A flaw was found in OpenEXR in versions before 3.0.0-beta. A crafted input file supplied by an attacker, that is processed by the Dwa decompression functionality of OpenEXR's IlmImf library, could cause a NULL pointer dereference. The highest threat from this vulnerability is to system availability.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.0"
}
]
},
{
"cpe": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "9.0"
}
]
}
]
}{
"cpe": "cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "2.4.3"
},
{
"introduced": "2.5.0"
},
{
"fixed": "2.5.4"
}
]
}"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-20296.json"
"2026-04-12T01:00:38Z"
[
{
"deprecated": false,
"signature_type": "Function",
"digest": {
"function_hash": "147499493693564905582259429661292444797",
"length": 1690.0
},
"target": {
"file": "OpenEXR/IlmImf/ImfScanLineInputFile.cpp",
"function": "ScanLineInputFile::initialize"
},
"source": "https://github.com/AcademySoftwareFoundation/openexr/commit/7bab6d44caf65ee3cabe31553f8e2968c8747be5",
"signature_version": "v1",
"id": "CVE-2021-20296-5d703456"
},
{
"deprecated": false,
"signature_type": "Line",
"digest": {
"line_hashes": [
"183799983013183831380237481661086301550",
"111519733374137260985206676436366582935",
"338562742485568351177658719788975857619",
"84570287594119879542064273017314287589",
"152453817114836365619507449973532304004",
"152126518450649847430180110668365421093",
"334371091860315902789981231789629231501"
],
"threshold": 0.9
},
"target": {
"file": "OpenEXR/IlmImf/ImfScanLineInputFile.cpp"
},
"source": "https://github.com/AcademySoftwareFoundation/openexr/commit/7bab6d44caf65ee3cabe31553f8e2968c8747be5",
"signature_version": "v1",
"id": "CVE-2021-20296-e1f8daad"
}
]