ALT-BU-2021-3957-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2021-01975
Уязвимость интерфейса Scanline API библиотеки OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01976
Уязвимость реализации метода сжатия файла с использованием строки сканирования Zip (per scanline) (ImfScanLineInputFile.cpp) библиотеки OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01977
Уязвимость функции DeepTiledInputFile::initialize() (src/lib/OpenEXR/ImfDeepTiledInputFile.cpp) библиотеки OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2021-01978
Уязвимость функции сжатия данных B44 (OpenEXR/IlmImf/ImfB44Compressor.cpp) библиотеки OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01983
Уязвимость функции calculateNumTiles()(OpenEXR/IlmImf/ImfTiledMisc.cpp) библиотеки OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01984
Уязвимость функции FastHufDecoder библиотеки OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05210
Уязвимость функции декомпрессии Dwa библиотеки IlmImf программного обеспечения для хранения изображений с широкими динамическими диапазоном яркости OpenEXR, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01678
Уязвимость функционала TiledInputFile программного обеспечения для хранения изображений с широкими динамическими диапазоном яркости OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01692
Уязвимость функции hufUncompress компонента /IlmImf/ImfHuf.cpp программного обеспечения для хранения изображений с широкими динамическими диапазоном яркости OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01699
Уязвимость функции dataWindowForTile() компонента IlmImf/ImfTiledMisc.cpp программного обеспечения для хранения изображений с широкими динамическими диапазоном яркости OpenEXR, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
BDU:2023-01701
Уязвимость программного обеспечения для хранения изображений с широкими динамическими диапазоном яркости OpenEXR, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-20296
A flaw was found in OpenEXR in versions before 3.0.0-beta. A crafted input file supplied by an attacker, that is processed by the Dwa decompression functionality of OpenEXR's IlmImf library, could cause a NULL pointer dereference. The highest threat from this vulnerability is to system availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854
- https://bugzilla.redhat.com/show_bug.cgi?id=1939141
- https://bugzilla.redhat.com/show_bug.cgi?id=1939141
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- GLSA-202107-27
- GLSA-202107-27
Modified: 2024-11-21
CVE-2021-20299
A flaw was found in OpenEXR's Multipart input file functionality. A crafted multi-part input file with no actual parts can trigger a NULL pointer dereference. The highest threat from this vulnerability is to system availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25740
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25740
- https://bugzilla.redhat.com/show_bug.cgi?id=1939154
- https://bugzilla.redhat.com/show_bug.cgi?id=1939154
- https://github.com/AcademySoftwareFoundation/openexr/commit/25e9515b06a6bc293d871622b8cafaee7af84e0f
- https://github.com/AcademySoftwareFoundation/openexr/commit/25e9515b06a6bc293d871622b8cafaee7af84e0f
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
Modified: 2024-11-21
CVE-2021-20300
A flaw was found in OpenEXR's hufUncompress functionality in OpenEXR/IlmImf/ImfHuf.cpp. This flaw allows an attacker who can submit a crafted file that is processed by OpenEXR, to trigger an integer overflow. The highest threat from this vulnerability is to system availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25562
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25562
- https://bugzilla.redhat.com/show_bug.cgi?id=1939153
- https://bugzilla.redhat.com/show_bug.cgi?id=1939153
- https://github.com/AcademySoftwareFoundation/openexr/pull/836
- https://github.com/AcademySoftwareFoundation/openexr/pull/836
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
Modified: 2024-11-21
CVE-2021-20302
A flaw was found in OpenEXR's TiledInputFile functionality. This flaw allows an attacker who can submit a crafted single-part non-image to be processed by OpenEXR, to trigger a floating-point exception error. The highest threat from this vulnerability is to system availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25894
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25894
- https://bugzilla.redhat.com/show_bug.cgi?id=1939161
- https://bugzilla.redhat.com/show_bug.cgi?id=1939161
- https://github.com/AcademySoftwareFoundation/openexr/pull/842
- https://github.com/AcademySoftwareFoundation/openexr/pull/842
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
Modified: 2024-11-21
CVE-2021-20303
A flaw found in function dataWindowForTile() of IlmImf/ImfTiledMisc.cpp. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, leading to an out-of-bounds write on the heap. The greatest impact of this flaw is to application availability, with some potential impact to data integrity as well.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25505
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25505
- https://bugzilla.redhat.com/show_bug.cgi?id=1939151
- https://bugzilla.redhat.com/show_bug.cgi?id=1939151
- https://github.com/AcademySoftwareFoundation/openexr/pull/831
- https://github.com/AcademySoftwareFoundation/openexr/pull/831
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
Modified: 2024-11-21
CVE-2021-3474
There's a flaw in OpenEXR in versions before 3.0.0-beta. A crafted input file that is processed by OpenEXR could cause a shift overflow in the FastHufDecoder, potentially leading to problems with application availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24831
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24831
- https://bugzilla.redhat.com/show_bug.cgi?id=1939142
- https://bugzilla.redhat.com/show_bug.cgi?id=1939142
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- GLSA-202107-27
- GLSA-202107-27
Modified: 2024-11-21
CVE-2021-3475
There is a flaw in OpenEXR in versions before 3.0.0-beta. An attacker who can submit a crafted file to be processed by OpenEXR could cause an integer overflow, potentially leading to problems with application availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25297
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25297
- https://bugzilla.redhat.com/show_bug.cgi?id=1939144
- https://bugzilla.redhat.com/show_bug.cgi?id=1939144
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- GLSA-202107-27
- GLSA-202107-27
Modified: 2024-11-21
CVE-2021-3476
A flaw was found in OpenEXR's B44 uncompression functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to OpenEXR could trigger shift overflows, potentially affecting application availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24787
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24787
- https://bugzilla.redhat.com/show_bug.cgi?id=1939145
- https://bugzilla.redhat.com/show_bug.cgi?id=1939145
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- GLSA-202107-27
- GLSA-202107-27
Modified: 2024-11-21
CVE-2021-3477
There's a flaw in OpenEXR's deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26956
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26956
- https://bugzilla.redhat.com/show_bug.cgi?id=1939159
- https://bugzilla.redhat.com/show_bug.cgi?id=1939159
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- GLSA-202107-27
- GLSA-202107-27
Modified: 2024-11-21
CVE-2021-3478
There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27409
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27409
- https://bugzilla.redhat.com/show_bug.cgi?id=1939160
- https://bugzilla.redhat.com/show_bug.cgi?id=1939160
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- GLSA-202107-27
- GLSA-202107-27
Modified: 2024-11-21
CVE-2021-3479
There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370
- https://bugzilla.redhat.com/show_bug.cgi?id=1939149
- https://bugzilla.redhat.com/show_bug.cgi?id=1939149
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- GLSA-202107-27
- GLSA-202107-27
Closed vulnerabilities
BDU:2021-01975
Уязвимость интерфейса Scanline API библиотеки OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01976
Уязвимость реализации метода сжатия файла с использованием строки сканирования Zip (per scanline) (ImfScanLineInputFile.cpp) библиотеки OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01977
Уязвимость функции DeepTiledInputFile::initialize() (src/lib/OpenEXR/ImfDeepTiledInputFile.cpp) библиотеки OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2021-01978
Уязвимость функции сжатия данных B44 (OpenEXR/IlmImf/ImfB44Compressor.cpp) библиотеки OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01983
Уязвимость функции calculateNumTiles()(OpenEXR/IlmImf/ImfTiledMisc.cpp) библиотеки OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01984
Уязвимость функции FastHufDecoder библиотеки OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05210
Уязвимость функции декомпрессии Dwa библиотеки IlmImf программного обеспечения для хранения изображений с широкими динамическими диапазоном яркости OpenEXR, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01678
Уязвимость функционала TiledInputFile программного обеспечения для хранения изображений с широкими динамическими диапазоном яркости OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01692
Уязвимость функции hufUncompress компонента /IlmImf/ImfHuf.cpp программного обеспечения для хранения изображений с широкими динамическими диапазоном яркости OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01699
Уязвимость функции dataWindowForTile() компонента IlmImf/ImfTiledMisc.cpp программного обеспечения для хранения изображений с широкими динамическими диапазоном яркости OpenEXR, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
BDU:2023-01701
Уязвимость программного обеспечения для хранения изображений с широкими динамическими диапазоном яркости OpenEXR, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-20296
A flaw was found in OpenEXR in versions before 3.0.0-beta. A crafted input file supplied by an attacker, that is processed by the Dwa decompression functionality of OpenEXR's IlmImf library, could cause a NULL pointer dereference. The highest threat from this vulnerability is to system availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854
- https://bugzilla.redhat.com/show_bug.cgi?id=1939141
- https://bugzilla.redhat.com/show_bug.cgi?id=1939141
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- GLSA-202107-27
- GLSA-202107-27
Modified: 2024-11-21
CVE-2021-20299
A flaw was found in OpenEXR's Multipart input file functionality. A crafted multi-part input file with no actual parts can trigger a NULL pointer dereference. The highest threat from this vulnerability is to system availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25740
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25740
- https://bugzilla.redhat.com/show_bug.cgi?id=1939154
- https://bugzilla.redhat.com/show_bug.cgi?id=1939154
- https://github.com/AcademySoftwareFoundation/openexr/commit/25e9515b06a6bc293d871622b8cafaee7af84e0f
- https://github.com/AcademySoftwareFoundation/openexr/commit/25e9515b06a6bc293d871622b8cafaee7af84e0f
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
Modified: 2024-11-21
CVE-2021-20300
A flaw was found in OpenEXR's hufUncompress functionality in OpenEXR/IlmImf/ImfHuf.cpp. This flaw allows an attacker who can submit a crafted file that is processed by OpenEXR, to trigger an integer overflow. The highest threat from this vulnerability is to system availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25562
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25562
- https://bugzilla.redhat.com/show_bug.cgi?id=1939153
- https://bugzilla.redhat.com/show_bug.cgi?id=1939153
- https://github.com/AcademySoftwareFoundation/openexr/pull/836
- https://github.com/AcademySoftwareFoundation/openexr/pull/836
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
Modified: 2024-11-21
CVE-2021-20302
A flaw was found in OpenEXR's TiledInputFile functionality. This flaw allows an attacker who can submit a crafted single-part non-image to be processed by OpenEXR, to trigger a floating-point exception error. The highest threat from this vulnerability is to system availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25894
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25894
- https://bugzilla.redhat.com/show_bug.cgi?id=1939161
- https://bugzilla.redhat.com/show_bug.cgi?id=1939161
- https://github.com/AcademySoftwareFoundation/openexr/pull/842
- https://github.com/AcademySoftwareFoundation/openexr/pull/842
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
Modified: 2024-11-21
CVE-2021-20303
A flaw found in function dataWindowForTile() of IlmImf/ImfTiledMisc.cpp. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, leading to an out-of-bounds write on the heap. The greatest impact of this flaw is to application availability, with some potential impact to data integrity as well.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25505
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25505
- https://bugzilla.redhat.com/show_bug.cgi?id=1939151
- https://bugzilla.redhat.com/show_bug.cgi?id=1939151
- https://github.com/AcademySoftwareFoundation/openexr/pull/831
- https://github.com/AcademySoftwareFoundation/openexr/pull/831
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
Modified: 2024-11-21
CVE-2021-3474
There's a flaw in OpenEXR in versions before 3.0.0-beta. A crafted input file that is processed by OpenEXR could cause a shift overflow in the FastHufDecoder, potentially leading to problems with application availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24831
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24831
- https://bugzilla.redhat.com/show_bug.cgi?id=1939142
- https://bugzilla.redhat.com/show_bug.cgi?id=1939142
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- GLSA-202107-27
- GLSA-202107-27
Modified: 2024-11-21
CVE-2021-3475
There is a flaw in OpenEXR in versions before 3.0.0-beta. An attacker who can submit a crafted file to be processed by OpenEXR could cause an integer overflow, potentially leading to problems with application availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25297
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25297
- https://bugzilla.redhat.com/show_bug.cgi?id=1939144
- https://bugzilla.redhat.com/show_bug.cgi?id=1939144
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- GLSA-202107-27
- GLSA-202107-27
Modified: 2024-11-21
CVE-2021-3476
A flaw was found in OpenEXR's B44 uncompression functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to OpenEXR could trigger shift overflows, potentially affecting application availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24787
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24787
- https://bugzilla.redhat.com/show_bug.cgi?id=1939145
- https://bugzilla.redhat.com/show_bug.cgi?id=1939145
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- GLSA-202107-27
- GLSA-202107-27
Modified: 2024-11-21
CVE-2021-3477
There's a flaw in OpenEXR's deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26956
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26956
- https://bugzilla.redhat.com/show_bug.cgi?id=1939159
- https://bugzilla.redhat.com/show_bug.cgi?id=1939159
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- GLSA-202107-27
- GLSA-202107-27
Modified: 2024-11-21
CVE-2021-3478
There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27409
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27409
- https://bugzilla.redhat.com/show_bug.cgi?id=1939160
- https://bugzilla.redhat.com/show_bug.cgi?id=1939160
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- GLSA-202107-27
- GLSA-202107-27
Modified: 2024-11-21
CVE-2021-3479
There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370
- https://bugzilla.redhat.com/show_bug.cgi?id=1939149
- https://bugzilla.redhat.com/show_bug.cgi?id=1939149
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- GLSA-202107-27
- GLSA-202107-27
Closed vulnerabilities
BDU:2022-00723
Уязвимость компонента math/big.Rat и метода unmarshaltext языка программирования Go, позволяющая нарушителю вызвать аварийный сбой и перезапуск устройства
BDU:2022-01685
Уязвимость компонента archive/zip языка программирования Golang, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01781
Уязвимость компонента net/http/httputil языка программирования Golang, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2022-01783
Уязвимость функций net.Lookup{Addr,CNAME,Host} языка программирования Golang, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-33194
golang.org/x/net before v0.0.0-20210520170846-37e1c6afe023 allows attackers to cause a denial of service (infinite loop) via crafted ParseFragment input.
- https://github.com/golang/net/commit/37e1c6afe02340126705deced573a85ab75209d7
- https://github.com/golang/net/commit/37e1c6afe02340126705deced573a85ab75209d7
- https://groups.google.com/g/golang-announce/c/wPunbCPkWUg
- https://groups.google.com/g/golang-announce/c/wPunbCPkWUg
- FEDORA-2022-17d004ed71
- FEDORA-2022-17d004ed71
Modified: 2024-11-21
CVE-2021-33195
Go before 1.15.13 and 1.16.x before 1.16.5 has functions for DNS lookups that do not validate replies from DNS servers, and thus a return value may contain an unsafe injection (e.g., XSS) that does not conform to the RFC1035 format.
- https://groups.google.com/g/golang-announce
- https://groups.google.com/g/golang-announce
- https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI
- https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI
- GLSA-202208-02
- GLSA-202208-02
- https://security.netapp.com/advisory/ntap-20210902-0005/
- https://security.netapp.com/advisory/ntap-20210902-0005/
Modified: 2024-11-21
CVE-2021-33196
In archive/zip in Go before 1.15.13 and 1.16.x before 1.16.5, a crafted file count (in an archive's header) can cause a NewReader or OpenReader panic.
- https://groups.google.com/g/golang-announce
- https://groups.google.com/g/golang-announce
- https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI
- https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI
- [debian-lts-announce] 20220121 [SECURITY] [DLA 2891-1] golang-1.8 security update
- [debian-lts-announce] 20220121 [SECURITY] [DLA 2891-1] golang-1.8 security update
- [debian-lts-announce] 20220121 [SECURITY] [DLA 2892-1] golang-1.7 security update
- [debian-lts-announce] 20220121 [SECURITY] [DLA 2892-1] golang-1.7 security update
- [debian-lts-announce] 20230419 [SECURITY] [DLA 3395-1] golang-1.11 security update
- [debian-lts-announce] 20230419 [SECURITY] [DLA 3395-1] golang-1.11 security update
- GLSA-202208-02
- GLSA-202208-02
Modified: 2024-11-21
CVE-2021-33197
In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers.
Modified: 2024-11-21
CVE-2021-33198
In Go before 1.15.13 and 1.16.x before 1.16.5, there can be a panic for a large exponent to the math/big.Rat SetString or UnmarshalText method.
Package openvswitch updated to version 2.14.2-alt0.p9 for branch p9 in task 272694.
Closed vulnerabilities
BDU:2021-01134
Уязвимость микропрограммного обеспечения коммутатора Open vSwitch, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-35498
A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1908845
- https://bugzilla.redhat.com/show_bug.cgi?id=1908845
- [debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update
- [debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update
- FEDORA-2021-fba11d37ee
- FEDORA-2021-fba11d37ee
- GLSA-202311-16
- GLSA-202311-16
- DSA-4852
- DSA-4852
- https://www.openwall.com/lists/oss-security/2021/02/10/4
- https://www.openwall.com/lists/oss-security/2021/02/10/4
Package firmware-linux updated to version 20210518-alt1 for branch p9 in task 273537.
Closed bugs
При сборке пакета не создаются симлинки, прописанные в файле WHENCE