{"id":"CVE-2021-3476","details":"A flaw was found in OpenEXR's B44 uncompression functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to OpenEXR could trigger shift overflows, potentially affecting application availability.","modified":"2026-04-11T17:26:04.072233Z","published":"2021-03-30T18:15:18.077Z","related":["MGASA-2021-0326","SUSE-SU-2021:1097-1","SUSE-SU-2021:2793-1","SUSE-SU-2021:2913-1","openSUSE-SU-2021:0536-1","openSUSE-SU-2021:1198-1","openSUSE-SU-2021:2793-1"],"references":[{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202107-27"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html"},{"type":"REPORT","url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24787"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1939145"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openexr/openexr","events":[{"introduced":"0"},{"fixed":"7bab6d44caf65ee3cabe31553f8e2968c8747be5"},{"introduced":"ed64d5467dee9763f28baf300f7699e6288b9f5f"},{"fixed":"1899a456cbafb213c4a53c35eb3203296f92e503"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.4.3"},{"introduced":"2.5.0"},{"fixed":"2.5.4"}]}}],"versions":["OPENEXR_1_0_4","v1.7.1","v2.0.0","v2.0.0.GM","v2.0.1","v2.1.0","v2.3.0","v2.4.0","v2.4.0-beta.1","v2.4.1","v2.4.2","v2.5.0","v2.5.1","v2.5.2","v2.5.3"],"database_specific":{"vanir_signatures":[{"signature_type":"Function","deprecated":false,"digest":{"length":1690,"function_hash":"147499493693564905582259429661292444797"},"signature_version":"v1","source":"https://github.com/openexr/openexr/commit/7bab6d44caf65ee3cabe31553f8e2968c8747be5","target":{"file":"OpenEXR/IlmImf/ImfScanLineInputFile.cpp","function":"ScanLineInputFile::initialize"},"id":"CVE-2021-3476-3b14fd36"},{"signature_type":"Line","deprecated":false,"digest":{"threshold":0.9,"line_hashes":["183799983013183831380237481661086301550","111519733374137260985206676436366582935","338562742485568351177658719788975857619","84570287594119879542064273017314287589","152453817114836365619507449973532304004","152126518450649847430180110668365421093","334371091860315902789981231789629231501"]},"signature_version":"v1","source":"https://github.com/openexr/openexr/commit/7bab6d44caf65ee3cabe31553f8e2968c8747be5","target":{"file":"OpenEXR/IlmImf/ImfScanLineInputFile.cpp"},"id":"CVE-2021-3476-bea1d206"}],"vanir_signatures_modified":"2026-04-11T17:26:04Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3476.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}]}