
-----END PGP SIGNATURE-----
| VAR-202004-0470 | CVE-2020-11760 | OpenEXR Out-of-bounds read vulnerability in |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: MEDIUM |
An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds read during RLE uncompression in rleUncompress in ImfRle.cpp. OpenEXR Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be put into a state. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. A buffer error vulnerability exists in the 'rleUncompress' function of the ImfRle.cpp file in versions prior to LIM OpenEXR 2.4.1. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202107-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: OpenEXR: Multiple vulnerabilities
Date: July 11, 2021
Bugs: #717474, #746794, #762862, #770229, #776808
ID: 202107-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in OpenEXR, the worst of which
could result in the arbitrary execution of code.
Background
==========
OpenEXR is a high dynamic-range (HDR) image file format developed by
Industrial Light & Magic for use in computer imaging applications.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 media-libs/openexr < 2.5.6 >= 2.5.6
Description
===========
Multiple vulnerabilities have been discovered in OpenEXR. Please review
the CVE identifiers referenced below for details.
Impact
======
Please review the referenced CVE identifiers for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All OpenEXR users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/openexr-2.5.6"
References
==========
[ 1 ] CVE-2020-11758
https://nvd.nist.gov/vuln/detail/CVE-2020-11758
[ 2 ] CVE-2020-11759
https://nvd.nist.gov/vuln/detail/CVE-2020-11759
[ 3 ] CVE-2020-11760
https://nvd.nist.gov/vuln/detail/CVE-2020-11760
[ 4 ] CVE-2020-11761
https://nvd.nist.gov/vuln/detail/CVE-2020-11761
[ 5 ] CVE-2020-11762
https://nvd.nist.gov/vuln/detail/CVE-2020-11762
[ 6 ] CVE-2020-11763
https://nvd.nist.gov/vuln/detail/CVE-2020-11763
[ 7 ] CVE-2020-11764
https://nvd.nist.gov/vuln/detail/CVE-2020-11764
[ 8 ] CVE-2020-11765
https://nvd.nist.gov/vuln/detail/CVE-2020-11765
[ 9 ] CVE-2020-15304
https://nvd.nist.gov/vuln/detail/CVE-2020-15304
[ 10 ] CVE-2020-15305
https://nvd.nist.gov/vuln/detail/CVE-2020-15305
[ 11 ] CVE-2020-15306
https://nvd.nist.gov/vuln/detail/CVE-2020-15306
[ 12 ] CVE-2021-20296
https://nvd.nist.gov/vuln/detail/CVE-2021-20296
[ 13 ] CVE-2021-3474
https://nvd.nist.gov/vuln/detail/CVE-2021-3474
[ 14 ] CVE-2021-3475
https://nvd.nist.gov/vuln/detail/CVE-2021-3475
[ 15 ] CVE-2021-3476
https://nvd.nist.gov/vuln/detail/CVE-2021-3476
[ 16 ] CVE-2021-3477
https://nvd.nist.gov/vuln/detail/CVE-2021-3477
[ 17 ] CVE-2021-3478
https://nvd.nist.gov/vuln/detail/CVE-2021-3478
[ 18 ] CVE-2021-3479
https://nvd.nist.gov/vuln/detail/CVE-2021-3479
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202107-27
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2021 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
.
For the stable distribution (buster), these problems have been fixed in
version 2.2.1-4.1+deb10u1.
We recommend that you upgrade your openexr packages.
For the detailed security status of openexr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openexr
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=FDcC
-----END PGP SIGNATURE-----
| VAR-202004-0469 | CVE-2020-11759 | OpenEXR Integer overflow vulnerability in |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: MEDIUM |
An issue was discovered in OpenEXR before 2.4.1. Because of integer overflows in CompositeDeepScanLine::Data::handleDeepFrameBuffer and readSampleCountForLineBlock, an attacker can write to an out-of-bounds pointer. OpenEXR Exists in an integer overflow vulnerability.Service operation interruption (DoS) It may be put into a state. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. CompositeDeepScanLine::Data::handleDeepFrameBuffer and readSampleCountForLineBlock in versions prior to LIM OpenEXR 2.4.1 have an input validation error vulnerability. The vulnerability stems from the failure of the network system or product to properly validate the input data. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202107-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: OpenEXR: Multiple vulnerabilities
Date: July 11, 2021
Bugs: #717474, #746794, #762862, #770229, #776808
ID: 202107-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in OpenEXR, the worst of which
could result in the arbitrary execution of code.
Background
==========
OpenEXR is a high dynamic-range (HDR) image file format developed by
Industrial Light & Magic for use in computer imaging applications.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 media-libs/openexr < 2.5.6 >= 2.5.6
Description
===========
Multiple vulnerabilities have been discovered in OpenEXR. Please review
the CVE identifiers referenced below for details.
Impact
======
Please review the referenced CVE identifiers for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All OpenEXR users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/openexr-2.5.6"
References
==========
[ 1 ] CVE-2020-11758
https://nvd.nist.gov/vuln/detail/CVE-2020-11758
[ 2 ] CVE-2020-11759
https://nvd.nist.gov/vuln/detail/CVE-2020-11759
[ 3 ] CVE-2020-11760
https://nvd.nist.gov/vuln/detail/CVE-2020-11760
[ 4 ] CVE-2020-11761
https://nvd.nist.gov/vuln/detail/CVE-2020-11761
[ 5 ] CVE-2020-11762
https://nvd.nist.gov/vuln/detail/CVE-2020-11762
[ 6 ] CVE-2020-11763
https://nvd.nist.gov/vuln/detail/CVE-2020-11763
[ 7 ] CVE-2020-11764
https://nvd.nist.gov/vuln/detail/CVE-2020-11764
[ 8 ] CVE-2020-11765
https://nvd.nist.gov/vuln/detail/CVE-2020-11765
[ 9 ] CVE-2020-15304
https://nvd.nist.gov/vuln/detail/CVE-2020-15304
[ 10 ] CVE-2020-15305
https://nvd.nist.gov/vuln/detail/CVE-2020-15305
[ 11 ] CVE-2020-15306
https://nvd.nist.gov/vuln/detail/CVE-2020-15306
[ 12 ] CVE-2021-20296
https://nvd.nist.gov/vuln/detail/CVE-2021-20296
[ 13 ] CVE-2021-3474
https://nvd.nist.gov/vuln/detail/CVE-2021-3474
[ 14 ] CVE-2021-3475
https://nvd.nist.gov/vuln/detail/CVE-2021-3475
[ 15 ] CVE-2021-3476
https://nvd.nist.gov/vuln/detail/CVE-2021-3476
[ 16 ] CVE-2021-3477
https://nvd.nist.gov/vuln/detail/CVE-2021-3477
[ 17 ] CVE-2021-3478
https://nvd.nist.gov/vuln/detail/CVE-2021-3478
[ 18 ] CVE-2021-3479
https://nvd.nist.gov/vuln/detail/CVE-2021-3479
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202107-27
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2021 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
.
For the stable distribution (buster), these problems have been fixed in
version 2.2.1-4.1+deb10u1.
We recommend that you upgrade your openexr packages.
For the detailed security status of openexr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openexr
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl9KkM8ACgkQEMKTtsN8
TjYiCxAAqny8A+WbtYBonQ42ciQ2Hc1f90CI6l1Gp/ZK7RARL7+cLOHTh+hEniIG
G6cwDGAwAgOtNPer+bT8Mwx6gF8bTii3nF5MMhiN22L7buzHruxsqpC+g94MeZHW
vn6GpkTCPSHW5m4+O3pwrYDK3lr5ucNwPVegcXqtJuG0SrhY9VyTrtmzwtoP0YVx
ANOpJhCLNEU5vIdEpzIfdjAoM6nsGG/FDN5sP2B9sEB69s7dQXAX5ksuu4Rg71bo
W7OjAWB+1MIuFT2blax4Z0qD9Nuiy252AM9MAzMmdBPsFnix0/E2lmyd2OGknUkY
l+sq61TR7pA7AVbtLpLBy2fKFS/Jj1KTFI6J+GmZiOBGAzHrWevjyclYBRI0exVg
zKnI2IdO9f0qdeTiZhtAcSEV8hb1mSoo0fPRM0ZGxdMV0MTNeOmj+doTTw+SlSJK
3iyKUDgRy60JjQMq8gBaPSRl6tuTjEdFzbJLsFPvZVY5vQsy4KIuh024RrEjri0c
R2oLvboIS2xddK+T/9NPc15vruZiUut0j/3EsBqbDn3hBXMpQb0NFv0kuC+uvmwZ
UgxRA32shnjcUES8+TBqeB+cvMnukTlOfqQEY2VNhG//45gcQH6rEcf45W07XTGD
djd3v06+rkeUhfuZHL9OAOj2BowTrp9CRooWT1dufPPUkL1aoUY=
=FDcC
-----END PGP SIGNATURE-----
| VAR-202004-0468 | CVE-2020-11758 | OpenEXR Out-of-bounds read vulnerability in |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: MEDIUM |
An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds read in ImfOptimizedPixelReading.h. OpenEXR Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be put into a state. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. A buffer error vulnerability exists in the ImfOptimizedPixelReading.h file in LIM OpenEXR versions prior to 2.4.1. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202107-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: OpenEXR: Multiple vulnerabilities
Date: July 11, 2021
Bugs: #717474, #746794, #762862, #770229, #776808
ID: 202107-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in OpenEXR, the worst of which
could result in the arbitrary execution of code.
Background
==========
OpenEXR is a high dynamic-range (HDR) image file format developed by
Industrial Light & Magic for use in computer imaging applications.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 media-libs/openexr < 2.5.6 >= 2.5.6
Description
===========
Multiple vulnerabilities have been discovered in OpenEXR. Please review
the CVE identifiers referenced below for details.
Impact
======
Please review the referenced CVE identifiers for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All OpenEXR users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/openexr-2.5.6"
References
==========
[ 1 ] CVE-2020-11758
https://nvd.nist.gov/vuln/detail/CVE-2020-11758
[ 2 ] CVE-2020-11759
https://nvd.nist.gov/vuln/detail/CVE-2020-11759
[ 3 ] CVE-2020-11760
https://nvd.nist.gov/vuln/detail/CVE-2020-11760
[ 4 ] CVE-2020-11761
https://nvd.nist.gov/vuln/detail/CVE-2020-11761
[ 5 ] CVE-2020-11762
https://nvd.nist.gov/vuln/detail/CVE-2020-11762
[ 6 ] CVE-2020-11763
https://nvd.nist.gov/vuln/detail/CVE-2020-11763
[ 7 ] CVE-2020-11764
https://nvd.nist.gov/vuln/detail/CVE-2020-11764
[ 8 ] CVE-2020-11765
https://nvd.nist.gov/vuln/detail/CVE-2020-11765
[ 9 ] CVE-2020-15304
https://nvd.nist.gov/vuln/detail/CVE-2020-15304
[ 10 ] CVE-2020-15305
https://nvd.nist.gov/vuln/detail/CVE-2020-15305
[ 11 ] CVE-2020-15306
https://nvd.nist.gov/vuln/detail/CVE-2020-15306
[ 12 ] CVE-2021-20296
https://nvd.nist.gov/vuln/detail/CVE-2021-20296
[ 13 ] CVE-2021-3474
https://nvd.nist.gov/vuln/detail/CVE-2021-3474
[ 14 ] CVE-2021-3475
https://nvd.nist.gov/vuln/detail/CVE-2021-3475
[ 15 ] CVE-2021-3476
https://nvd.nist.gov/vuln/detail/CVE-2021-3476
[ 16 ] CVE-2021-3477
https://nvd.nist.gov/vuln/detail/CVE-2021-3477
[ 17 ] CVE-2021-3478
https://nvd.nist.gov/vuln/detail/CVE-2021-3478
[ 18 ] CVE-2021-3479
https://nvd.nist.gov/vuln/detail/CVE-2021-3479
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202107-27
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2021 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. ==========================================================================
Ubuntu Security Notice USN-4339-1
April 27, 2020
openexr vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04
- Ubuntu 19.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in OpenEXR.
Software Description:
- openexr: tools for the OpenEXR image format
Details:
Brandon Perry discovered that OpenEXR incorrectly handled certain malformed
EXR image files. If a user were tricked into opening a crafted EXR image
file, a remote attacker could cause a denial of service, or possibly
execute arbitrary code. This issue only applied to Ubuntu 20.04 LTS.
(CVE-2017-9111, CVE-2017-9113, CVE-2017-9115)
Tan Jie discovered that OpenEXR incorrectly handled certain malformed EXR
image files. If a user were tricked into opening a crafted EXR image file,
a remote attacker could cause a denial of service, or possibly execute
arbitrary code. This issue only applied to Ubuntu 20.04 LTS.
(CVE-2018-18444)
Samuel Groß discovered that OpenEXR incorrectly handled certain malformed
EXR image files. If a user were tricked into opening a crafted EXR image
file, a remote attacker could cause a denial of service, or possibly
execute arbitrary code. (CVE-2020-11758, CVE-2020-11759, CVE-2020-11760,
CVE-2020-11761, CVE-2020-11762, CVE-2020-11763, CVE-2020-11764)
It was discovered that OpenEXR incorrectly handled certain malformed EXR
image files. If a user were tricked into opening a crafted EXR image
file, a remote attacker could cause a denial of service. (CVE-2020-11765)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04:
libopenexr24 2.3.0-6ubuntu0.1
openexr 2.3.0-6ubuntu0.1
Ubuntu 19.10:
libopenexr23 2.2.1-4.1ubuntu1.1
openexr 2.2.1-4.1ubuntu1.1
Ubuntu 18.04 LTS:
libopenexr22 2.2.0-11.1ubuntu1.2
openexr 2.2.0-11.1ubuntu1.2
Ubuntu 16.04 LTS:
libopenexr22 2.2.0-10ubuntu2.2
openexr 2.2.0-10ubuntu2.2
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4339-1
CVE-2017-9111, CVE-2017-9113, CVE-2017-9115, CVE-2018-18444,
CVE-2020-11758, CVE-2020-11759, CVE-2020-11760, CVE-2020-11761,
CVE-2020-11762, CVE-2020-11763, CVE-2020-11764, CVE-2020-11765
Package Information:
https://launchpad.net/ubuntu/+source/openexr/2.3.0-6ubuntu0.1
https://launchpad.net/ubuntu/+source/openexr/2.2.1-4.1ubuntu1.1
https://launchpad.net/ubuntu/+source/openexr/2.2.0-11.1ubuntu1.2
https://launchpad.net/ubuntu/+source/openexr/2.2.0-10ubuntu2.2
.
For the stable distribution (buster), these problems have been fixed in
version 2.2.1-4.1+deb10u1.
We recommend that you upgrade your openexr packages.
For the detailed security status of openexr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openexr
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=FDcC
-----END PGP SIGNATURE-----
| VAR-202004-0471 | CVE-2020-11761 | OpenEXR Out-of-bounds read vulnerability in |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: MEDIUM |
An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds read during Huffman uncompression, as demonstrated by FastHufDecoder::refill in ImfFastHuf.cpp. OpenEXR Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be put into a state. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. A buffer error vulnerability exists in the 'FastHufDecoder::refill' function of the ImfFastHuf.cpp file in LIM OpenEXR versions prior to 2.4.1. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202107-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: OpenEXR: Multiple vulnerabilities
Date: July 11, 2021
Bugs: #717474, #746794, #762862, #770229, #776808
ID: 202107-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in OpenEXR, the worst of which
could result in the arbitrary execution of code.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 media-libs/openexr < 2.5.6 >= 2.5.6
Description
===========
Multiple vulnerabilities have been discovered in OpenEXR. Please review
the CVE identifiers referenced below for details.
Impact
======
Please review the referenced CVE identifiers for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All OpenEXR users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/openexr-2.5.6"
References
==========
[ 1 ] CVE-2020-11758
https://nvd.nist.gov/vuln/detail/CVE-2020-11758
[ 2 ] CVE-2020-11759
https://nvd.nist.gov/vuln/detail/CVE-2020-11759
[ 3 ] CVE-2020-11760
https://nvd.nist.gov/vuln/detail/CVE-2020-11760
[ 4 ] CVE-2020-11761
https://nvd.nist.gov/vuln/detail/CVE-2020-11761
[ 5 ] CVE-2020-11762
https://nvd.nist.gov/vuln/detail/CVE-2020-11762
[ 6 ] CVE-2020-11763
https://nvd.nist.gov/vuln/detail/CVE-2020-11763
[ 7 ] CVE-2020-11764
https://nvd.nist.gov/vuln/detail/CVE-2020-11764
[ 8 ] CVE-2020-11765
https://nvd.nist.gov/vuln/detail/CVE-2020-11765
[ 9 ] CVE-2020-15304
https://nvd.nist.gov/vuln/detail/CVE-2020-15304
[ 10 ] CVE-2020-15305
https://nvd.nist.gov/vuln/detail/CVE-2020-15305
[ 11 ] CVE-2020-15306
https://nvd.nist.gov/vuln/detail/CVE-2020-15306
[ 12 ] CVE-2021-20296
https://nvd.nist.gov/vuln/detail/CVE-2021-20296
[ 13 ] CVE-2021-3474
https://nvd.nist.gov/vuln/detail/CVE-2021-3474
[ 14 ] CVE-2021-3475
https://nvd.nist.gov/vuln/detail/CVE-2021-3475
[ 15 ] CVE-2021-3476
https://nvd.nist.gov/vuln/detail/CVE-2021-3476
[ 16 ] CVE-2021-3477
https://nvd.nist.gov/vuln/detail/CVE-2021-3477
[ 17 ] CVE-2021-3478
https://nvd.nist.gov/vuln/detail/CVE-2021-3478
[ 18 ] CVE-2021-3479
https://nvd.nist.gov/vuln/detail/CVE-2021-3479
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202107-27
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2021 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: OpenEXR security update
Advisory ID: RHSA-2020:4039-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4039
Issue date: 2020-09-29
CVE Names: CVE-2020-11761 CVE-2020-11763 CVE-2020-11764
====================================================================
1. Summary:
An update for OpenEXR is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
3. Description:
OpenEXR is a high dynamic-range (HDR) image file format developed by
Industrial Light & Magic for use in computer imaging applications. This
package contains libraries and sample applications for handling the format.
Security Fix(es):
* OpenEXR: out-of-bounds read during Huffman uncompression (CVE-2020-11761)
* OpenEXR: std::vector out-of-bounds read and write in ImfTileOffsets.cpp
(CVE-2020-11763)
* OpenEXR: out-of-bounds write in copyIntoFrameBuffer function in
ImfMisc.cpp (CVE-2020-11764)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.9 Release Notes linked from the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
OpenEXR-1.7.1-8.el7.src.rpm
x86_64:
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-libs-1.7.1-8.el7.i686.rpm
OpenEXR-libs-1.7.1-8.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
OpenEXR-1.7.1-8.el7.x86_64.rpm
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-devel-1.7.1-8.el7.i686.rpm
OpenEXR-devel-1.7.1-8.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
OpenEXR-1.7.1-8.el7.src.rpm
x86_64:
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-libs-1.7.1-8.el7.i686.rpm
OpenEXR-libs-1.7.1-8.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
OpenEXR-1.7.1-8.el7.x86_64.rpm
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-devel-1.7.1-8.el7.i686.rpm
OpenEXR-devel-1.7.1-8.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
OpenEXR-1.7.1-8.el7.src.rpm
ppc64:
OpenEXR-debuginfo-1.7.1-8.el7.ppc.rpm
OpenEXR-debuginfo-1.7.1-8.el7.ppc64.rpm
OpenEXR-libs-1.7.1-8.el7.ppc.rpm
OpenEXR-libs-1.7.1-8.el7.ppc64.rpm
ppc64le:
OpenEXR-debuginfo-1.7.1-8.el7.ppc64le.rpm
OpenEXR-libs-1.7.1-8.el7.ppc64le.rpm
s390x:
OpenEXR-debuginfo-1.7.1-8.el7.s390.rpm
OpenEXR-debuginfo-1.7.1-8.el7.s390x.rpm
OpenEXR-libs-1.7.1-8.el7.s390.rpm
OpenEXR-libs-1.7.1-8.el7.s390x.rpm
x86_64:
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-libs-1.7.1-8.el7.i686.rpm
OpenEXR-libs-1.7.1-8.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
OpenEXR-1.7.1-8.el7.ppc64.rpm
OpenEXR-debuginfo-1.7.1-8.el7.ppc.rpm
OpenEXR-debuginfo-1.7.1-8.el7.ppc64.rpm
OpenEXR-devel-1.7.1-8.el7.ppc.rpm
OpenEXR-devel-1.7.1-8.el7.ppc64.rpm
ppc64le:
OpenEXR-1.7.1-8.el7.ppc64le.rpm
OpenEXR-debuginfo-1.7.1-8.el7.ppc64le.rpm
OpenEXR-devel-1.7.1-8.el7.ppc64le.rpm
s390x:
OpenEXR-1.7.1-8.el7.s390x.rpm
OpenEXR-debuginfo-1.7.1-8.el7.s390.rpm
OpenEXR-debuginfo-1.7.1-8.el7.s390x.rpm
OpenEXR-devel-1.7.1-8.el7.s390.rpm
OpenEXR-devel-1.7.1-8.el7.s390x.rpm
x86_64:
OpenEXR-1.7.1-8.el7.x86_64.rpm
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-devel-1.7.1-8.el7.i686.rpm
OpenEXR-devel-1.7.1-8.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
OpenEXR-1.7.1-8.el7.src.rpm
x86_64:
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-libs-1.7.1-8.el7.i686.rpm
OpenEXR-libs-1.7.1-8.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
OpenEXR-1.7.1-8.el7.x86_64.rpm
OpenEXR-debuginfo-1.7.1-8.el7.i686.rpm
OpenEXR-debuginfo-1.7.1-8.el7.x86_64.rpm
OpenEXR-devel-1.7.1-8.el7.i686.rpm
OpenEXR-devel-1.7.1-8.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-11761
https://access.redhat.com/security/cve/CVE-2020-11763
https://access.redhat.com/security/cve/CVE-2020-11764
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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P3yT
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. ==========================================================================
Ubuntu Security Notice USN-4339-1
April 27, 2020
openexr vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04
- Ubuntu 19.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in OpenEXR.
Software Description:
- openexr: tools for the OpenEXR image format
Details:
Brandon Perry discovered that OpenEXR incorrectly handled certain malformed
EXR image files. If a user were tricked into opening a crafted EXR image
file, a remote attacker could cause a denial of service, or possibly
execute arbitrary code. This issue only applied to Ubuntu 20.04 LTS.
(CVE-2017-9111, CVE-2017-9113, CVE-2017-9115)
Tan Jie discovered that OpenEXR incorrectly handled certain malformed EXR
image files. If a user were tricked into opening a crafted EXR image file,
a remote attacker could cause a denial of service, or possibly execute
arbitrary code. This issue only applied to Ubuntu 20.04 LTS.
(CVE-2018-18444)
Samuel Groß discovered that OpenEXR incorrectly handled certain malformed
EXR image files. If a user were tricked into opening a crafted EXR image
file, a remote attacker could cause a denial of service, or possibly
execute arbitrary code. (CVE-2020-11758, CVE-2020-11759, CVE-2020-11760,
CVE-2020-11761, CVE-2020-11762, CVE-2020-11763, CVE-2020-11764)
It was discovered that OpenEXR incorrectly handled certain malformed EXR
image files. If a user were tricked into opening a crafted EXR image
file, a remote attacker could cause a denial of service. (CVE-2020-11765)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04:
libopenexr24 2.3.0-6ubuntu0.1
openexr 2.3.0-6ubuntu0.1
Ubuntu 19.10:
libopenexr23 2.2.1-4.1ubuntu1.1
openexr 2.2.1-4.1ubuntu1.1
Ubuntu 18.04 LTS:
libopenexr22 2.2.0-11.1ubuntu1.2
openexr 2.2.0-11.1ubuntu1.2
Ubuntu 16.04 LTS:
libopenexr22 2.2.0-10ubuntu2.2
openexr 2.2.0-10ubuntu2.2
In general, a standard system update will make all the necessary changes.
For the stable distribution (buster), these problems have been fixed in
version 2.2.1-4.1+deb10u1.
We recommend that you upgrade your openexr packages.
For the detailed security status of openexr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openexr
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl9KkM8ACgkQEMKTtsN8
TjYiCxAAqny8A+WbtYBonQ42ciQ2Hc1f90CI6l1Gp/ZK7RARL7+cLOHTh+hEniIG
G6cwDGAwAgOtNPer+bT8Mwx6gF8bTii3nF5MMhiN22L7buzHruxsqpC+g94MeZHW
vn6GpkTCPSHW5m4+O3pwrYDK3lr5ucNwPVegcXqtJuG0SrhY9VyTrtmzwtoP0YVx
ANOpJhCLNEU5vIdEpzIfdjAoM6nsGG/FDN5sP2B9sEB69s7dQXAX5ksuu4Rg71bo
W7OjAWB+1MIuFT2blax4Z0qD9Nuiy252AM9MAzMmdBPsFnix0/E2lmyd2OGknUkY
l+sq61TR7pA7AVbtLpLBy2fKFS/Jj1KTFI6J+GmZiOBGAzHrWevjyclYBRI0exVg
zKnI2IdO9f0qdeTiZhtAcSEV8hb1mSoo0fPRM0ZGxdMV0MTNeOmj+doTTw+SlSJK
3iyKUDgRy60JjQMq8gBaPSRl6tuTjEdFzbJLsFPvZVY5vQsy4KIuh024RrEjri0c
R2oLvboIS2xddK+T/9NPc15vruZiUut0j/3EsBqbDn3hBXMpQb0NFv0kuC+uvmwZ
UgxRA32shnjcUES8+TBqeB+cvMnukTlOfqQEY2VNhG//45gcQH6rEcf45W07XTGD
djd3v06+rkeUhfuZHL9OAOj2BowTrp9CRooWT1dufPPUkL1aoUY=
=FDcC
-----END PGP SIGNATURE-----
| VAR-202004-1808 | CVE-2020-8148 | UniFi Cloud Key Authentication vulnerability in firmware |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
UniFi Cloud Key firmware < 1.1.6 contains a vulnerability that enables an attacker being able to change a device hostname by sending a malicious API request. This affects Cloud Key gen2 and Cloud Key gen2 Plus
| VAR-202004-0826 | CVE-2019-13916 | Cypress WICED Studio Out-of-bounds write vulnerability in |
CVSS V2: 5.8 CVSS V3: 8.8 Severity: HIGH |
An issue was discovered in Cypress (formerly Broadcom) WICED Studio 6.2 CYW20735B1 and CYW20819A1. As a Bluetooth Low Energy (BLE) packet is received, it is copied into a Heap (ThreadX Block) buffer. The buffer allocated in dhmulp_getRxBuffer is four bytes too small to hold the maximum of 255 bytes plus headers. It is possible to corrupt a pointer in the linked list holding the free buffers of the g_mm_BLEDeviceToHostPool Block pool. This pointer can be fully controlled by overflowing with 3 bytes of packet data and the first byte of the packet CRC checksum. The checksum can be freely chosen by adapting the packet data accordingly. An attacker might be able to allocate the overwritten address as a receive buffer resulting in a write-what-where condition. This is fixed in BT SDK2.4 and BT SDK2.45. Cypress ( Old Broadcom) WICED Studio Is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Cypress Semiconductor WICED Studio is an Internet of Things (IoT) SDK (software development kit) that combines Wi-Fi and Bluetooth into a single integrated development environment by Cypress Semiconductor.
There is a buffer error vulnerability in Cypress Semiconductor WICED Studio 6.2 version CYW20735B1 and CYW20819A1. The vulnerability stems from the fact that when a network system or product performs an operation on memory, the data boundary is not correctly verified, resulting in an incorrect read and write operation to other associated memory locations. Attackers can use this vulnerability to cause buffer overflow or heap overflow
| VAR-202004-1237 | CVE-2020-3126 | Cisco Webex Meetings Input verification vulnerability in |
CVSS V2: 3.5 CVSS V3: 3.5 Severity: LOW |
vulnerability within the Multimedia Viewer feature of Cisco Webex Meetings could allow an authenticated, remote attacker to bypass security protections. The vulnerability is due to missing security warning dialog boxes when a room host views shared multimedia files. An authenticated, remote attacker could exploit this vulnerability by using the host role to share files within the Multimedia sharing feature and convincing a former room host to view that file. A warning dialog normally appears cautioning users before the file is displayed; however, the former host would not see that warning dialog, and any shared multimedia would be rendered within the user's browser. The attacker could leverage this behavior to conduct additional attacks by including malicious files within a targeted room host's browser window. Cisco Webex Meetings There is an input verification vulnerability in.Information may be tampered with. Cisco Webex Meetings is a set of video conferencing solutions of Cisco (Cisco)
| VAR-202004-0682 | CVE-2019-1866 | Cisco Webex Business Suite Vulnerability in inadequate validation of data reliability in |
CVSS V2: 4.3 CVSS V3: 3.7 Severity: LOW |
Cisco Webex Business Suite before 39.1.0 contains a vulnerability that could allow an unauthenticated, remote attacker to affect the integrity of the application. The vulnerability is due to improper validation of host header values. An attacker with a privileged network position, either a man-in-the-middle or by intercepting wireless network traffic, could exploit this vulnerability to manipulate header values sent by a client to the affected application. The attacker could cause the application to use input from the header to redirect a user from the Cisco Webex Meetings Online site to an arbitrary site of the attacker's choosing. Cisco Webex Business Suite Exists in an inadequate validation of data reliability vulnerabilities.Information may be tampered with. Cisco Webex Business Suite is a set of video conferencing solutions of Cisco (Cisco)
| VAR-202004-0234 | CVE-2020-11724 | OpenResty In HTTP Request Smagling Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered in OpenResty before 1.15.8.4. ngx_http_lua_subrequest.c allows HTTP request smuggling, as demonstrated by the ngx.location.capture API. OpenResty is a web application server based on Nginx and Lua from China Ou Rui Software Development (OpenResty).
The ngx_http_lua_subrequest.c file in versions prior to OpenResty 1.15.8.4 has an environmental problem vulnerability. The vulnerability stems from the unreasonable environmental factors of the network system or product. There is currently no detailed vulnerability details provided. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4750-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
August 26, 2020 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : nginx
CVE ID : CVE-2020-11724
Debian Bug : 964950
It was reported that the Lua module for Nginx, a high-performance web
and reverse proxy server, is prone to a HTTP request smuggling
vulnerability.
For the stable distribution (buster), this problem has been fixed in
version 1.14.2-2+deb10u3.
We recommend that you upgrade your nginx packages.
For the detailed security status of nginx please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/nginx
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl9GlAhfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0Q+QBAAlo31j8w4zpQNYaxVm7K/lH4TukFPbE79ZSBnuWvtiC59a7AwWbfqCWd5
kkMTicjMYsExEp+jgnFex5W0LEQ/weRE8DHnAaDIEs4V1eJHzj5NxPUB0ZpFJshJ
oLB8lMX5vJDTSynMmBzzY65UTZl8/5CVDxbku8yS1zVXtl3RHxCoHpmzxWrpfkhU
cl9fdNVF2Vn1GENen5PNz9AhOXLp/Px6Y/iSAYjwLPQJPTEHbYtdBnu/p113QUz9
OlvW1A7hVYtpg6JfX2/dQMzhBHetyOwqnLSnWMPPe/MOd0hA9m3//DHmR5mIb263
YsdOL27u3IVf6leSZ4T8KhK1IChHZF1/Kw6VCaIKr4LtWtPJYDM+QE7pXA7s9UIM
eulmVn4q2ppjSCgV9MqlQpEYs7xvkAgaEAakE93FwARliAhtvmo5JXtz29NamGfp
FjfC8wMNGinVL4Xt8Za3na4QFDuBFD936qOL38vyPS6MrOc0H6RoI2aDHDr0YJi/
YlrhIyAQ8anAVqFaueGrfz9AWcLDCWKWa6A7ShIZLRIUlPyUwZ4M0jnQNEw4epva
Y8LqLuDvrG2Zl9saVD0YmkAVh2A2o3xVuiQa1O4wTYQPvAW2WT87yjXsamjGila8
whAgsNA6L2BC2Y9jHCCeYV57e/dibmDrC2QFprEeqDNKZD2a8UE=
=QmrI
-----END PGP SIGNATURE-----
. ==========================================================================
Ubuntu Security Notice USN-5371-2
April 28, 2022
nginx vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
nginx could be made to redirect network traffic.
Software Description:
- nginx: small, powerful, scalable web/proxy server
Details:
USN-5371-1 fixed several vulnerabilities in nginx.
This update provides the fix for CVE-2021-3618 for Ubuntu 22.04 LTS.
Original advisory details:
It was discovered that nginx Lua module mishandled certain inputs.
An attacker could possibly use this issue to perform an HTTP Request
Smuggling attack. This issue only affects Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-11724)
It was discovered that nginx Lua module mishandled certain inputs.
An attacker could possibly use this issue to disclose sensitive
information. This issue only affects Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-36309)
It was discovered that nginx mishandled the use of
compatible certificates among multiple encryption protocols.
If a remote attacker were able to intercept the communication,
this issue could be used to redirect traffic between subdomains.
(CVE-2021-3618)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS:
nginx-core 1.18.0-6ubuntu14.1
nginx-extras 1.18.0-6ubuntu14.1
nginx-light 1.18.0-6ubuntu14.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5371-2
https://ubuntu.com/security/notices/USN-5371-1
CVE-2021-3618
Package Information:
https://launchpad.net/ubuntu/+source/nginx/1.18.0-6ubuntu14.1
| VAR-202004-0230 | CVE-2020-11714 | eten Technologies PSG-6528VM cross-site scripting vulnerability |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
eten PSG-6528VM 1.1 devices allow XSS via System Contact or System Location. eten PSG-6528VM A cross-site scripting vulnerability exists in the device.Information may be obtained and tampered with. eten Technologies PSG-6528VM is a Gigabit PoE switch from Eten Technologies, Taiwan. The vulnerability stems from the lack of proper verification of client data by WEB applications. Attackers can use this vulnerability to execute client code
| VAR-202004-0227 | CVE-2020-11710 | docker-kong Vulnerability in |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An issue was discovered in docker-kong (for Kong) through 2.0.3. The admin API port may be accessible on interfaces other than 127.0.0.1. NOTE: The vendor argue that this CVE is not a vulnerability because it has an inaccurate bug scope and patch links. “1) Inaccurate Bug Scope - The issue scope was on Kong's docker-compose template, and not Kong's docker image itself. In reality, this issue is not associated with any version of the Kong gateway. As such, the description stating ‘An issue was discovered in docker-kong (for Kong) through 2.0.3.’ is incorrect. This issue only occurs if a user decided to spin up Kong via docker-compose without following the security documentation. The docker-compose template is meant for users to quickly get started with Kong, and is meant for development purposes only. 2) Incorrect Patch Links - The CVE currently points to a documentation improvement as a “Patch” link: https://github.com/Kong/docs.konghq.com/commit/d693827c32144943a2f45abc017c1321b33ff611.This link actually points to an improvement Kong Inc made for fool-proofing. However, instructions for how to protect the admin API were already well-documented here: https://docs.konghq.com/2.0.x/secure-admin-api/#network-layer-access-restrictions , which was first published back in 2017 (as shown in this commit: https://github.com/Kong/docs.konghq.com/commit/e99cf875d875dd84fdb751079ac37882c9972949) Lastly, the hyperlink to https://github.com/Kong/kong (an unrelated Github Repo to this issue) on the Hyperlink list does not include any meaningful information on this topic. docker-kong (for Kong) There is an unspecified vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. docker-kong is an API3 gateway product used in the Docker application container engine
| VAR-202004-2242 | No CVE | Unauthorized access vulnerability exists in Apsara video surveillance system |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Sichuan Apstar Digital Technology Co., Ltd. was established in 2006. Apstar is dedicated to the development and innovation of network high-definition digital video compression processing technology and is a new force in high-definition digital security.
There is an unauthorized access vulnerability in the Apsida video surveillance system, which can be exploited by attackers to obtain sensitive information.
| VAR-202004-2243 | No CVE | D-Link DGS-1250 Header injection vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
D-Link Dgs-1250 series is a new generation of intelligent 10g port Gigabit network switches.
The D-Link DGS-1250 product has a command injection vulnerability. Attackers can use this vulnerability to execute arbitrary commands.