OpenEXR: Multiple Vulnerabilities
Gentoo Linux Security Advisory
||GLSA 201312-07 / openexr
||December 09, 2013
||December 09, 2013: 1
All supported architectures
Multiple vulnerabilities have been found in OpenEXR, allowing
remote attackers to execute arbitrary code or cause a Denial of Service
OpenEXR is a high dynamic-range (HDR) image file format developed by
Industrial Light & Magic for use in computer imaging applications.
Multiple vulnerabilities have been discovered in OpenEXR. Please review
the CVE identifiers referenced below for details.
A context-dependent attacker could execute arbitrary code or cause a
Denial of Service condition via unspecified vectors.
There is no known workaround at this time.
All OpenEXR users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/openexr-1.7.0"
Packages which depend on this library may need to be recompiled. Tools
such as revdep-rebuild may assist in identifying some of these packages.
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since December 08, 2010. It is likely that your system is
already no longer affected by this issue.