Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-43594 (GCVE-0-2022-43594)
Vulnerability from cvelistv5 – Published: 2022-12-23 23:03 – Updated: 2025-02-13 16:33
VLAI?
EPSS
Summary
Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .bmp files.
Severity ?
5.9 (Medium)
CWE
- CWE-476 - NULL Pointer Dereference
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| OpenImageIO Project | OpenImageIO |
Affected:
v2.4.4.2
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T13:32:59.822Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653",
"tags": [
"x_transferred"
],
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.debian.org/security/2023/dsa-5384"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202305-33"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "OpenImageIO",
"vendor": "OpenImageIO Project",
"versions": [
{
"status": "affected",
"version": "v2.4.4.2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .bmp files."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-476",
"description": "CWE-476: NULL Pointer Dereference",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-05-30T05:08:04.214Z",
"orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
"shortName": "talos"
},
"references": [
{
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653"
},
{
"url": "https://www.debian.org/security/2023/dsa-5384"
},
{
"url": "https://security.gentoo.org/glsa/202305-33"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
"assignerShortName": "talos",
"cveId": "CVE-2022-43594",
"datePublished": "2022-12-23T23:03:51.372Z",
"dateReserved": "2022-10-21T00:00:00.000Z",
"dateUpdated": "2025-02-13T16:33:30.505Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openimageio:openimageio:2.4.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68FA2862-ED3E-4743-AFB0-0D23977A805D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .bmp files.\"}, {\"lang\": \"es\", \"value\": \"Existen m\\u00faltiples vulnerabilidades de Denegaci\\u00f3n de Servicio (DoS) en la funcionalidad de cierre de salida de im\\u00e1genes de OpenImageIO Project OpenImageIO v2.4.4.2. Los objetos ImageOutput especialmente manipulados pueden provocar m\\u00faltiples desreferencias de puntero null. Un atacante puede proporcionar m\\u00faltiples entradas maliciosas para desencadenar estas vulnerabilidades. Esta vulnerabilidad se aplica a la escritura de archivos .bmp. \"}]",
"id": "CVE-2022-43594",
"lastModified": "2024-11-21T07:26:50.680",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"talos-cna@cisco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 3.6}]}",
"published": "2022-12-22T22:15:16.227",
"references": "[{\"url\": \"https://security.gentoo.org/glsa/202305-33\", \"source\": \"talos-cna@cisco.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653\", \"source\": \"talos-cna@cisco.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5384\", \"source\": \"talos-cna@cisco.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202305-33\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5384\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "talos-cna@cisco.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"talos-cna@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-476\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-476\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-43594\",\"sourceIdentifier\":\"talos-cna@cisco.com\",\"published\":\"2022-12-22T22:15:16.227\",\"lastModified\":\"2024-11-21T07:26:50.680\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .bmp files.\"},{\"lang\":\"es\",\"value\":\"Existen m\u00faltiples vulnerabilidades de Denegaci\u00f3n de Servicio (DoS) en la funcionalidad de cierre de salida de im\u00e1genes de OpenImageIO Project OpenImageIO v2.4.4.2. Los objetos ImageOutput especialmente manipulados pueden provocar m\u00faltiples desreferencias de puntero null. Un atacante puede proporcionar m\u00faltiples entradas maliciosas para desencadenar estas vulnerabilidades. Esta vulnerabilidad se aplica a la escritura de archivos .bmp. \"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"talos-cna@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"talos-cna@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openimageio:openimageio:2.4.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68FA2862-ED3E-4743-AFB0-0D23977A805D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}],\"references\":[{\"url\":\"https://security.gentoo.org/glsa/202305-33\",\"source\":\"talos-cna@cisco.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653\",\"source\":\"talos-cna@cisco.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5384\",\"source\":\"talos-cna@cisco.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202305-33\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5384\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
GSD-2022-43594
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .bmp files.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2022-43594",
"id": "GSD-2022-43594",
"references": [
"https://www.suse.com/security/cve/CVE-2022-43594.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-43594"
],
"details": "Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .bmp files.",
"id": "GSD-2022-43594",
"modified": "2023-12-13T01:19:31.896249Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "talos-cna@cisco.com",
"ID": "CVE-2022-43594",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "OpenImageIO",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "v2.4.4.2"
}
]
}
}
]
},
"vendor_name": "OpenImageIO Project"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .bmp files."
}
]
},
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-476",
"lang": "eng",
"value": "CWE-476: NULL Pointer Dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653",
"refsource": "MISC",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653"
},
{
"name": "https://www.debian.org/security/2023/dsa-5384",
"refsource": "MISC",
"url": "https://www.debian.org/security/2023/dsa-5384"
},
{
"name": "https://security.gentoo.org/glsa/202305-33",
"refsource": "MISC",
"url": "https://security.gentoo.org/glsa/202305-33"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openimageio:openimageio:2.4.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "68FA2862-ED3E-4743-AFB0-0D23977A805D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .bmp files."
},
{
"lang": "es",
"value": "Existen m\u00faltiples vulnerabilidades de Denegaci\u00f3n de Servicio (DoS) en la funcionalidad de cierre de salida de im\u00e1genes de OpenImageIO Project OpenImageIO v2.4.4.2. Los objetos ImageOutput especialmente manipulados pueden provocar m\u00faltiples desreferencias de puntero null. Un atacante puede proporcionar m\u00faltiples entradas maliciosas para desencadenar estas vulnerabilidades. Esta vulnerabilidad se aplica a la escritura de archivos .bmp. "
}
],
"id": "CVE-2022-43594",
"lastModified": "2024-02-01T17:06:31.517",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "talos-cna@cisco.com",
"type": "Secondary"
}
]
},
"published": "2022-12-22T22:15:16.227",
"references": [
{
"source": "talos-cna@cisco.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202305-33"
},
{
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653"
},
{
"source": "talos-cna@cisco.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5384"
}
],
"sourceIdentifier": "talos-cna@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "talos-cna@cisco.com",
"type": "Secondary"
}
]
}
}
}
}
FKIE_CVE-2022-43594
Vulnerability from fkie_nvd - Published: 2022-12-22 22:15 - Updated: 2024-11-21 07:26
Severity ?
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .bmp files.
References
| URL | Tags | ||
|---|---|---|---|
| talos-cna@cisco.com | https://security.gentoo.org/glsa/202305-33 | Third Party Advisory | |
| talos-cna@cisco.com | https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653 | Exploit, Third Party Advisory | |
| talos-cna@cisco.com | https://www.debian.org/security/2023/dsa-5384 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202305-33 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2023/dsa-5384 | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| openimageio | openimageio | 2.4.4.2 | |
| debian | debian_linux | 11.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openimageio:openimageio:2.4.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "68FA2862-ED3E-4743-AFB0-0D23977A805D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .bmp files."
},
{
"lang": "es",
"value": "Existen m\u00faltiples vulnerabilidades de Denegaci\u00f3n de Servicio (DoS) en la funcionalidad de cierre de salida de im\u00e1genes de OpenImageIO Project OpenImageIO v2.4.4.2. Los objetos ImageOutput especialmente manipulados pueden provocar m\u00faltiples desreferencias de puntero null. Un atacante puede proporcionar m\u00faltiples entradas maliciosas para desencadenar estas vulnerabilidades. Esta vulnerabilidad se aplica a la escritura de archivos .bmp. "
}
],
"id": "CVE-2022-43594",
"lastModified": "2024-11-21T07:26:50.680",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "talos-cna@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-12-22T22:15:16.227",
"references": [
{
"source": "talos-cna@cisco.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202305-33"
},
{
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653"
},
{
"source": "talos-cna@cisco.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5384"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202305-33"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5384"
}
],
"sourceIdentifier": "talos-cna@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "talos-cna@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
OPENSUSE-SU-2024:12589-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
OpenImageIO-2.4.6.0-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: OpenImageIO-2.4.6.0-1.1 on GA media
Description of the patch: These are all security issues fixed in the OpenImageIO-2.4.6.0-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-12589
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "OpenImageIO-2.4.6.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the OpenImageIO-2.4.6.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12589",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12589-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43592 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43593 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43593/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43594 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43594/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43595 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43596 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43596/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43597 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43597/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43599 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43599/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43603 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43603/"
}
],
"title": "OpenImageIO-2.4.6.0-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12589-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "OpenImageIO-2.4.6.0-1.1.aarch64",
"product": {
"name": "OpenImageIO-2.4.6.0-1.1.aarch64",
"product_id": "OpenImageIO-2.4.6.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"product": {
"name": "OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"product_id": "OpenImageIO-devel-2.4.6.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"product": {
"name": "libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"product_id": "libOpenImageIO2_4-2.4.6.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"product": {
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"product_id": "libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"product": {
"name": "python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"product_id": "python3-OpenImageIO-2.4.6.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "OpenImageIO-2.4.6.0-1.1.ppc64le",
"product": {
"name": "OpenImageIO-2.4.6.0-1.1.ppc64le",
"product_id": "OpenImageIO-2.4.6.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"product": {
"name": "OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"product_id": "OpenImageIO-devel-2.4.6.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"product": {
"name": "libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"product_id": "libOpenImageIO2_4-2.4.6.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"product": {
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"product_id": "libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"product": {
"name": "python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"product_id": "python3-OpenImageIO-2.4.6.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "OpenImageIO-2.4.6.0-1.1.s390x",
"product": {
"name": "OpenImageIO-2.4.6.0-1.1.s390x",
"product_id": "OpenImageIO-2.4.6.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "OpenImageIO-devel-2.4.6.0-1.1.s390x",
"product": {
"name": "OpenImageIO-devel-2.4.6.0-1.1.s390x",
"product_id": "OpenImageIO-devel-2.4.6.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"product": {
"name": "libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"product_id": "libOpenImageIO2_4-2.4.6.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"product": {
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"product_id": "libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-OpenImageIO-2.4.6.0-1.1.s390x",
"product": {
"name": "python3-OpenImageIO-2.4.6.0-1.1.s390x",
"product_id": "python3-OpenImageIO-2.4.6.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "OpenImageIO-2.4.6.0-1.1.x86_64",
"product": {
"name": "OpenImageIO-2.4.6.0-1.1.x86_64",
"product_id": "OpenImageIO-2.4.6.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"product": {
"name": "OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"product_id": "OpenImageIO-devel-2.4.6.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"product": {
"name": "libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"product_id": "libOpenImageIO2_4-2.4.6.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"product": {
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"product_id": "libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-OpenImageIO-2.4.6.0-1.1.x86_64",
"product": {
"name": "python3-OpenImageIO-2.4.6.0-1.1.x86_64",
"product_id": "python3-OpenImageIO-2.4.6.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "OpenImageIO-2.4.6.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64"
},
"product_reference": "OpenImageIO-2.4.6.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "OpenImageIO-2.4.6.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le"
},
"product_reference": "OpenImageIO-2.4.6.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "OpenImageIO-2.4.6.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x"
},
"product_reference": "OpenImageIO-2.4.6.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "OpenImageIO-2.4.6.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64"
},
"product_reference": "OpenImageIO-2.4.6.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "OpenImageIO-devel-2.4.6.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64"
},
"product_reference": "OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "OpenImageIO-devel-2.4.6.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le"
},
"product_reference": "OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "OpenImageIO-devel-2.4.6.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x"
},
"product_reference": "OpenImageIO-devel-2.4.6.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "OpenImageIO-devel-2.4.6.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64"
},
"product_reference": "OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libOpenImageIO2_4-2.4.6.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64"
},
"product_reference": "libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libOpenImageIO2_4-2.4.6.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le"
},
"product_reference": "libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libOpenImageIO2_4-2.4.6.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x"
},
"product_reference": "libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libOpenImageIO2_4-2.4.6.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64"
},
"product_reference": "libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64"
},
"product_reference": "libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le"
},
"product_reference": "libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x"
},
"product_reference": "libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64"
},
"product_reference": "libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-OpenImageIO-2.4.6.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64"
},
"product_reference": "python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-OpenImageIO-2.4.6.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le"
},
"product_reference": "python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-OpenImageIO-2.4.6.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x"
},
"product_reference": "python3-OpenImageIO-2.4.6.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-OpenImageIO-2.4.6.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
},
"product_reference": "python3-OpenImageIO-2.4.6.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-43592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43592"
}
],
"notes": [
{
"category": "general",
"text": "An information disclosure vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to leaked heap data. An attacker can provide malicious input to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43592",
"url": "https://www.suse.com/security/cve/CVE-2022-43592"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-43592"
},
{
"cve": "CVE-2022-43593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43593"
}
],
"notes": [
{
"category": "general",
"text": "A denial of service vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to null pointer dereference. An attacker can provide malicious input to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43593",
"url": "https://www.suse.com/security/cve/CVE-2022-43593"
},
{
"category": "external",
"summary": "SUSE Bug 1211839 for CVE-2022-43593",
"url": "https://bugzilla.suse.com/1211839"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-43593"
},
{
"cve": "CVE-2022-43594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43594"
}
],
"notes": [
{
"category": "general",
"text": "Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .bmp files.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43594",
"url": "https://www.suse.com/security/cve/CVE-2022-43594"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-43594"
},
{
"cve": "CVE-2022-43595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43595"
}
],
"notes": [
{
"category": "general",
"text": "Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .fits files.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43595",
"url": "https://www.suse.com/security/cve/CVE-2022-43595"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-43595"
},
{
"cve": "CVE-2022-43596",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43596"
}
],
"notes": [
{
"category": "general",
"text": "An information disclosure vulnerability exists in the IFFOutput channel interleaving functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to leaked heap data. An attacker can provide malicious input to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43596",
"url": "https://www.suse.com/security/cve/CVE-2022-43596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-43596"
},
{
"cve": "CVE-2022-43597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43597"
}
],
"notes": [
{
"category": "general",
"text": "Multiple memory corruption vulnerabilities exist in the IFFOutput alignment padding functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to arbitrary code execution. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `m_spec.format` is `TypeDesc::UINT8`.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43597",
"url": "https://www.suse.com/security/cve/CVE-2022-43597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "not set"
}
],
"title": "CVE-2022-43597"
},
{
"cve": "CVE-2022-43599",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43599"
}
],
"notes": [
{
"category": "general",
"text": "Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `xmax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT8`",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43599",
"url": "https://www.suse.com/security/cve/CVE-2022-43599"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "not set"
}
],
"title": "CVE-2022-43599"
},
{
"cve": "CVE-2022-43603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43603"
}
],
"notes": [
{
"category": "general",
"text": "A denial of service vulnerability exists in the ZfileOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to denial of service. An attacker can provide a malicious file to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43603",
"url": "https://www.suse.com/security/cve/CVE-2022-43603"
},
{
"category": "external",
"summary": "SUSE Bug 1206695 for CVE-2022-43603",
"url": "https://bugzilla.suse.com/1206695"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-43603"
}
]
}
BDU:2023-04803
Vulnerability from fstec - Published: 14.11.2022
VLAI Severity ?
Title
Уязвимость библиотеки обработки изображений OpenImageIO, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость библиотеки обработки изображений OpenImageIO связана с ошибками разыменования указателя. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании с помощью специально созданного файла
Severity ?
Vendor
Сообщество свободного программного обеспечения, ООО «РусБИТех-Астра», Larry Gritz, АО "НППКТ"
Software Name
Debian GNU/Linux, Astra Linux Special Edition (запись в едином реестре российских программ №369), OpenImageIO, ОСОН ОСнова Оnyx (запись в едином реестре российских программ №5913)
Software Version
10 (Debian GNU/Linux), 11 (Debian GNU/Linux), 1.7 (Astra Linux Special Edition), 4.7 (Astra Linux Special Edition), 2.4.4.2 (OpenImageIO), до 2.9 (ОСОН ОСнова Оnyx)
Possible Mitigations
Для OpenImageIO:
использование рекомендаций производителя: https://github.com/OpenImageIO/oiio/pull/3673
Для Debian:
использование рекомендаций производителя: https://security-tracker.debian.org/tracker/CVE-2022-43594
Для ОС Astra Linux:
использование рекомендаций производителя: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2023-0727SE47
Для ОСОН ОСнова Оnyx:
Обновление программного обеспечения openimageio до версии 2.0.5~dfsg0-1+deb10u2.osnova1
Для ОС Astra Linux Special Edition 1.7:
обновить пакет openimageio до 2.0.5~dfsg0-1+deb10u1 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2023-0426SE17
Reference
https://github.com/OpenImageIO/oiio/pull/3673
https://nvd.nist.gov/vuln/detail/CVE-2022-43594
https://security-tracker.debian.org/tracker/CVE-2022-43594
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653
https://wiki.astralinux.ru/astra-linux-se47-bulletin-2023-0727SE47
https://www.debian.org/security/2023/dsa-5384
https://поддержка.нппкт.рф/bin/view/ОСнова/Обновления/2.9/
CWE
CWE-476
{
"CVSS 2.0": "AV:N/AC:H/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Larry Gritz, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\"",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "10 (Debian GNU/Linux), 11 (Debian GNU/Linux), 1.7 (Astra Linux Special Edition), 4.7 (Astra Linux Special Edition), 2.4.4.2 (OpenImageIO), \u0434\u043e 2.9 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f OpenImageIO:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://github.com/OpenImageIO/oiio/pull/3673\n\n\u0414\u043b\u044f Debian:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://security-tracker.debian.org/tracker/CVE-2022-43594\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2023-0727SE47\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f openimageio \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.0.5~dfsg0-1+deb10u2.osnova1\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux Special Edition 1.7:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 openimageio \u0434\u043e 2.0.5~dfsg0-1+deb10u1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2023-0426SE17",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "14.11.2022",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "24.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "21.08.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-04803",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-43594",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), OpenImageIO, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.9 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0438\u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u0439 OpenImageIO, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0430\u0437\u044b\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044f NULL (CWE-476)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0438\u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u0439 OpenImageIO \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u0440\u0430\u0437\u044b\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u044f \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/OpenImageIO/oiio/pull/3673\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-43594\nhttps://security-tracker.debian.org/tracker/CVE-2022-43594\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2022-1653\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2023-0727SE47\nhttps://www.debian.org/security/2023/dsa-5384\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.9/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-476",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,4)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,9)"
}
GHSA-WV3J-W28P-M9X9
Vulnerability from github – Published: 2022-12-23 00:30 – Updated: 2022-12-30 15:30
VLAI?
Details
Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .bmp files.
Severity ?
5.9 (Medium)
{
"affected": [],
"aliases": [
"CVE-2022-43594"
],
"database_specific": {
"cwe_ids": [
"CWE-476"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-12-22T22:15:00Z",
"severity": "MODERATE"
},
"details": "Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .bmp files.",
"id": "GHSA-wv3j-w28p-m9x9",
"modified": "2022-12-30T15:30:23Z",
"published": "2022-12-23T00:30:24Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43594"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202305-33"
},
{
"type": "WEB",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2023/dsa-5384"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…