Source: openimageio Version: 2.5.12.0+dfsg-2 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for openimageio. CVE-2024-40630[0]: | OpenImageIO is a toolset for reading, writing, and manipulating | image files of any image file format relevant to VFX / animation via | a format-agnostic API with a feature set, scalability, and | robustness needed for feature film production. In affected versions | there is a bug in the heif input functionality of OpenImageIO. | Specifically, in `HeifInput::seek_subimage()`. In the worst case, | this can lead to an information disclosure vulnerability, | particularly for programs that directly use the `ImageInput` APIs. | This bug has been addressed in commit `0a2dcb4c` which is included | in the 2.5.13.1 release. Users are advised to upgrade. There are no | known workarounds for this issue. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-40630 https://www.cve.org/CVERecord?id=CVE-2024-40630 [1] https://github.com/AcademySoftwareFoundation/OpenImageIO/security/advisories/GHSA-jjm9-9m4m-c8p2 [2] https://github.com/AcademySoftwareFoundation/OpenImageIO/commit/0a2dcb4cf2c3fd4825a146cd3ad929d9d8305ce3 Please adjust the affected versions in the BTS as needed. Regards, Salvatore