CVE-2021-3479
Published: 31 March 2021
There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.
Priority
CVSS 3 base score: 5.5
Status
Package | Release | Status |
---|---|---|
openexr Launchpad, Ubuntu, Debian |
bionic |
Released
(2.2.0-11.1ubuntu1.6)
|
focal |
Released
(2.3.0-6ubuntu0.5)
|
|
groovy |
Released
(2.5.3-2ubuntu0.2)
|
|
hirsute |
Not vulnerable
(2.5.4-1)
|
|
impish |
Not vulnerable
(2.5.4-2)
|
|
jammy |
Not vulnerable
(2.5.7-1)
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(2.5.4-1)
|
|
xenial |
Released
(2.2.0-10ubuntu2.6)
|