Security update for openexr
Announcement ID: | SUSE-SU-2020:1293-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves seven vulnerabilities and has one security fix can now be installed.
Description:
This update for openexr provides the following fix:
Security issues fixed:
- CVE-2020-11765: Fixed an off-by-one error in use of the ImfXdr.h read function by DwaCompressor:Classifier:Classifier (bsc#1169575).
- CVE-2020-11764: Fixed an out-of-bounds write in copyIntoFrameBuffer in ImfMisc.cpp (bsc#1169574).
- CVE-2020-11763: Fixed an out-of-bounds read and write, as demonstrated by ImfTileOffsets.cpp (bsc#1169576).
- CVE-2020-11762: Fixed an out-of-bounds read and write in DwaCompressor:uncompress in ImfDwaCompressor.cpp when handling the UNKNOWN compression case (bsc#1169549).
- CVE-2020-11761: Fixed an out-of-bounds read during Huffman uncompression, as demonstrated by FastHufDecoder:refill in ImfFastHuf.cpp (bsc#1169578).
- CVE-2020-11760: Fixed an out-of-bounds read during RLE uncompression in rleUncompress in ImfRle.cpp (bsc#1169580).
- CVE-2020-11758: Fixed an out-of-bounds read in ImfOptimizedPixelReading.h (bsc#1169573).
Non-security issue fixed:
- Enable tests when building the package on x86_64. (bsc#1146648)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Desktop Applications Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1293=1
Package List:
-
Desktop Applications Module 15-SP1 (aarch64 ppc64le s390x x86_64)
- openexr-debugsource-2.2.1-3.14.1
- openexr-devel-2.2.1-3.14.1
- libIlmImf-2_2-23-2.2.1-3.14.1
- libIlmImfUtil-2_2-23-2.2.1-3.14.1
- openexr-debuginfo-2.2.1-3.14.1
- libIlmImf-2_2-23-debuginfo-2.2.1-3.14.1
- libIlmImfUtil-2_2-23-debuginfo-2.2.1-3.14.1
References:
- https://www.suse.com/security/cve/CVE-2020-11758.html
- https://www.suse.com/security/cve/CVE-2020-11760.html
- https://www.suse.com/security/cve/CVE-2020-11761.html
- https://www.suse.com/security/cve/CVE-2020-11762.html
- https://www.suse.com/security/cve/CVE-2020-11763.html
- https://www.suse.com/security/cve/CVE-2020-11764.html
- https://www.suse.com/security/cve/CVE-2020-11765.html
- https://bugzilla.suse.com/show_bug.cgi?id=1146648
- https://bugzilla.suse.com/show_bug.cgi?id=1169549
- https://bugzilla.suse.com/show_bug.cgi?id=1169573
- https://bugzilla.suse.com/show_bug.cgi?id=1169574
- https://bugzilla.suse.com/show_bug.cgi?id=1169575
- https://bugzilla.suse.com/show_bug.cgi?id=1169576
- https://bugzilla.suse.com/show_bug.cgi?id=1169578
- https://bugzilla.suse.com/show_bug.cgi?id=1169580