openexr is vulnerable to arbitrary code execution. An invalid write of size 2 in the =
operator function in half.h
could allow an attacker to crash the application or execute arbitrary code on the host OS.
lists.opensuse.org/opensuse-security-announce/2019-07/msg00060.html
lists.opensuse.org/opensuse-security-announce/2019-08/msg00000.html
www.openwall.com/lists/oss-security/2017/05/12/5
github.com/openexr/openexr/issues/232
github.com/openexr/openexr/pull/233
github.com/openexr/openexr/releases/tag/v2.2.1
lists.debian.org/debian-lts-announce/2020/08/msg00056.html
security-tracker.debian.org/tracker/CVE-2017-9115
usn.ubuntu.com/4148-1/
usn.ubuntu.com/4339-1/
www.debian.org/security/2020/dsa-4755