A flaw was found in OpenEXR in versions before 3.0.0-beta. A crafted input file supplied by an attacker, that is processed by the Dwa decompression functionality of OpenEXR's IlmImf library, could cause a NULL pointer dereference. The highest threat from this vulnerability is to system availability.
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "libopenexr-dev",
"binary_version": "2.2.0-10ubuntu2.6+esm1"
},
{
"binary_name": "libopenexr22",
"binary_version": "2.2.0-10ubuntu2.6+esm1"
},
{
"binary_name": "openexr",
"binary_version": "2.2.0-10ubuntu2.6+esm1"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libopenexr-dev",
"binary_version": "2.2.0-11.1ubuntu1.7"
},
{
"binary_name": "libopenexr22",
"binary_version": "2.2.0-11.1ubuntu1.7"
},
{
"binary_name": "openexr",
"binary_version": "2.2.0-11.1ubuntu1.7"
}
]
}
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "libopenexr-dev",
"binary_version": "2.3.0-6ubuntu0.5+esm1"
},
{
"binary_name": "libopenexr24",
"binary_version": "2.3.0-6ubuntu0.5+esm1"
},
{
"binary_name": "openexr",
"binary_version": "2.3.0-6ubuntu0.5+esm1"
}
]
}