Description
There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.
Solution(s)
ubuntu-upgrade-libopenexr22 ubuntu-upgrade-libopenexr24 ubuntu-upgrade-libopenexr25 ubuntu-upgrade-openexr
ReferencesUSN-4900-1 CVE-2021-3478