First published: Wed Nov 03 2021(Updated: )
A vulnerability was found in openexr where an Integer-overflow was found in Imf_3_1::bytesPerDeepLineTable. References: <a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38912">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38912</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openexr | <=2.2.1-4.1+deb10u1 | 2.2.1-4.1+deb10u2 2.5.4-2+deb11u1 3.1.5-5 3.1.5-5.1 |
Openexr Openexr | <3.1.2 | |
Fedoraproject Fedora | =36 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
redhat/OpenEXR | <3.1.2 | 3.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3933 is a vulnerability that could occur when OpenEXR processes a crafted file on systems where size_t < 64 bits.
CVE-2021-3933 has a severity rating of medium with a score of 5.5.
OpenEXR versions 2.2.1-4.1+deb10u2, 2.5.4-2+deb11u1, 3.1.5-5, and 3.1.5-5.1 are affected on Debian. OpenEXR versions up to 3.1.2 are affected on other systems.
To fix CVE-2021-3933 on Debian, update the OpenEXR package to version 2.2.1-4.1+deb10u2 or higher.
Yes, Fedora version 36 is affected by CVE-2021-3933.