CVE-2026-34379

Name
CVE-2026-34379
Description
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From 3.2.0 to before 3.2.7, 3.3.9, and 3.4.9, a misaligned memory write vulnerability exists in LossyDctDecoder_execute() in src/lib/OpenEXRCore/internal_dwa_decoder.h:749. When decoding a DWA or DWAB-compressed EXR file containing a FLOAT-type channel, the decoder performs an in-place HALF→FLOAT conversion by casting an unaligned uint8_t * row pointer to float * and writing through it. Because the row buffer may not be 4-byte aligned, this constitutes undefined behavior under the C standard and crashes immediately on architectures that enforce alignment (ARM, RISC-V, etc.). On x86 it is silently tolerated at runtime but remains exploitable via compiler optimizations that assume aligned access. This vulnerability is fixed in 3.2.7, 3.3.9, and 3.4.9.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
security-advisories@github.com https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-w88v-vqhq-5p24
security-advisories@github.com https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.2.7
security-advisories@github.com https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.3.9
security-advisories@github.com https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.4.9

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* openexr >= 3.2.0 < 3.2.7
cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* openexr >= 3.3.0 < 3.3.9
cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* openexr >= 3.4.0 < 3.4.9

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
openexr edge-community 3.4.4-r0 Théo Zanchi <theo.zanchi@gmail.com> possibly vulnerable
openexr edge-community 3.4.2-r0 Théo Zanchi <theo.zanchi@gmail.com> possibly vulnerable
openexr edge-community 3.3.2-r0 Mark Riedesel <mark+alpine@klowner.com> possibly vulnerable
openexr 3.23-community 3.4.2-r0 Théo Zanchi <theo.zanchi@gmail.com> possibly vulnerable