Description
A flaw was found in OpenEXR's Multipart input file functionality. A crafted multi-part input file with no actual parts can trigger a NULL pointer dereference. The highest threat from this vulnerability is to system availability.
References
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25740
Mailing ListPatchThird Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1939154
Issue TrackingPatchThird Party Advisory
https://github.com/AcademySoftwareFoundation/openexr/commit/25e9515b06a6bc293d871622b8cafaee7af84e0f
PatchThird Party Advisory
https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html
Mailing ListThird Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 · High
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Analyzed
Published
2022-03-16T15:15:10.043
3 years agoLast modified
2022-12-13T01:59:22.887
2 years ago