CVE-2026-27622 — Out-of-bounds Write in Openexr
Severity
8.4HIGHNVD
EPSS
0.0%
top 94.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 3
Latest updateApr 13
Description
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In CompositeDeepScanLine::readPixels, per-pixel totals are accumulated in vector total_sizes for attacker-controlled large counts across many parts, total_sizes[ptr] wraps modulo 2^32. overall_sample_count is then derived from wrapped totals and used in samples[channel].resize(overall_sample_count). Decode pointer setup/consumption proceeds with true sa…
CVSS vector
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Packages5 packages
▶CVEListV5academysoftwarefoundation/openexr>= 2.3.0, < 3.2.6, >= 3.3.0, < 3.3.8, >= 3.4.0, < 3.4.6+2
🔴Vulnerability Details
4VulDB▶
AcademySoftwareFoundation OpenEXR up to 3.2.5/3.3.7/3.4.5 EXR File Parser readPixels out-of-bounds write (GHSA-cr4v-6jm6-4963 / Nessus ID 301138)↗2026-04-13
OSV▶
CVE-2026-27622: OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry↗2026-03-03
📋Vendor Advisories
2🕵️Threat Intelligence
1💬Community
1Bugzilla▶
CVE-2026-27622 openexr: OpenEXR: Arbitrary code execution via integer overflow in EXR file processing↗2026-03-03