CVE-2021-3477

Name
CVE-2021-3477
Description
There's a flaw in OpenEXR's deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=1939159
Third Party Advisory https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26956
MLIST https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
GENTOO https://security.gentoo.org/glsa/202107-27

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* openexr >= None <= 2.5.5
cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* openexr >= None < 2.4.3
cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* openexr >= 2.5.0 < 2.5.4

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
openexr 3.13-community 2.5.4-r0 Mark Riedesel <mark+alpine@klowner.com> fixed
openexr 3.14-community 2.5.5-r3 Mark Riedesel <mark+alpine@klowner.com> fixed