Headline
CVE-2021-3477: Invalid Bug ID
There’s a flaw in OpenEXR’s deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability.
‘1939159?cve=title’ is not a valid bug number nor an alias to a bug.
Please press Back and try again.
Related news
CVE-2020-15306: openexr/CHANGES.md at main · AcademySoftwareFoundation/openexr
An issue was discovered in OpenEXR before v2.5.2. Invalid chunkCount attributes could cause a heap buffer overflow in getChunkOffsetTableSize() in IlmImf/ImfMisc.cpp.