[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256040

 
 

909

 
 

199103

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:89045809
This update for openexr fixes the following issues: - CVE-2021-3477: Fixed Heap-buffer-overflow in Imf_2_5::DeepTiledInputFile::readPixelSampleCounts . - CVE-2021-3941: Fixed divide-by-zero in Imf_3_1:RGBtoXYZ . - CVE-2021-3933: Fixed integer-overflow in Imf_3_1:bytesPerDeepLineTable .

oval:org.secpod.oval:def:610305
Multiple security vulnerabilities have been found in OpenEXR, command-line tools and a library for the OpenEXR image format. Buffer overflows or out-of-bound reads could lead to a denial of service if a malformed image file is processed.

oval:org.secpod.oval:def:121769
OpenEXR is an open-source high-dynamic-range floating-point image file format for high-quality image processing and storage. This document presents a brief overview of OpenEXR and explains concepts that are specific to this format. This package containes the binaries for OpenEXR.

oval:org.secpod.oval:def:121582
MinGW Windows openexr library.

oval:org.secpod.oval:def:706211
openexr: tools for the OpenEXR image format OpenEXR could be made to crash or execute arbitrary code if it received a specially crafted EXR file.

oval:org.secpod.oval:def:76594
openexr: tools for the OpenEXR image format OpenEXR could be made to crash or execute arbitrary code if it received a specially crafted EXR file.

oval:org.secpod.oval:def:89047301
This update for openexr fixes the following issues: - CVE-2021-3941: Fixed divide-by-zero in Imf_3_1:RGBtoXYZ . - CVE-2021-3933: Fixed integer-overflow in Imf_3_1:bytesPerDeepLineTable .

oval:org.secpod.oval:def:88443
Multiple security vulnerabilities have been found in OpenEXR, command-line tools and a library for the OpenEXR image format. Buffer overflows or out-of-bound reads could lead to a denial of service if a malformed image file is processed.

oval:org.secpod.oval:def:19500085
An integer overflow could occur when OpenEXR processes a crafted file on systems where size_t is less than 64 bits. This issue could cause an invalid bytesPerLine and maxBytesPerLine value, which leads to problems with application stability or other attack paths. In ImfChromaticities.cpp routine RGB ...

CPE    1
cpe:/a:openexr:openexr
CWE    1
CWE-190
*CVE
CVE-2021-3933

© SecPod Technologies