CVE-2021-3478

Name
CVE-2021-3478
Description
There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=1939160
Third Party Advisory https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27409
MLIST https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
GENTOO https://security.gentoo.org/glsa/202107-27

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* openexr >= None <= 2.5.5
cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* openexr >= None < 2.4.3
cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* openexr >= 2.5.0 < 2.5.4

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
openexr 3.13-community 2.5.4-r0 Mark Riedesel <mark+alpine@klowner.com> fixed
openexr 3.14-community 2.5.5-r3 Mark Riedesel <mark+alpine@klowner.com> fixed