Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2009-1722

Published: 31 July 2009

Heap-based buffer overflow in the compression implementation in OpenEXR 1.2.2 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors.

Notes

AuthorNote
mdeslaur
this was fixed in 1.6.1

Priority

Medium

Status

Package Release Status
openexr
Launchpad, Ubuntu, Debian
dapper Ignored
(end of life)
hardy
Released (1.2.2-4.4ubuntu1.1)
intrepid Not vulnerable
(1.6.1-3ubuntu1)
jaunty Not vulnerable
(1.6.1-3ubuntu1)
upstream
Released (1.6.1)
Patches:
upstream: http://cvs.savannah.gnu.org/viewvc/OpenEXR/ChangeLog?root=openexr&r1=1.111&r2=1.112
upstream: http://cvs.savannah.gnu.org/viewvc/OpenEXR/IlmImf/ImfHeader.cpp?root=openexr&r1=1.17&r2=1.19
upstream: http://cvs.savannah.gnu.org/viewvc/OpenEXR/IlmImf/ImfHeader.h?root=openexr&r1=1.7&r2=1.8
upstream: http://cvs.savannah.gnu.org/viewvc/OpenEXR/IlmImf/ImfPizCompressor.cpp?root=openexr&r1=1.6&r2=1.7