Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-43593 (GCVE-0-2022-43593)
Vulnerability from cvelistv5 – Published: 2022-12-23 23:03 – Updated: 2025-04-14 18:34
VLAI?
EPSS
Summary
A denial of service vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to null pointer dereference. An attacker can provide malicious input to trigger this vulnerability.
Severity ?
5.9 (Medium)
CWE
- CWE-476 - NULL Pointer Dereference
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| OpenImageIO Project | OpenImageIO |
Affected:
v2.4.4.2
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T13:32:59.726Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652",
"tags": [
"x_transferred"
],
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.debian.org/security/2023/dsa-5384"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202305-33"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-43593",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-14T18:34:31.353377Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-14T18:34:46.657Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "OpenImageIO",
"vendor": "OpenImageIO Project",
"versions": [
{
"status": "affected",
"version": "v2.4.4.2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A denial of service vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to null pointer dereference. An attacker can provide malicious input to trigger this vulnerability."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-476",
"description": "CWE-476: NULL Pointer Dereference",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-05-30T05:07:42.353Z",
"orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
"shortName": "talos"
},
"references": [
{
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652"
},
{
"url": "https://www.debian.org/security/2023/dsa-5384"
},
{
"url": "https://security.gentoo.org/glsa/202305-33"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
"assignerShortName": "talos",
"cveId": "CVE-2022-43593",
"datePublished": "2022-12-23T23:03:51.372Z",
"dateReserved": "2022-10-21T00:00:00.000Z",
"dateUpdated": "2025-04-14T18:34:46.657Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-43593",
"date": "2026-04-21",
"epss": "0.00148",
"percentile": "0.35247"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-43593\",\"sourceIdentifier\":\"talos-cna@cisco.com\",\"published\":\"2022-12-22T22:15:16.157\",\"lastModified\":\"2024-11-21T07:26:50.527\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A denial of service vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to null pointer dereference. An attacker can provide malicious input to trigger this vulnerability.\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad de Denegaci\u00f3n de Servicio (DoS) en la funcionalidad DPXOutput::close() de OpenImageIO Project OpenImageIO v2.4.4.2. Un objeto ImageOutput especialmente manipulado puede provocar una desreferencia del puntero null. Un atacante puede proporcionar informaci\u00f3n maliciosa para desencadenar esta vulnerabilidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV30\":[{\"source\":\"talos-cna@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"talos-cna@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openimageio:openimageio:2.4.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68FA2862-ED3E-4743-AFB0-0D23977A805D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}],\"references\":[{\"url\":\"https://security.gentoo.org/glsa/202305-33\",\"source\":\"talos-cna@cisco.com\"},{\"url\":\"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652\",\"source\":\"talos-cna@cisco.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5384\",\"source\":\"talos-cna@cisco.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202305-33\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5384\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652\", \"name\": \"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.debian.org/security/2023/dsa-5384\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.gentoo.org/glsa/202305-33\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T13:32:59.726Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-43593\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-14T18:34:31.353377Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-14T18:34:26.301Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_0\": {\"scope\": \"UNCHANGED\", \"version\": \"3.0\", \"baseScore\": 5.9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"OpenImageIO Project\", \"product\": \"OpenImageIO\", \"versions\": [{\"status\": \"affected\", \"version\": \"v2.4.4.2\"}]}], \"references\": [{\"url\": \"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652\", \"name\": \"https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652\"}, {\"url\": \"https://www.debian.org/security/2023/dsa-5384\"}, {\"url\": \"https://security.gentoo.org/glsa/202305-33\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A denial of service vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to null pointer dereference. An attacker can provide malicious input to trigger this vulnerability.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-476\", \"description\": \"CWE-476: NULL Pointer Dereference\"}]}], \"providerMetadata\": {\"orgId\": \"b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b\", \"shortName\": \"talos\", \"dateUpdated\": \"2023-05-30T05:07:42.353Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-43593\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-14T18:34:46.657Z\", \"dateReserved\": \"2022-10-21T00:00:00.000Z\", \"assignerOrgId\": \"b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b\", \"datePublished\": \"2022-12-23T23:03:51.372Z\", \"assignerShortName\": \"talos\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
GHSA-M2X4-W9M7-WCWM
Vulnerability from github – Published: 2022-12-23 00:30 – Updated: 2022-12-30 15:30
VLAI?
Details
A denial of service vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to null pointer dereference. An attacker can provide malicious input to trigger this vulnerability.
Severity ?
5.9 (Medium)
{
"affected": [],
"aliases": [
"CVE-2022-43593"
],
"database_specific": {
"cwe_ids": [
"CWE-476"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-12-22T22:15:00Z",
"severity": "MODERATE"
},
"details": "A denial of service vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to null pointer dereference. An attacker can provide malicious input to trigger this vulnerability.",
"id": "GHSA-m2x4-w9m7-wcwm",
"modified": "2022-12-30T15:30:23Z",
"published": "2022-12-23T00:30:24Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43593"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202305-33"
},
{
"type": "WEB",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2023/dsa-5384"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
OPENSUSE-SU-2024:12589-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
OpenImageIO-2.4.6.0-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: OpenImageIO-2.4.6.0-1.1 on GA media
Description of the patch: These are all security issues fixed in the OpenImageIO-2.4.6.0-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-12589
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "OpenImageIO-2.4.6.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the OpenImageIO-2.4.6.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12589",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12589-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43592 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43593 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43593/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43594 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43594/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43595 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43596 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43596/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43597 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43597/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43599 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43599/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-43603 page",
"url": "https://www.suse.com/security/cve/CVE-2022-43603/"
}
],
"title": "OpenImageIO-2.4.6.0-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12589-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "OpenImageIO-2.4.6.0-1.1.aarch64",
"product": {
"name": "OpenImageIO-2.4.6.0-1.1.aarch64",
"product_id": "OpenImageIO-2.4.6.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"product": {
"name": "OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"product_id": "OpenImageIO-devel-2.4.6.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"product": {
"name": "libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"product_id": "libOpenImageIO2_4-2.4.6.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"product": {
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"product_id": "libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"product": {
"name": "python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"product_id": "python3-OpenImageIO-2.4.6.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "OpenImageIO-2.4.6.0-1.1.ppc64le",
"product": {
"name": "OpenImageIO-2.4.6.0-1.1.ppc64le",
"product_id": "OpenImageIO-2.4.6.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"product": {
"name": "OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"product_id": "OpenImageIO-devel-2.4.6.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"product": {
"name": "libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"product_id": "libOpenImageIO2_4-2.4.6.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"product": {
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"product_id": "libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"product": {
"name": "python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"product_id": "python3-OpenImageIO-2.4.6.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "OpenImageIO-2.4.6.0-1.1.s390x",
"product": {
"name": "OpenImageIO-2.4.6.0-1.1.s390x",
"product_id": "OpenImageIO-2.4.6.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "OpenImageIO-devel-2.4.6.0-1.1.s390x",
"product": {
"name": "OpenImageIO-devel-2.4.6.0-1.1.s390x",
"product_id": "OpenImageIO-devel-2.4.6.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"product": {
"name": "libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"product_id": "libOpenImageIO2_4-2.4.6.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"product": {
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"product_id": "libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-OpenImageIO-2.4.6.0-1.1.s390x",
"product": {
"name": "python3-OpenImageIO-2.4.6.0-1.1.s390x",
"product_id": "python3-OpenImageIO-2.4.6.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "OpenImageIO-2.4.6.0-1.1.x86_64",
"product": {
"name": "OpenImageIO-2.4.6.0-1.1.x86_64",
"product_id": "OpenImageIO-2.4.6.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"product": {
"name": "OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"product_id": "OpenImageIO-devel-2.4.6.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"product": {
"name": "libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"product_id": "libOpenImageIO2_4-2.4.6.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"product": {
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"product_id": "libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-OpenImageIO-2.4.6.0-1.1.x86_64",
"product": {
"name": "python3-OpenImageIO-2.4.6.0-1.1.x86_64",
"product_id": "python3-OpenImageIO-2.4.6.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "OpenImageIO-2.4.6.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64"
},
"product_reference": "OpenImageIO-2.4.6.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "OpenImageIO-2.4.6.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le"
},
"product_reference": "OpenImageIO-2.4.6.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "OpenImageIO-2.4.6.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x"
},
"product_reference": "OpenImageIO-2.4.6.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "OpenImageIO-2.4.6.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64"
},
"product_reference": "OpenImageIO-2.4.6.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "OpenImageIO-devel-2.4.6.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64"
},
"product_reference": "OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "OpenImageIO-devel-2.4.6.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le"
},
"product_reference": "OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "OpenImageIO-devel-2.4.6.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x"
},
"product_reference": "OpenImageIO-devel-2.4.6.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "OpenImageIO-devel-2.4.6.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64"
},
"product_reference": "OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libOpenImageIO2_4-2.4.6.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64"
},
"product_reference": "libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libOpenImageIO2_4-2.4.6.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le"
},
"product_reference": "libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libOpenImageIO2_4-2.4.6.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x"
},
"product_reference": "libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libOpenImageIO2_4-2.4.6.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64"
},
"product_reference": "libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64"
},
"product_reference": "libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le"
},
"product_reference": "libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x"
},
"product_reference": "libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64"
},
"product_reference": "libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-OpenImageIO-2.4.6.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64"
},
"product_reference": "python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-OpenImageIO-2.4.6.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le"
},
"product_reference": "python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-OpenImageIO-2.4.6.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x"
},
"product_reference": "python3-OpenImageIO-2.4.6.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-OpenImageIO-2.4.6.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
},
"product_reference": "python3-OpenImageIO-2.4.6.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-43592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43592"
}
],
"notes": [
{
"category": "general",
"text": "An information disclosure vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to leaked heap data. An attacker can provide malicious input to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43592",
"url": "https://www.suse.com/security/cve/CVE-2022-43592"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-43592"
},
{
"cve": "CVE-2022-43593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43593"
}
],
"notes": [
{
"category": "general",
"text": "A denial of service vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to null pointer dereference. An attacker can provide malicious input to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43593",
"url": "https://www.suse.com/security/cve/CVE-2022-43593"
},
{
"category": "external",
"summary": "SUSE Bug 1211839 for CVE-2022-43593",
"url": "https://bugzilla.suse.com/1211839"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-43593"
},
{
"cve": "CVE-2022-43594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43594"
}
],
"notes": [
{
"category": "general",
"text": "Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .bmp files.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43594",
"url": "https://www.suse.com/security/cve/CVE-2022-43594"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-43594"
},
{
"cve": "CVE-2022-43595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43595"
}
],
"notes": [
{
"category": "general",
"text": "Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .fits files.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43595",
"url": "https://www.suse.com/security/cve/CVE-2022-43595"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-43595"
},
{
"cve": "CVE-2022-43596",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43596"
}
],
"notes": [
{
"category": "general",
"text": "An information disclosure vulnerability exists in the IFFOutput channel interleaving functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to leaked heap data. An attacker can provide malicious input to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43596",
"url": "https://www.suse.com/security/cve/CVE-2022-43596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-43596"
},
{
"cve": "CVE-2022-43597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43597"
}
],
"notes": [
{
"category": "general",
"text": "Multiple memory corruption vulnerabilities exist in the IFFOutput alignment padding functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to arbitrary code execution. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `m_spec.format` is `TypeDesc::UINT8`.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43597",
"url": "https://www.suse.com/security/cve/CVE-2022-43597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "not set"
}
],
"title": "CVE-2022-43597"
},
{
"cve": "CVE-2022-43599",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43599"
}
],
"notes": [
{
"category": "general",
"text": "Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `xmax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT8`",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43599",
"url": "https://www.suse.com/security/cve/CVE-2022-43599"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "not set"
}
],
"title": "CVE-2022-43599"
},
{
"cve": "CVE-2022-43603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-43603"
}
],
"notes": [
{
"category": "general",
"text": "A denial of service vulnerability exists in the ZfileOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to denial of service. An attacker can provide a malicious file to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-43603",
"url": "https://www.suse.com/security/cve/CVE-2022-43603"
},
{
"category": "external",
"summary": "SUSE Bug 1206695 for CVE-2022-43603",
"url": "https://bugzilla.suse.com/1206695"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:OpenImageIO-devel-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:libOpenImageIO_Util2_4-2.4.6.0-1.1.x86_64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.aarch64",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.ppc64le",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.s390x",
"openSUSE Tumbleweed:python3-OpenImageIO-2.4.6.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-43603"
}
]
}
BDU:2023-04801
Vulnerability from fstec - Published: 14.11.2022
VLAI Severity ?
Title
Уязвимость компонента dpxoutput библиотеки обработки изображений OpenImageIO, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость компонента dpxoutput библиотеки обработки изображений OpenImageIO связана с ошибками разыменования указателя. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании с помощью специально созданного файла
Severity ?
Vendor
Сообщество свободного программного обеспечения, ООО «РусБИТех-Астра», Larry Gritz, АО "НППКТ"
Software Name
Debian GNU/Linux, Astra Linux Special Edition (запись в едином реестре российских программ №369), OpenImageIO, ОСОН ОСнова Оnyx (запись в едином реестре российских программ №5913)
Software Version
10 (Debian GNU/Linux), 11 (Debian GNU/Linux), 1.7 (Astra Linux Special Edition), 4.7 (Astra Linux Special Edition), 2.4.4.2 (OpenImageIO), до 2.9 (ОСОН ОСнова Оnyx)
Possible Mitigations
Для OpenImageIO:
использование рекомендаций производителя: https://github.com/OpenImageIO/oiio/pull/3672
Для Debian:
использование рекомендаций производителя: https://security-tracker.debian.org/tracker/CVE-2022-43593
Для ОС Astra Linux:
использование рекомендаций производителя: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2023-0727SE47
Для ОСОН ОСнова Оnyx:
Обновление программного обеспечения openimageio до версии 2.0.5~dfsg0-1+deb10u2.osnova1
Для ОС Astra Linux Special Edition 1.7:
обновить пакет openimageio до 2.0.5~dfsg0-1+deb10u1 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2023-0426SE17
Reference
https://github.com/OpenImageIO/oiio/pull/3672
https://nvd.nist.gov/vuln/detail/CVE-2022-43593
https://security-tracker.debian.org/tracker/CVE-2022-43593
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652
https://wiki.astralinux.ru/astra-linux-se47-bulletin-2023-0727SE47
https://www.debian.org/security/2023/dsa-5384
https://поддержка.нппкт.рф/bin/view/ОСнова/Обновления/2.9/
CWE
CWE-476
{
"CVSS 2.0": "AV:N/AC:H/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Larry Gritz, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\"",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "10 (Debian GNU/Linux), 11 (Debian GNU/Linux), 1.7 (Astra Linux Special Edition), 4.7 (Astra Linux Special Edition), 2.4.4.2 (OpenImageIO), \u0434\u043e 2.9 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f OpenImageIO:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://github.com/OpenImageIO/oiio/pull/3672\n\n\u0414\u043b\u044f Debian:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://security-tracker.debian.org/tracker/CVE-2022-43593\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2023-0727SE47\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f openimageio \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.0.5~dfsg0-1+deb10u2.osnova1\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux Special Edition 1.7:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 openimageio \u0434\u043e 2.0.5~dfsg0-1+deb10u1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2023-0426SE17",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "14.11.2022",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "24.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "21.08.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-04801",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-43593",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), OpenImageIO, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.9 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 dpxoutput \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0438\u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u0439 OpenImageIO, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0430\u0437\u044b\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044f NULL (CWE-476)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 dpxoutput \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0438\u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u0439 OpenImageIO \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u0440\u0430\u0437\u044b\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u044f \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/OpenImageIO/oiio/pull/3672\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-43593\nhttps://security-tracker.debian.org/tracker/CVE-2022-43593\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2022-1652\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2023-0727SE47\nhttps://www.debian.org/security/2023/dsa-5384\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.9/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-476",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,4)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,9)"
}
GSD-2022-43593
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
A denial of service vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to null pointer dereference. An attacker can provide malicious input to trigger this vulnerability.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2022-43593",
"id": "GSD-2022-43593",
"references": [
"https://www.suse.com/security/cve/CVE-2022-43593.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-43593"
],
"details": "A denial of service vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to null pointer dereference. An attacker can provide malicious input to trigger this vulnerability.",
"id": "GSD-2022-43593",
"modified": "2023-12-13T01:19:31.924450Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "talos-cna@cisco.com",
"ID": "CVE-2022-43593",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "OpenImageIO",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "v2.4.4.2"
}
]
}
}
]
},
"vendor_name": "OpenImageIO Project"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A denial of service vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to null pointer dereference. An attacker can provide malicious input to trigger this vulnerability."
}
]
},
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-476",
"lang": "eng",
"value": "CWE-476: NULL Pointer Dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652",
"refsource": "MISC",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652"
},
{
"name": "https://www.debian.org/security/2023/dsa-5384",
"refsource": "MISC",
"url": "https://www.debian.org/security/2023/dsa-5384"
},
{
"name": "https://security.gentoo.org/glsa/202305-33",
"refsource": "MISC",
"url": "https://security.gentoo.org/glsa/202305-33"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:openimageio:openimageio:2.4.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "talos-cna@cisco.com",
"ID": "CVE-2022-43593"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A denial of service vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to null pointer dereference. An attacker can provide malicious input to trigger this vulnerability."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652"
},
{
"name": "https://www.debian.org/security/2023/dsa-5384",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5384"
},
{
"name": "https://security.gentoo.org/glsa/202305-33",
"refsource": "MISC",
"tags": [],
"url": "https://security.gentoo.org/glsa/202305-33"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-05-30T06:15Z",
"publishedDate": "2022-12-22T22:15Z"
}
}
}
FKIE_CVE-2022-43593
Vulnerability from fkie_nvd - Published: 2022-12-22 22:15 - Updated: 2024-11-21 07:26
Severity ?
Summary
A denial of service vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to null pointer dereference. An attacker can provide malicious input to trigger this vulnerability.
References
| URL | Tags | ||
|---|---|---|---|
| talos-cna@cisco.com | https://security.gentoo.org/glsa/202305-33 | ||
| talos-cna@cisco.com | https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652 | Exploit, Third Party Advisory | |
| talos-cna@cisco.com | https://www.debian.org/security/2023/dsa-5384 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202305-33 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2023/dsa-5384 | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| openimageio | openimageio | 2.4.4.2 | |
| debian | debian_linux | 11.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openimageio:openimageio:2.4.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "68FA2862-ED3E-4743-AFB0-0D23977A805D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A denial of service vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to null pointer dereference. An attacker can provide malicious input to trigger this vulnerability."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Denegaci\u00f3n de Servicio (DoS) en la funcionalidad DPXOutput::close() de OpenImageIO Project OpenImageIO v2.4.4.2. Un objeto ImageOutput especialmente manipulado puede provocar una desreferencia del puntero null. Un atacante puede proporcionar informaci\u00f3n maliciosa para desencadenar esta vulnerabilidad."
}
],
"id": "CVE-2022-43593",
"lastModified": "2024-11-21T07:26:50.527",
"metrics": {
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "talos-cna@cisco.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-12-22T22:15:16.157",
"references": [
{
"source": "talos-cna@cisco.com",
"url": "https://security.gentoo.org/glsa/202305-33"
},
{
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652"
},
{
"source": "talos-cna@cisco.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5384"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/202305-33"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5384"
}
],
"sourceIdentifier": "talos-cna@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "talos-cna@cisco.com",
"type": "Secondary"
}
]
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…