There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2701-1 | openexr security update |
Debian DLA |
DLA-3236-1 | openexr security update |
EUVD |
EUVD-2021-26800 | There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability. |
Ubuntu USN |
USN-4900-1 | OpenEXR vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T16:53:17.620Z
Reserved: 2021-03-30T00:00:00.000Z
Link: CVE-2021-3478
No data.
Status : Modified
Published: 2021-03-31T14:15:21.127
Modified: 2024-11-21T06:21:38.417
Link: CVE-2021-3478
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN