[From nobody Sun Apr  5 23:07:07 2026
Received: (at submit) by bugs.debian.org; 27 Jan 2025 19:50:42 +0000
X-Spam-Checker-Version: SpamAssassin 3.4.6-bugs.debian.org_2005_01_02
 (2021-04-09) on buxtehude.debian.org
X-Spam-Level: 
X-Spam-Status: No, score=-9.6 required=4.0 tests=BAYES_00,FROMDEVELOPER,
 KHOP_HELO_FCRDNS,MD5_SHA1_SUM,RDNS_DYNAMIC,SPF_HELO_NONE,SPF_NONE,
 T_SCC_BODY_TEXT_LINE,XMAILER_REPORTBUG autolearn=ham
 autolearn_force=no version=3.4.6-bugs.debian.org_2005_01_02
X-Spam-Bayes: score:0.0000 Tokens: new, 21; hammy, 132; neutral, 39; spammy,
 1. spammytokens:0.944-+--H*r:bugs.debian.org
 hammytokens:0.000-+--H*F:U*carnil, 0.000-+--XDebbugsCc,
 0.000-+--X-Debbugs-Cc, 0.000-+--H*M:reportbug, 0.000-+--H*MI:reportbug
Return-path: &lt;carnil@debian.org&gt;
Received: from c-82-192-244-13.customer.ggaweb.ch ([82.192.244.13]:53552
 helo=eldamar.lan) by buxtehude.debian.org with esmtp (Exim 4.94.2)
 (envelope-from &lt;carnil@debian.org&gt;) id 1tcV85-0040mt-M8
 for submit@bugs.debian.org; Mon, 27 Jan 2025 19:50:42 +0000
Content-Type: text/plain; charset=&quot;us-ascii&quot;
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Salvatore Bonaccorso &lt;carnil@debian.org&gt;
To: Debian Bug Tracking System &lt;submit@bugs.debian.org&gt;
Subject: openimageio: CVE-2024-55192
Message-ID: &lt;173800743743.3153398.7090794584094976885.reportbug@eldamar.lan&gt;
X-Mailer: reportbug 13.0.2
Date: Mon, 27 Jan 2025 20:50:37 +0100
Delivered-To: submit@bugs.debian.org

Source: openimageio
Version: 2.5.16.0+dfsg-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4550
X-Debbugs-Cc: carnil@debian.org, Debian Security Team &lt;team@security.debian.org&gt;

Hi,

The following vulnerability was published for openimageio.

CVE-2024-55192[0]:
| OpenImageIO v3.1.0.0dev was discovered to contain a heap overflow
| via the component
| OpenImageIO_v3_1_0::farmhash::inlined::Fetch64(char const*).


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities &amp; Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-55192
    https://www.cve.org/CVERecord?id=CVE-2024-55192
[1] https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4550
[2] https://github.com/AcademySoftwareFoundation/OpenImageIO/commit/57de4554d119a9adab8ef5c51ff7841fb6f97041

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
]