There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.
{
"binaries": [
{
"binary_name": "libopenexr-dev",
"binary_version": "2.2.0-10ubuntu2.6"
},
{
"binary_name": "libopenexr22",
"binary_version": "2.2.0-10ubuntu2.6"
},
{
"binary_name": "openexr",
"binary_version": "2.2.0-10ubuntu2.6"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "libopenexr-dev",
"binary_version": "2.2.0-11.1ubuntu1.6"
},
{
"binary_name": "libopenexr22",
"binary_version": "2.2.0-11.1ubuntu1.6"
},
{
"binary_name": "openexr",
"binary_version": "2.2.0-11.1ubuntu1.6"
}
],
"availability": "No subscription required"
}