vulnerability
Arch Linux: Arbitrary code execution (CVE-2021-3598)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:N/C:N/I:N/A:P) | Jul 6, 2021 | Jul 11, 2025 | Nov 27, 2025 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
Published
Jul 6, 2021
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
A heap-buffer overflow was found in the readChars function of OpenEXR before version 3.0.5. An attacker could use this flaw to execute arbitrary code with the permissions of the user running the application compiled against OpenEXR.
Solution
arch-linux-upgrade-latest
References
- CVE-2021-3598
- https://attackerkb.com/topics/CVE-2021-3598
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=1970987
- URL-https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html
- URL-https://security.archlinux.org/ASA-202107-14
- URL-https://security.gentoo.org/glsa/202210-31
- URL-https://www.debian.org/security/2022/dsa-5299
- CWE-119
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.