Description
There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2701-1 | openexr security update |
Debian DLA |
DLA-3236-1 | openexr security update |
EUVD |
EUVD-2021-26800 | There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability. |
Ubuntu USN |
USN-4900-1 | OpenEXR vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T16:53:17.620Z
Reserved: 2021-03-30T00:00:00.000Z
Link: CVE-2021-3478
No data.
Status : Modified
Published: 2021-03-31T14:15:21.127
Modified: 2024-11-21T06:21:38.417
Link: CVE-2021-3478
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN