{"schema_version":"1.7.2","id":"OESA-2021-1167","modified":"2021-05-06T11:02:52Z","published":"2021-05-06T11:02:52Z","upstream":["CVE-2021-3474","CVE-2021-3477","CVE-2021-3475","CVE-2021-20296","CVE-2021-3476","CVE-2021-3479"],"summary":"OpenEXR security update","details":"OpenEXR is a high dynamic-range (HDR) image file format originally developed by Industrial Light \u0026amp; Magic for use in computer imaging applications.\r\n\r\nSecurity Fix(es):\r\n\r\nThere\u0026apos;s a flaw in OpenEXR in versions before 3.0.0-beta. A crafted input file that is processed by OpenEXR could cause a shift overflow in the FastHufDecoder, potentially leading to problems with application availability.(CVE-2021-3474)\r\n\r\nThere\u0026apos;s a flaw in OpenEXR\u0026apos;s deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability.(CVE-2021-3477)\r\n\r\nThere is a flaw in OpenEXR in versions before 3.0.0-beta. An attacker who can submit a crafted file to be processed by OpenEXR could cause an integer overflow, potentially leading to problems with application availability.(CVE-2021-3475)\r\n\r\nA flaw was found in OpenEXR in versions before 3.0.0-beta. A crafted input file supplied by an attacker, that is processed by the Dwa decompression functionality of OpenEXR\u0026apos;s IlmImf library, could cause a NULL pointer dereference. The highest threat from this vulnerability is to system availability.(CVE-2021-20296)\r\n\r\nA flaw was found in OpenEXR\u0026apos;s B44 uncompression functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to OpenEXR could trigger shift overflows, potentially affecting application availability.(CVE-2021-3476)\r\n\r\nThere\u0026apos;s a flaw in OpenEXR\u0026apos;s Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.(CVE-2021-3479)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"OpenEXR","purl":"pkg:rpm/openEuler/OpenEXR\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.0-19.oe1"}]}],"ecosystem_specific":{"aarch64":["OpenEXR-libs-2.2.0-19.oe1.aarch64.rpm","OpenEXR-debuginfo-2.2.0-19.oe1.aarch64.rpm","OpenEXR-devel-2.2.0-19.oe1.aarch64.rpm","OpenEXR-debugsource-2.2.0-19.oe1.aarch64.rpm","OpenEXR-2.2.0-19.oe1.aarch64.rpm"],"src":["OpenEXR-2.2.0-19.oe1.src.rpm"],"x86_64":["OpenEXR-libs-2.2.0-19.oe1.x86_64.rpm","OpenEXR-debugsource-2.2.0-19.oe1.x86_64.rpm","OpenEXR-devel-2.2.0-19.oe1.x86_64.rpm","OpenEXR-debuginfo-2.2.0-19.oe1.x86_64.rpm","OpenEXR-2.2.0-19.oe1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1167"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3474"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3477"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3475"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20296"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3476"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3479"}],"database_specific":{"severity":"Medium"}}