CVE-2026-34588

Name
CVE-2026-34588
Description
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From 3.1.0 to before 3.2.7, 3.3.9, and 3.4.9, internal_exr_undo_piz() advances the working wavelet pointer with signed 32-bit arithmetic. Because nx, ny, and wcount are int, a crafted EXR file can make this product overflow and wrap. The next channel then decodes from an incorrect address. The wavelet decode path operates in place, so this yields both out-of-bounds reads and out-of-bounds writes. This vulnerability is fixed in 3.2.7, 3.3.9, and 3.4.9.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
security-advisories@github.com https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-588r-cr5c-w6hf
security-advisories@github.com https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.2.7
security-advisories@github.com https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.3.9
security-advisories@github.com https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.4.9

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* openexr >= 3.1.0 < 3.2.7
cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* openexr >= 3.3.0 < 3.3.9
cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* openexr >= 3.4.0 < 3.4.9

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
openexr edge-community 3.4.4-r0 Théo Zanchi <theo.zanchi@gmail.com> possibly vulnerable
openexr edge-community 3.4.2-r0 Théo Zanchi <theo.zanchi@gmail.com> possibly vulnerable
openexr edge-community 3.3.2-r0 Mark Riedesel <mark+alpine@klowner.com> possibly vulnerable
openexr edge-community 3.1.13-r2 Mark Riedesel <mark+alpine@klowner.com> possibly vulnerable
openexr edge-community 3.1.13-r1 Mark Riedesel <mark+alpine@klowner.com> possibly vulnerable
openexr edge-community 3.1.13-r0 Mark Riedesel <mark+alpine@klowner.com> possibly vulnerable
openexr edge-community 3.1.12-r0 Mark Riedesel <mark+alpine@klowner.com> possibly vulnerable
openexr edge-community 3.1.4-r0 Mark Riedesel <mark+alpine@klowner.com> possibly vulnerable
openexr edge-community 3.1.1-r0 Mark Riedesel <mark+alpine@klowner.com> possibly vulnerable
openexr 3.23-community 3.4.2-r0 Théo Zanchi <theo.zanchi@gmail.com> possibly vulnerable