Your submission was sent successfully! Close

CVE-2021-3478

Published: 31 March 2021

There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.

Priority

Medium

CVSS 3 base score: 5.5

Status

Package Release Status
openexr
Launchpad, Ubuntu, Debian
bionic
Released (2.2.0-11.1ubuntu1.6)
focal
Released (2.3.0-6ubuntu0.5)
groovy
Released (2.5.3-2ubuntu0.2)
hirsute Not vulnerable
(2.5.4-1)
impish Not vulnerable
(2.5.4-2)
jammy Not vulnerable
(2.5.7-1)
precise Does not exist

trusty Does not exist

upstream
Released (2.5.4-1)
xenial
Released (2.2.0-10ubuntu2.6)