CVE-2021-3479
Gentoo Linux Security Advisory 202107-27
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.
Se presenta un fallo en la funcionalidad de la API Scanline de OpenEXR en versiones anteriores a 3.0.0-beta. Un atacante que pueda ser capaz de enviar un archivo diseñado para que sea procesado por OpenEXR podría desencadenar un consumo excesivo de la memoria, resultando en un impacto para la disponibilidad del sistema.
An update that fixes 5 vulnerabilities is now available. This update for openexr fixes the following issues. Fixed an integer-overflow in Imf_2_5:DwaCompressor:initializeBuffers. Fixed an Integer-overflow in Imf_2_5:DwaCompressor:initializeBuffers. Fixed a Null Pointer dereference in Imf_2_5:hufUncompress. Fixed a Heap-buffer-overflow in Imf_2_5::DeepTiledInputFile::readPixelSampleCounts. Fixed an Out-of-memory caused by allocation of a very large buffer. This update was imported from the SUSE:SLE-15:Update update project.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-03-30 CVE Reserved
- 2021-03-31 CVE Published
- 2024-08-03 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
- CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370 | Issue Tracking | |
https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html | Mailing List |
|
https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html | Mailing List |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1939149 | 2022-12-13 |
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202107-27 | 2022-12-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openexr Search vendor "Openexr" | Openexr Search vendor "Openexr" for product "Openexr" | < 2.4.3 Search vendor "Openexr" for product "Openexr" and version " < 2.4.3" | - |
Affected
| ||||||
Openexr Search vendor "Openexr" | Openexr Search vendor "Openexr" for product "Openexr" | >= 2.5.0 < 2.5.4 Search vendor "Openexr" for product "Openexr" and version " >= 2.5.0 < 2.5.4" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
|