Vulnerability: CVE-2021-3477

There’s a flaw in OpenEXR’s deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability.rnCVE-2021-3478


https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26956
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26956
https://bugzilla.redhat.com/show_bug.cgi?id=1939159
https://bugzilla.redhat.com/show_bug.cgi?id=1939159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3477


It's possible to leave a comment as registered users to the site, accessing through social, wordpress account or as anonymous users. If you want to leave a comment as an anonymous user you will be notified by email of a possible response only if you enter the email address (optional). The insertion of any data in the comment fields is totally optional. Whoever decides to insert any data accepts the treatment of these last ones for the inherent purposes of the service that is the answer to the comment and the strictly necessary communications.


Leave a Reply