CVE-2021-45942

OpenEXR 3.1.x before 3.1.4 has a heap-based buffer overflow in Imf_3_1::LineCompositeTask::execute (called from IlmThread_3_1::NullThreadPoolProvider::addTask and IlmThread_3_1::ThreadPool::addGlobalTask). NOTE: db217f2 may be inapplicable.
References
Link Resource
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416 Exploit Issue Tracking Mailing List Patch Third Party Advisory
https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022 Release Notes Third Party Advisory
https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e Patch Third Party Advisory
https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0 Patch Third Party Advisory
https://github.com/AcademySoftwareFoundation/openexr/pull/1209 Exploit Patch Third Party Advisory
https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4 Release Notes Third Party Advisory
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6TEZDE2S2DB4BF4LZSSV4W3DNW7DSRHJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJ5PW4WNXBKCRFGDZGAQOSVH2BKZKL4X/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XJUK7WIQV5EKWTCZBRXFN6INHG6MLS5O/
https://security.gentoo.org/glsa/202210-31 Third Party Advisory
https://www.debian.org/security/2022/dsa-5299 Third Party Advisory
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416 Exploit Issue Tracking Mailing List Patch Third Party Advisory
https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022 Release Notes Third Party Advisory
https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e Patch Third Party Advisory
https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0 Patch Third Party Advisory
https://github.com/AcademySoftwareFoundation/openexr/pull/1209 Exploit Patch Third Party Advisory
https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4 Release Notes Third Party Advisory
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6TEZDE2S2DB4BF4LZSSV4W3DNW7DSRHJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJ5PW4WNXBKCRFGDZGAQOSVH2BKZKL4X/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XJUK7WIQV5EKWTCZBRXFN6INHG6MLS5O/
https://security.gentoo.org/glsa/202210-31 Third Party Advisory
https://www.debian.org/security/2022/dsa-5299 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:33

Type Values Removed Values Added
References () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416 - Exploit, Issue Tracking, Mailing List, Patch, Third Party Advisory () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416 - Exploit, Issue Tracking, Mailing List, Patch, Third Party Advisory
References () https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022 - Release Notes, Third Party Advisory () https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022 - Release Notes, Third Party Advisory
References () https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e - Patch, Third Party Advisory () https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e - Patch, Third Party Advisory
References () https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0 - Patch, Third Party Advisory () https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0 - Patch, Third Party Advisory
References () https://github.com/AcademySoftwareFoundation/openexr/pull/1209 - Exploit, Patch, Third Party Advisory () https://github.com/AcademySoftwareFoundation/openexr/pull/1209 - Exploit, Patch, Third Party Advisory
References () https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4 - Release Notes, Third Party Advisory () https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4 - Release Notes, Third Party Advisory
References () https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml - Third Party Advisory () https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6TEZDE2S2DB4BF4LZSSV4W3DNW7DSRHJ/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6TEZDE2S2DB4BF4LZSSV4W3DNW7DSRHJ/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJ5PW4WNXBKCRFGDZGAQOSVH2BKZKL4X/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJ5PW4WNXBKCRFGDZGAQOSVH2BKZKL4X/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XJUK7WIQV5EKWTCZBRXFN6INHG6MLS5O/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XJUK7WIQV5EKWTCZBRXFN6INHG6MLS5O/ -
References () https://security.gentoo.org/glsa/202210-31 - Third Party Advisory () https://security.gentoo.org/glsa/202210-31 - Third Party Advisory
References () https://www.debian.org/security/2022/dsa-5299 - Third Party Advisory () https://www.debian.org/security/2022/dsa-5299 - Third Party Advisory

07 Nov 2023, 03:39

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HJ5PW4WNXBKCRFGDZGAQOSVH2BKZKL4X/', 'name': 'FEDORA-2022-89c31c0a0c', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6TEZDE2S2DB4BF4LZSSV4W3DNW7DSRHJ/', 'name': 'FEDORA-2022-f2e0d16c90', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJUK7WIQV5EKWTCZBRXFN6INHG6MLS5O/', 'name': 'FEDORA-2022-b0a85ed1b3', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XJUK7WIQV5EKWTCZBRXFN6INHG6MLS5O/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6TEZDE2S2DB4BF4LZSSV4W3DNW7DSRHJ/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJ5PW4WNXBKCRFGDZGAQOSVH2BKZKL4X/ -

Information

Published : 2022-01-01 01:15

Updated : 2024-11-21 06:33


NVD link : CVE-2021-45942

Mitre link : CVE-2021-45942

CVE.ORG link : CVE-2021-45942


JSON object : View

Products Affected

debian

  • debian_linux

fedoraproject

  • fedora

openexr

  • openexr
CWE
CWE-787

Out-of-bounds Write