vulnerability

Oracle Linux: CVE-2023-5841: ELSA-2024-8800: openexr security update (IMPORTANT) (Multiple Advisories)

Severity
9
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:N)
Published
Feb 1, 2024
Added
Nov 11, 2024
Modified
Dec 1, 2024

Description

Due to a failure in validating the number of scanline samples of a OpenEXR file containing deep scanline data, Academy Software Foundation OpenEX image parsing library version 3.2.1 and prior is susceptible to a heap-based buffer overflow vulnerability. This issue was resolved as of versions v3.2.2 and v3.1.12 of the affected library.
A vulnerability was found in the Academy Software Foundation OpenEXR and requires that a malicious EXR file image is parsed by the target device or environment using OpenEXR. This issue occurs due to a failure in validating the number of scanline samples of an OpenEXR file containing deep scanline data, allowing a read or write primitive based on the provided EXR file attributes. This flaw could be used to read or write memory to a compromised device through an attacker-placed EXR image.

Solution(s)

oracle-linux-upgrade-openexroracle-linux-upgrade-openexr-develoracle-linux-upgrade-openexr-libs
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.