CVE-2022-41981

NameCVE-2022-41981
DescriptionA stack-based buffer overflow vulnerability exists in the TGA file format parser of OpenImageIO v2.3.19.0. A specially-crafted targa file can lead to out of bounds read and write on the process stack, which can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
Debian Bugs1027143

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openimageio (PTS)buster2.0.5~dfsg0-1vulnerable
bullseye2.2.10.1+dfsg-1vulnerable
bookworm, sid2.4.7.1+dfsg-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openimageiosource(unstable)2.4.7.1+dfsg-21027143

Notes

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1628

Search for package or bug name: Reporting problems