An integer overflow could occur when OpenEXR processes a crafted file on systems where size_t < 64 bits. This could cause an invalid bytesPerLine and maxBytesPerLine value, which could lead to problems with application stability or lead to other attack paths.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3236-1 | openexr security update |
Debian DSA |
DSA-5299-1 | openexr security update |
EUVD |
EUVD-2021-27147 | An integer overflow could occur when OpenEXR processes a crafted file on systems where size_t < 64 bits. This could cause an invalid bytesPerLine and maxBytesPerLine value, which could lead to problems with application stability or lead to other attack paths. |
Ubuntu USN |
USN-5144-1 | OpenEXR vulnerability |
Ubuntu USN |
USN-5620-1 | OpenEXR vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T17:09:09.619Z
Reserved: 2021-11-08T00:00:00.000Z
Link: CVE-2021-3933
No data.
Status : Modified
Published: 2022-03-25T19:15:09.247
Modified: 2024-11-21T06:22:48.513
Link: CVE-2021-3933
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN