There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.
{
"binaries": [
{
"binary_version": "2.2.0-10ubuntu2.6",
"binary_name": "libopenexr-dev"
},
{
"binary_version": "2.2.0-10ubuntu2.6",
"binary_name": "libopenexr22"
},
{
"binary_version": "2.2.0-10ubuntu2.6",
"binary_name": "openexr"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_version": "2.2.0-11.1ubuntu1.6",
"binary_name": "libopenexr-dev"
},
{
"binary_version": "2.2.0-11.1ubuntu1.6",
"binary_name": "libopenexr22"
},
{
"binary_version": "2.2.0-11.1ubuntu1.6",
"binary_name": "openexr"
}
],
"availability": "No subscription required"
}