There's a flaw in OpenEXR's Scanline API functionality in versions prior to 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
openexr openexr |
||
debian debian linux 9.0 |
||
debian debian linux 10.0 |