Back to bug 2047745

Who When What Removed Added
Marian Rehak 2022-01-28 13:13:18 UTC Depends On 2047746
Marian Rehak 2022-01-28 13:13:34 UTC Blocks 2047750
TEJ RATHI 2022-02-07 14:39:21 UTC Comment 4 updated
TEJ RATHI 2022-02-07 15:12:49 UTC Depends On 2051591, 2051592
TEJ RATHI 2022-02-07 15:16:16 UTC Depends On 2051596
TEJ RATHI 2022-02-07 15:18:15 UTC CC extras-orphan manisandro
TEJ RATHI 2022-02-07 15:18:31 UTC Depends On 2051598
TEJ RATHI 2022-02-08 04:39:59 UTC Comment 4 updated
TEJ RATHI 2022-02-08 04:52:24 UTC Doc Text A heap-based-buffer-overflow vulnerability was found in OpenEXR's composite_line() function in the 'ImfCompositeDeepScanLine.cpp' file. This flaw allows an attacker to pass specially crafted file to OpenEXR, by tricking the victim into opening it, triggering heap-based buffer-overflow. This leads to memory corruption allowing an attacker to cause a denial of service.
RaTasha Tillery-Smith 2022-02-09 15:09:24 UTC Doc Text A heap-based-buffer-overflow vulnerability was found in OpenEXR's composite_line() function in the 'ImfCompositeDeepScanLine.cpp' file. This flaw allows an attacker to pass specially crafted file to OpenEXR, by tricking the victim into opening it, triggering heap-based buffer-overflow. This leads to memory corruption allowing an attacker to cause a denial of service. A heap-based-buffer-overflow vulnerability was found in OpenEXR's composite_line() function in the 'ImfCompositeDeepScanLine.cpp' file. This flaw allows an attacker to pass a specially crafted file to OpenEXR, by tricking the victim into opening it, triggering a heap-based buffer overflow. This leads to memory corruption and allows an attacker to cause a denial of service.
Nicolas Chauvet (kwizart) 2022-03-04 12:18:47 UTC CC kwizart
Red Hat Bugzilla 2023-07-07 08:31:42 UTC Assignee security-response-team nobody

Back to bug 2047745