It was discovered that OpenEXR incorrectly handled certain malformed EXR image files. If a user were tricked into opening a crafted EXR image file, a remote attacker could cause a denial of service, or possibly execute arbitrary code.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.2.0-10ubuntu2.4", "binary_name": "libopenexr-dev" }, { "binary_version": "2.2.0-10ubuntu2.4", "binary_name": "libopenexr22" }, { "binary_version": "2.2.0-10ubuntu2.4", "binary_name": "libopenexr22-dbgsym" }, { "binary_version": "2.2.0-10ubuntu2.4", "binary_name": "openexr" }, { "binary_version": "2.2.0-10ubuntu2.4", "binary_name": "openexr-dbgsym" }, { "binary_version": "2.2.0-10ubuntu2.4", "binary_name": "openexr-doc" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.2.0-11.1ubuntu1.4", "binary_name": "libopenexr-dev" }, { "binary_version": "2.2.0-11.1ubuntu1.4", "binary_name": "libopenexr22" }, { "binary_version": "2.2.0-11.1ubuntu1.4", "binary_name": "libopenexr22-dbgsym" }, { "binary_version": "2.2.0-11.1ubuntu1.4", "binary_name": "openexr" }, { "binary_version": "2.2.0-11.1ubuntu1.4", "binary_name": "openexr-dbgsym" }, { "binary_version": "2.2.0-11.1ubuntu1.4", "binary_name": "openexr-doc" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.3.0-6ubuntu0.3", "binary_name": "libopenexr-dev" }, { "binary_version": "2.3.0-6ubuntu0.3", "binary_name": "libopenexr24" }, { "binary_version": "2.3.0-6ubuntu0.3", "binary_name": "libopenexr24-dbgsym" }, { "binary_version": "2.3.0-6ubuntu0.3", "binary_name": "openexr" }, { "binary_version": "2.3.0-6ubuntu0.3", "binary_name": "openexr-dbgsym" }, { "binary_version": "2.3.0-6ubuntu0.3", "binary_name": "openexr-doc" } ] }