CVE-2026-34544

Name
CVE-2026-34544
Description
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From version 3.4.0 to before version 3.4.8, a crafted B44 or B44A EXR file can cause an out-of-bounds write in any application that decodes it via exr_decoding_run(). Consequences range from immediate crash (most likely) to corruption of adjacent heap allocations (layout-dependent). This issue has been patched in version 3.4.8.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
security-advisories@github.com https://github.com/AcademySoftwareFoundation/openexr/commit/35e7aa35e22c1975606be86e859f31cc1fc598ee
security-advisories@github.com https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.4.8
security-advisories@github.com https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-h762-rhv3-h25v

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* openexr >= 3.2.0 < 3.2.7
cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* openexr >= 3.3.0 < 3.3.9
cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* openexr >= 3.4.0 < 3.4.8

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
openexr edge-community 3.4.4-r0 Théo Zanchi <theo.zanchi@gmail.com> possibly vulnerable
openexr edge-community 3.4.2-r0 Théo Zanchi <theo.zanchi@gmail.com> possibly vulnerable
openexr edge-community 3.3.2-r0 Mark Riedesel <mark+alpine@klowner.com> possibly vulnerable
openexr 3.23-community 3.4.2-r0 Théo Zanchi <theo.zanchi@gmail.com> possibly vulnerable