Back to bug 1970987
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Pedro Sampaio | 2021-06-11 15:39:56 UTC | Depends On | 1970988, 1970989 | |
| Pedro Sampaio | 2021-06-11 15:43:57 UTC | Blocks | 1970995 | |
| Shawn Jamison | 2021-06-11 17:57:45 UTC | Priority | medium | low |
| Severity | medium | low | ||
| Shawn Jamison | 2021-06-11 18:15:15 UTC | Doc Text | There's a flaw in OpenEXR's ImfDeepScanLineInputFile functionality. An attacker who is able to submit a crafted file to an application linked with OpenEXR could cause an out-of-bounds read. The greatest risk from this flaw is to application availability. | |
| Guilherme de Almeida Suckevicz | 2021-06-11 18:43:31 UTC | Summary | OpenEXR: Heap buffer overflow in Imf_3_1::CharPtrIO::readChars | CVE-2021-3598 OpenEXR: Heap buffer overflow in Imf_3_1::CharPtrIO::readChars |
| Alias | CVE-2021-3598 | |||
| Guilherme de Almeida Suckevicz | 2021-06-11 18:44:53 UTC | Blocks | 1971055 | |
| Shawn Jamison | 2021-06-17 18:52:08 UTC | Depends On | 1973408, 1973409 | |
| Shawn Jamison | 2021-07-02 16:57:31 UTC | Fixed In Version | OpenEXR 3.0.5 | |
| Shawn Jamison | 2021-11-15 14:22:35 UTC | Depends On | 2023361 | |
| Nicolas Chauvet (kwizart) | 2021-12-21 08:11:27 UTC | CC | kwizart | |
| Red Hat Bugzilla | 2023-07-07 08:30:30 UTC | Assignee | security-response-team | nobody |
Back to bug 1970987