CVE-2021-3479

Name
CVE-2021-3479
Description
There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=1939149
Third Party Advisory https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370
MLIST https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
GENTOO https://security.gentoo.org/glsa/202107-27

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* openexr >= None <= 2.5.5
cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* openexr >= None < 2.4.3
cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* openexr >= 2.5.0 < 2.5.4

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
openexr 3.13-community 2.5.4-r0 Mark Riedesel <mark+alpine@klowner.com> fixed
openexr 3.14-community 2.5.5-r3 Mark Riedesel <mark+alpine@klowner.com> fixed