{"id":"USN-4900-1","summary":"openexr vulnerabilities","details":"It was discovered that OpenEXR incorrectly handled certain malformed EXR\nimage files. If a user were tricked into opening a crafted EXR image file,\na remote attacker could cause a denial of service, or possibly execute\narbitrary code.\n","modified":"2026-04-22T10:13:50.875333Z","published":"2021-04-01T17:33:50Z","related":["UBUNTU-CVE-2021-3474","UBUNTU-CVE-2021-3475","UBUNTU-CVE-2021-3476","UBUNTU-CVE-2021-3477","UBUNTU-CVE-2021-3478","UBUNTU-CVE-2021-3479"],"upstream":["CVE-2021-3474","CVE-2021-3475","CVE-2021-3476","CVE-2021-3477","CVE-2021-3478","CVE-2021-3479","UBUNTU-CVE-2021-3474","UBUNTU-CVE-2021-3475","UBUNTU-CVE-2021-3476","UBUNTU-CVE-2021-3477","UBUNTU-CVE-2021-3478","UBUNTU-CVE-2021-3479"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4900-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3474"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3475"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3476"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3477"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3478"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3479"}],"affected":[{"package":{"name":"openexr","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/openexr@2.2.0-10ubuntu2.6?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.0-10ubuntu2.6"}]}],"versions":["2.2.0-1ubuntu3","2.2.0-7ubuntu1","2.2.0-9ubuntu1","2.2.0-10ubuntu2","2.2.0-10ubuntu2.1","2.2.0-10ubuntu2.2","2.2.0-10ubuntu2.3","2.2.0-10ubuntu2.4"],"ecosystem_specific":{"binaries":[{"binary_name":"libopenexr22","binary_version":"2.2.0-10ubuntu2.6"},{"binary_name":"openexr","binary_version":"2.2.0-10ubuntu2.6"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-3474"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-3475"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-3476"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-3477"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-3478"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-3479"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4900-1.json"}},{"package":{"name":"openexr","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/openexr@2.2.0-11.1ubuntu1.6?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.0-11.1ubuntu1.6"}]}],"versions":["2.2.0-11ubuntu1","2.2.0-11.1ubuntu1","2.2.0-11.1ubuntu1.1","2.2.0-11.1ubuntu1.2","2.2.0-11.1ubuntu1.3","2.2.0-11.1ubuntu1.4"],"ecosystem_specific":{"binaries":[{"binary_name":"libopenexr22","binary_version":"2.2.0-11.1ubuntu1.6"},{"binary_name":"openexr","binary_version":"2.2.0-11.1ubuntu1.6"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-3474"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-3475"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-3476"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-3477"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-3478"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-3479"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4900-1.json"}},{"package":{"name":"openexr","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/openexr@2.3.0-6ubuntu0.5?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.3.0-6ubuntu0.5"}]}],"versions":["2.2.1-4.1ubuntu1","2.3.0-6","2.3.0-6build1","2.3.0-6ubuntu0.1","2.3.0-6ubuntu0.2","2.3.0-6ubuntu0.3"],"ecosystem_specific":{"binaries":[{"binary_name":"libopenexr24","binary_version":"2.3.0-6ubuntu0.5"},{"binary_name":"openexr","binary_version":"2.3.0-6ubuntu0.5"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-3474"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-3475"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-3476"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-3477"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-3478"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-3479"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4900-1.json"}}],"schema_version":"1.7.5"}