Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-3478: 1939160 – (CVE-2021-3478) CVE-2021-3478 OpenEXR: Out-of-memory in ScanLineInputFile

There’s a flaw in OpenEXR’s scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.

CVE
#git#perl

Description Michael Kaplan 2021-03-15 17:27:49 UTC

Out-of-memory in openexr_exrcheck_fuzzer

Comment 1 Michael Kaplan 2021-03-15 17:27:54 UTC

External References:

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27409

Comment 2 Michael Kaplan 2021-03-15 17:46:03 UTC

Created OpenEXR tracking bugs for this issue:

Affects: fedora-all [bug 1939190]

Comment 3 Todd Cullum 2021-03-30 16:49:38 UTC

This looks like the upstream patch commit: https://github.com/AcademySoftwareFoundation/openexr/commit/bc88cdb6c97fbf5bc5d11ad8ca55306da931283a

Flaw summary:

In ImfScanLineInputFile.cpp, large lineOffset and bytesPerLine tables could cause OpenEXR to allocate excessive memory, causing an impact to system availability. This was due to _data->linesInBuffer missing in the if check.

Comment 6 Cary Phillips 2021-04-23 01:49:56 UTC

This is fixed in OpenEXR v2.5.4, v2.5.5, and v3.0.1 and beyond.

Comment 7 Cary Phillips 2021-05-25 21:40:49 UTC

This is also fixed in OpenEXR v2.4.3 https://github.com/AcademySoftwareFoundation/openexr/blob/master/CHANGES.md#version-243-may-17-2021

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907