There's a flaw in OpenEXR's scanline input file functionality in versions prior to 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
openexr openexr |
||
debian debian linux 9.0 |
||
debian debian linux 10.0 |