From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 998F8158003 for ; Mon, 31 Oct 2022 02:00:00 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id B570DE0A8B; Mon, 31 Oct 2022 01:45:28 +0000 (UTC) Received: from smtp.gentoo.org (woodpecker.gentoo.org [140.211.166.183]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id CDE81E07B3 for ; Mon, 31 Oct 2022 01:28:13 +0000 (UTC) Received: from glsamakerdev.dev.gentoo.org (unknown [140.211.166.165]) by smtp.gentoo.org (Postfix) with ESMTP id E77A9340D21 for ; Mon, 31 Oct 2022 01:28:12 +0000 (UTC) Received: from [172.18.0.3] (unknown [172.18.0.3]) by glsamakerdev.dev.gentoo.org (Postfix) with ESMTP id D60CD8D1A3 for ; Mon, 31 Oct 2022 01:28:12 +0000 (-00) Subject: [gentoo-announce] [ GLSA 202210-31 ] OpenEXR: Multiple Vulnerabilities Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-announce@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply MIME-Version: 1.0 Content-Type: multipart/signed; protocol="application/pgp-signature"; micalg="pgp-sha512"; boundary="===============1033735297227518559==" From: glsamaker@gentoo.org To: gentoo-announce@lists.gentoo.org Reply-To: security@gentoo.org Date: Mon, 31 Oct 2022 01:28:12 -0000 Message-ID: <166717969286.9.7059350333429828838@90bb6a0775af> X-Archives-Salt: 7920faa2-398c-4dd3-a030-d54d9274f087 X-Archives-Hash: e395bc86c0ebe5755d90a75273969d4c --===============1033735297227518559== Content-Type: text/plain; charset="utf-8" - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202210-31 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: OpenEXR: Multiple Vulnerabilities Date: October 31, 2022 Bugs: #838079, #830384, #817431, #810541, #801373, #787452 ID: 202210-31 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been discovered in OpenEXR, the worst of which could result in arbitrary code execution. Background ========== OpenEXR is a high dynamic-range (HDR) image file format developed by Industrial Light & Magic for use in computer imaging applications. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 media-libs/openexr < 3.1.5 >= 3.1.5 Description =========== Multiple vulnerabilities have been discovered in OpenEXR. Please review the CVE identifiers referenced below for details. Impact ====== Please review the referenced CVE identifiers for details. Workaround ========== There is no known workaround at this time. Resolution ========== All OpenEXR users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/openexr-3.1.5" References ========== [ 1 ] CVE-2021-3598 https://nvd.nist.gov/vuln/detail/CVE-2021-3598 [ 2 ] CVE-2021-3605 https://nvd.nist.gov/vuln/detail/CVE-2021-3605 [ 3 ] CVE-2021-3933 https://nvd.nist.gov/vuln/detail/CVE-2021-3933 [ 4 ] CVE-2021-3941 https://nvd.nist.gov/vuln/detail/CVE-2021-3941 [ 5 ] CVE-2021-20304 https://nvd.nist.gov/vuln/detail/CVE-2021-20304 [ 6 ] CVE-2021-23169 https://nvd.nist.gov/vuln/detail/CVE-2021-23169 [ 7 ] CVE-2021-45942 https://nvd.nist.gov/vuln/detail/CVE-2021-45942 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202210-31 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2022 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 --===============1033735297227518559== Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmNfJKwACgkQFMQkOaVy +9mpWhAAspcB060m2hhDtftbhKNkZNuYi2CsYmjCbkd++YzGaR4WUP2LOpXtNAP5 m+3R0fgH7oIBPMFDEhmfrq305LElI7RAe4YHCE8fcbqrBPIlIh45DhseeS5vdBoe zjrCDvfuxaZHEW/wkahZo9D4WBjYGYJN8FJHFW/6C+BYsHggIjQp5MW7rlQ2JcGo u4gfTctNn2/tMeqSv/trR7I+b/i7b/ZH+V28zcxN2AqPT55ojidrDGCaffOex8Jw mCOPdCmy0eKzQjY96EYqduAgTu3l1TsPgPskfSiNaL48G0XxFCpkH3USW1sx5PpF UfzF4dUmswRqCMujP15XyzvYQ3/5kWGSlKSrgAF8l1QQfle66wr55WFtHqLrvhLZ 6PD4szX1xxOaqERU7igHWFiVRoALy2vV6DGULqrg/zF568z2wWJXkKiyEM8y41gQ B8N7ygIkPQKNAzxIgBXCotlV9UzfwYA1u5s7as3G42rTkGzUU2Kco0Py26CHJXCg dEh8pdkcnAjJvQ6QkYtfVTSauGqVvp3xiytVVIV4u4NYTT1eIjgDBqeq4ThhbGN7 u2Aj8na1HAqC1m557zVANI0GH/0CcLQ0S+Gp/MZhRFPNBmK9a7SAALlf/tsbH1K1 UjcCu4DYbfL8U17y8SwFdtj5AsglNZfKOxPVECEci9V/ganppvk= =1zBQ -----END PGP SIGNATURE----- --===============1033735297227518559==--