ALT-PU-2021-1864-1
Closed vulnerabilities
BDU:2021-01975
Уязвимость интерфейса Scanline API библиотеки OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01976
Уязвимость реализации метода сжатия файла с использованием строки сканирования Zip (per scanline) (ImfScanLineInputFile.cpp) библиотеки OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01977
Уязвимость функции DeepTiledInputFile::initialize() (src/lib/OpenEXR/ImfDeepTiledInputFile.cpp) библиотеки OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2021-01978
Уязвимость функции сжатия данных B44 (OpenEXR/IlmImf/ImfB44Compressor.cpp) библиотеки OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01983
Уязвимость функции calculateNumTiles()(OpenEXR/IlmImf/ImfTiledMisc.cpp) библиотеки OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01984
Уязвимость функции FastHufDecoder библиотеки OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05210
Уязвимость функции декомпрессии Dwa библиотеки IlmImf программного обеспечения для хранения изображений с широкими динамическими диапазоном яркости OpenEXR, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01678
Уязвимость функционала TiledInputFile программного обеспечения для хранения изображений с широкими динамическими диапазоном яркости OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01692
Уязвимость функции hufUncompress компонента /IlmImf/ImfHuf.cpp программного обеспечения для хранения изображений с широкими динамическими диапазоном яркости OpenEXR, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01699
Уязвимость функции dataWindowForTile() компонента IlmImf/ImfTiledMisc.cpp программного обеспечения для хранения изображений с широкими динамическими диапазоном яркости OpenEXR, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
BDU:2023-01701
Уязвимость программного обеспечения для хранения изображений с широкими динамическими диапазоном яркости OpenEXR, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-20296
A flaw was found in OpenEXR in versions before 3.0.0-beta. A crafted input file supplied by an attacker, that is processed by the Dwa decompression functionality of OpenEXR's IlmImf library, could cause a NULL pointer dereference. The highest threat from this vulnerability is to system availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24854
- https://bugzilla.redhat.com/show_bug.cgi?id=1939141
- https://bugzilla.redhat.com/show_bug.cgi?id=1939141
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- GLSA-202107-27
- GLSA-202107-27
Modified: 2024-11-21
CVE-2021-20299
A flaw was found in OpenEXR's Multipart input file functionality. A crafted multi-part input file with no actual parts can trigger a NULL pointer dereference. The highest threat from this vulnerability is to system availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25740
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25740
- https://bugzilla.redhat.com/show_bug.cgi?id=1939154
- https://bugzilla.redhat.com/show_bug.cgi?id=1939154
- https://github.com/AcademySoftwareFoundation/openexr/commit/25e9515b06a6bc293d871622b8cafaee7af84e0f
- https://github.com/AcademySoftwareFoundation/openexr/commit/25e9515b06a6bc293d871622b8cafaee7af84e0f
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
Modified: 2024-11-21
CVE-2021-20300
A flaw was found in OpenEXR's hufUncompress functionality in OpenEXR/IlmImf/ImfHuf.cpp. This flaw allows an attacker who can submit a crafted file that is processed by OpenEXR, to trigger an integer overflow. The highest threat from this vulnerability is to system availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25562
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25562
- https://bugzilla.redhat.com/show_bug.cgi?id=1939153
- https://bugzilla.redhat.com/show_bug.cgi?id=1939153
- https://github.com/AcademySoftwareFoundation/openexr/pull/836
- https://github.com/AcademySoftwareFoundation/openexr/pull/836
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
Modified: 2024-11-21
CVE-2021-20302
A flaw was found in OpenEXR's TiledInputFile functionality. This flaw allows an attacker who can submit a crafted single-part non-image to be processed by OpenEXR, to trigger a floating-point exception error. The highest threat from this vulnerability is to system availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25894
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25894
- https://bugzilla.redhat.com/show_bug.cgi?id=1939161
- https://bugzilla.redhat.com/show_bug.cgi?id=1939161
- https://github.com/AcademySoftwareFoundation/openexr/pull/842
- https://github.com/AcademySoftwareFoundation/openexr/pull/842
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
Modified: 2024-11-21
CVE-2021-20303
A flaw found in function dataWindowForTile() of IlmImf/ImfTiledMisc.cpp. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, leading to an out-of-bounds write on the heap. The greatest impact of this flaw is to application availability, with some potential impact to data integrity as well.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25505
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25505
- https://bugzilla.redhat.com/show_bug.cgi?id=1939151
- https://bugzilla.redhat.com/show_bug.cgi?id=1939151
- https://github.com/AcademySoftwareFoundation/openexr/pull/831
- https://github.com/AcademySoftwareFoundation/openexr/pull/831
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
Modified: 2024-11-21
CVE-2021-3474
There's a flaw in OpenEXR in versions before 3.0.0-beta. A crafted input file that is processed by OpenEXR could cause a shift overflow in the FastHufDecoder, potentially leading to problems with application availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24831
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24831
- https://bugzilla.redhat.com/show_bug.cgi?id=1939142
- https://bugzilla.redhat.com/show_bug.cgi?id=1939142
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- GLSA-202107-27
- GLSA-202107-27
Modified: 2024-11-21
CVE-2021-3475
There is a flaw in OpenEXR in versions before 3.0.0-beta. An attacker who can submit a crafted file to be processed by OpenEXR could cause an integer overflow, potentially leading to problems with application availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25297
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25297
- https://bugzilla.redhat.com/show_bug.cgi?id=1939144
- https://bugzilla.redhat.com/show_bug.cgi?id=1939144
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- GLSA-202107-27
- GLSA-202107-27
Modified: 2024-11-21
CVE-2021-3476
A flaw was found in OpenEXR's B44 uncompression functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to OpenEXR could trigger shift overflows, potentially affecting application availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24787
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24787
- https://bugzilla.redhat.com/show_bug.cgi?id=1939145
- https://bugzilla.redhat.com/show_bug.cgi?id=1939145
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- GLSA-202107-27
- GLSA-202107-27
Modified: 2024-11-21
CVE-2021-3477
There's a flaw in OpenEXR's deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26956
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26956
- https://bugzilla.redhat.com/show_bug.cgi?id=1939159
- https://bugzilla.redhat.com/show_bug.cgi?id=1939159
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- GLSA-202107-27
- GLSA-202107-27
Modified: 2024-11-21
CVE-2021-3478
There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27409
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27409
- https://bugzilla.redhat.com/show_bug.cgi?id=1939160
- https://bugzilla.redhat.com/show_bug.cgi?id=1939160
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- GLSA-202107-27
- GLSA-202107-27
Modified: 2024-11-21
CVE-2021-3479
There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25370
- https://bugzilla.redhat.com/show_bug.cgi?id=1939149
- https://bugzilla.redhat.com/show_bug.cgi?id=1939149
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20210703 [SECURITY] [DLA 2701-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- [debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update
- GLSA-202107-27
- GLSA-202107-27