vulnerability

Amazon Linux 2023: CVE-2023-5841: Medium priority package update for openexr

Severity
9
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:N)
Published
2024-02-01
Added
2025-02-17
Modified
2025-02-17

Description

Due to a failure in validating the number of scanline samples of a OpenEXR file containing deep scanline data, Academy Software Foundation OpenEX image parsing library version 3.2.1 and prior is susceptible to a heap-based buffer overflow vulnerability. This issue was resolved as of versions v3.2.2 and v3.1.12 of the affected library.
A vulnerability was found in the Academy Software Foundation OpenEXR and requires that a malicious EXR file image is parsed by the target device or environment using OpenEXR. This issue occurs due to a failure in validating the number of scanline samples of an OpenEXR file containing deep scanline data, allowing a read or write primitive based on the provided EXR file attributes. This flaw could be used to read or write memory to a compromised device through an attacker-placed EXR image.

Solution(s)

amazon-linux-2023-upgrade-openexramazon-linux-2023-upgrade-openexr-debuginfoamazon-linux-2023-upgrade-openexr-debugsourceamazon-linux-2023-upgrade-openexr-develamazon-linux-2023-upgrade-openexr-libsamazon-linux-2023-upgrade-openexr-libs-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.