First published: Mon Mar 15 2021(Updated: )
A flaw was found in OpenEXR's TiledInputFile functionality. This flaw allows an attacker who can submit a crafted single-part non-image to be processed by OpenEXR, to trigger a floating-point exception error. The highest threat from this vulnerability is to system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openexr Openexr | <2.5.4 | |
Debian Debian Linux | =10.0 | |
redhat/OpenEXR | <2.5.4 | 2.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this OpenEXR flaw is CVE-2021-20302.
The severity of CVE-2021-20302 is high with a severity value of 5.5.
The OpenEXR flaw can cause a floating-point exception error, which can impact system availability.
Versions up to and excluding 2.5.4 of OpenEXR and 10.0 of Debian Debian Linux are affected by CVE-2021-20302.
Yes, a fix for CVE-2021-20302 is available in version 2.5.4 of OpenEXR.