This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============4439592620054479150== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="pAoUyymaowp6OT8QxLq4B6XiMfWu7rBjt"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --pAoUyymaowp6OT8QxLq4B6XiMfWu7rBjt Content-Type: multipart/mixed; boundary="CulERDCy04AnknhZHraEyB1pJMaPsTCyr"
--CulERDCy04AnknhZHraEyB1pJMaPsTCyr Content-Type: text/plain; charset=utf-8 Content-Language: en-C Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-4339-1 April 27, 2020
openexr vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 - Ubuntu 19.10 - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in OpenEXR.
Software Description: - openexr: tools for the OpenEXR image format
Details:
Brandon Perry discovered that OpenEXR incorrectly handled certain malformed EXR image files. If a user were tricked into opening a crafted EXR image file, a remote attacker could cause a denial of service, or possibly execute arbitrary code. This issue only applied to Ubuntu 20.04 LTS. (CVE-2017-9111, CVE-2017-9113, CVE-2017-9115)
Tan Jie discovered that OpenEXR incorrectly handled certain malformed EXR image files. If a user were tricked into opening a crafted EXR image file, a remote attacker could cause a denial of service, or possibly execute arbitrary code. This issue only applied to Ubuntu 20.04 LTS. (CVE-2018-18444)
Samuel Groà discovered that OpenEXR incorrectly handled certain malformed EXR image files. If a user were tricked into opening a crafted EXR image file, a remote attacker could cause a denial of service, or possibly execute arbitrary code. (CVE-2020-11758, CVE-2020-11759, CVE-2020-11760, CVE-2020-11761, CVE-2020-11762, CVE-2020-11763, CVE-2020-11764)
It was discovered that OpenEXR incorrectly handled certain malformed EXR image files. If a user were tricked into opening a crafted EXR image file, a remote attacker could cause a denial of service. (CVE-2020-11765)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.04: libopenexr24 2.3.0-6ubuntu0.1 openexr 2.3.0-6ubuntu0.1
Ubuntu 19.10: libopenexr23 2.2.1-4.1ubuntu1.1 openexr 2.2.1-4.1ubuntu1.1
Ubuntu 18.04 LTS: libopenexr22 2.2.0-11.1ubuntu1.2 openexr 2.2.0-11.1ubuntu1.2
Ubuntu 16.04 LTS: libopenexr22 2.2.0-10ubuntu2.2 openexr 2.2.0-10ubuntu2.2
In general, a standard system update will make all the necessary changes.
References: https://usn.ubuntu.com/4339-1 CVE-2017-9111, CVE-2017-9113, CVE-2017-9115, CVE-2018-18444, CVE-2020-11758, CVE-2020-11759, CVE-2020-11760, CVE-2020-11761, CVE-2020-11762, CVE-2020-11763, CVE-2020-11764, CVE-2020-11765
Package Information: https://launchpad.net/ubuntu/+source/openexr/2.3.0-6ubuntu0.1 https://launchpad.net/ubuntu/+source/openexr/2.2.1-4.1ubuntu1.1 https://launchpad.net/ubuntu/+source/openexr/2.2.0-11.1ubuntu1.2 https://launchpad.net/ubuntu/+source/openexr/2.2.0-10ubuntu2.2
--CulERDCy04AnknhZHraEyB1pJMaPsTCyr--
--pAoUyymaowp6OT8QxLq4B6XiMfWu7rBjt Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAl6m36IACgkQZWnYVadE vpNyyw/9HRhQUrXiM/2AS6EAGIq5htL1ewUUFdyjhOjyU2i0IrWNaWJzBc0EGUzx nCW07kMftjhvpP3hQB54cKxGg1x6vPevE/DIQH2Y1/8Afhpv1dHKRr/ehbZGyPUz TNpXyJWjU4y6x39VClpD6ZMNfWFuPUE0JtBppdGTKvoyXMAl51uVZvPvOJku6e4L 6570I5Ftd+CHYIeDLe/ctMP0FEw8KnFbTLDmXras3WoNvvGgWVBEDyBXHIxE+JWW FmlJpKZ6KhnjjuHE/5hihcC9j8YEeM5LyeJm9AIZrcOtNBjQcmvy4mnuCxfVgWHQ 9FldBfnsoTST1R6+iVg7FOnPid3AhbbenQWpseD7DcSlrD7c95E7ZinHVOtPGkxt S9Qvw4eNGZ9VDA23oGZShLXV6rjBw+AnijHVNTbgobpTS3SD+epYu7uuLh7/nKuD 5BezzsJChw8oNcDmSUNT7IiDY6074mm8qyfieJ9VM2n5pdMn3CM8NhZmhJMSolAT juKzSTx8XmG++X+i+xKDn/Fu0324y0Pb6n2ywplSwuMmGuAeSwl8AsvNBHVKShOA XK/OMkdFIblmLoqyuRuGC3LS+HRwcLyOvoxXolopVemrEe4+VotyXUto3eI9AIFp xazR+I+BhPniXafz4QNanIE2i4CvgRdUSBbUeaSnedSOO28kbPk= =v3sm -----END PGP SIGNATURE-----
--pAoUyymaowp6OT8QxLq4B6XiMfWu7rBjt--
--===============4439592620054479150== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============4439592620054479150==--
|