A flaw was found in OpenEXR's B44Compressor. This flaw allows an attacker who can submit a crafted file to be processed by OpenEXR, to exhaust all memory accessible to the application. The highest threat from this vulnerability is to system availability.
The product does not properly control the allocation and maintenance of a limited resource.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25913 | third party advisory mailing list |
https://github.com/AcademySoftwareFoundation/openexr/pull/843 | third party advisory patch |
https://github.com/AcademySoftwareFoundation/openexr/commit/85fd638ae0d5fa132434f4cbf32590261c1dba97 | third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=1939156 | third party advisory issue tracking |
https://access.redhat.com/security/cve/CVE-2021-20298 | third party advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html | third party advisory mailing list |