There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.
[
{
"digest": {
"function_hash": "147499493693564905582259429661292444797",
"length": 1690.0
},
"id": "CVE-2021-3479-3b14fd36",
"target": {
"function": "ScanLineInputFile::initialize",
"file": "OpenEXR/IlmImf/ImfScanLineInputFile.cpp"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://github.com/openexr/openexr/commit/7bab6d44caf65ee3cabe31553f8e2968c8747be5",
"signature_type": "Function"
},
{
"digest": {
"line_hashes": [
"183799983013183831380237481661086301550",
"111519733374137260985206676436366582935",
"338562742485568351177658719788975857619",
"84570287594119879542064273017314287589",
"152453817114836365619507449973532304004",
"152126518450649847430180110668365421093",
"334371091860315902789981231789629231501"
],
"threshold": 0.9
},
"id": "CVE-2021-3479-bea1d206",
"target": {
"file": "OpenEXR/IlmImf/ImfScanLineInputFile.cpp"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://github.com/openexr/openexr/commit/7bab6d44caf65ee3cabe31553f8e2968c8747be5",
"signature_type": "Line"
}
]