lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1MXjQL-0007Cf-21@titan.mandriva.com>
Date: Mon, 03 Aug 2009 00:21:00 +0200
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2009:190 ] OpenEXR


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2009:190
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : OpenEXR
 Date    : August 2, 2009
 Affected: 2008.1, 2009.0, 2009.1, Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 Multiple vulnerabilities has been found and corrected in OpenEXR:
 
 Multiple integer overflows in OpenEXR 1.2.2 and 1.6.1
 allow context-dependent attackers to cause a denial of service
 (application crash) or possibly execute arbitrary code via unspecified
 vectors that trigger heap-based buffer overflows, related to (1)
 the Imf::PreviewImage::PreviewImage function and (2) compressor
 constructors.  NOTE: some of these details are obtained from third
 party information (CVE-2009-1720).
 
 The decompression implementation in the Imf::hufUncompress function in
 OpenEXR 1.2.2 and 1.6.1 allows context-dependent attackers to cause a
 denial of service (application crash) or possibly execute arbitrary
 code via vectors that trigger a free of an uninitialized pointer
 (CVE-2009-1721).
 
 This update provides fixes for these vulnerabilities.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1720
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1721
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2008.1:
 c94b1eaaaf8fe5e56a24e756714d8335  2008.1/i586/libOpenEXR6-1.6.1-1.1mdv2008.1.i586.rpm
 2b7f464f53e3cb796c973fc68fdd1313  2008.1/i586/libOpenEXR-devel-1.6.1-1.1mdv2008.1.i586.rpm
 fc720240681bc36252ec968e3d87d5fc  2008.1/i586/OpenEXR-1.6.1-1.1mdv2008.1.i586.rpm 
 2db8228f2f29c2569e82bb2e9061062e  2008.1/SRPMS/OpenEXR-1.6.1-1.1mdv2008.1.src.rpm

 Mandriva Linux 2008.1/X86_64:
 77a42846f0e41391ddf5988c8f484535  2008.1/x86_64/lib64OpenEXR6-1.6.1-1.1mdv2008.1.x86_64.rpm
 f1ff4b1300c22ca3f37ff09b40f3b997  2008.1/x86_64/lib64OpenEXR-devel-1.6.1-1.1mdv2008.1.x86_64.rpm
 f146ec3ee2520afad1666ff4b5a81793  2008.1/x86_64/OpenEXR-1.6.1-1.1mdv2008.1.x86_64.rpm 
 2db8228f2f29c2569e82bb2e9061062e  2008.1/SRPMS/OpenEXR-1.6.1-1.1mdv2008.1.src.rpm

 Mandriva Linux 2009.0:
 dcd12124019ac7ba462c1fb195cd52bb  2009.0/i586/libOpenEXR6-1.6.1-3.1mdv2009.0.i586.rpm
 6fde13106a7d60ed4703d4cbfb2ea653  2009.0/i586/libOpenEXR-devel-1.6.1-3.1mdv2009.0.i586.rpm
 7db031f2573d1e24597582d227501d0c  2009.0/i586/OpenEXR-1.6.1-3.1mdv2009.0.i586.rpm 
 d7248b8c2af50851bdfeeb1c76cf6cd8  2009.0/SRPMS/OpenEXR-1.6.1-3.1mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 a853391ab9f3ea00ffa5aaaf1033a2e9  2009.0/x86_64/lib64OpenEXR6-1.6.1-3.1mdv2009.0.x86_64.rpm
 242cf037920faffc237834f99b16e97b  2009.0/x86_64/lib64OpenEXR-devel-1.6.1-3.1mdv2009.0.x86_64.rpm
 48de61eb25fbb97cf594f710a5b5650b  2009.0/x86_64/OpenEXR-1.6.1-3.1mdv2009.0.x86_64.rpm 
 d7248b8c2af50851bdfeeb1c76cf6cd8  2009.0/SRPMS/OpenEXR-1.6.1-3.1mdv2009.0.src.rpm

 Mandriva Linux 2009.1:
 fae5bd98e4a58ce9e39738004a624d0c  2009.1/i586/libOpenEXR6-1.6.1-3.1mdv2009.1.i586.rpm
 b1019fd0d3a9ff9ba462c1b7d85e54d4  2009.1/i586/libOpenEXR-devel-1.6.1-3.1mdv2009.1.i586.rpm
 9aca18bddc1a70b20617710818ccbf20  2009.1/i586/OpenEXR-1.6.1-3.1mdv2009.1.i586.rpm 
 37e18b8c3ba08c126c28fb776f399bd9  2009.1/SRPMS/OpenEXR-1.6.1-3.1mdv2009.1.src.rpm

 Mandriva Linux 2009.1/X86_64:
 625e746ac99f3c012f27fa4fff5b9c9d  2009.1/x86_64/lib64OpenEXR6-1.6.1-3.1mdv2009.1.x86_64.rpm
 bb1bb1a08dd44c2e3be5d46ecdb78fdc  2009.1/x86_64/lib64OpenEXR-devel-1.6.1-3.1mdv2009.1.x86_64.rpm
 9ed6f66f1f14539eca8c81a41aaa5e10  2009.1/x86_64/OpenEXR-1.6.1-3.1mdv2009.1.x86_64.rpm 
 37e18b8c3ba08c126c28fb776f399bd9  2009.1/SRPMS/OpenEXR-1.6.1-3.1mdv2009.1.src.rpm

 Mandriva Enterprise Server 5:
 5c6990ef802a3069b8b5771978a03254  mes5/i586/libOpenEXR6-1.6.1-3.1mdvmes5.i586.rpm
 112136f52f9ce364bb9dd29cf2461581  mes5/i586/libOpenEXR-devel-1.6.1-3.1mdvmes5.i586.rpm
 4e2b49754f9b399825a94d06b6366030  mes5/i586/OpenEXR-1.6.1-3.1mdvmes5.i586.rpm 
 ed0d0f51d77ced65473c17f947357dc1  mes5/SRPMS/OpenEXR-1.6.1-3.1mdvmes5.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 f084d1197a55203bf84ebe0e238d351e  mes5/x86_64/lib64OpenEXR6-1.6.1-3.1mdvmes5.x86_64.rpm
 36b3d8348cbc0532e729a00844232366  mes5/x86_64/lib64OpenEXR-devel-1.6.1-3.1mdvmes5.x86_64.rpm
 b172bfc0cf673525901c73109109293c  mes5/x86_64/OpenEXR-1.6.1-3.1mdvmes5.x86_64.rpm 
 ed0d0f51d77ced65473c17f947357dc1  mes5/SRPMS/OpenEXR-1.6.1-3.1mdvmes5.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKdeRhmqjQ0CJFipgRAhohAJ9r72mQLfb2rVYTEVKjaXklfU/NywCg0d7i
6tYxHeVH+/9YCIkUScOGnOc=
=sY+X
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ