CVE-2026-34378 — Integer Overflow or Wraparound in Openexr
Severity
6.5MEDIUMNVD
EPSS
0.0%
top 89.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 6
Description
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From 3.4.0 to before 3.4.9, a missing bounds check on the dataWindow attribute in EXR file headers allows an attacker to trigger a signed integer overflow in generic_unpack(). By setting dataWindow.min.x to a large negative value, OpenEXRCore computes an enormous image width, which is later used in a signed integer multiplication that overflows, causing…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6
Affected Packages3 packages
🔴Vulnerability Details
1OSV▶
CVE-2026-34378: OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry↗2026-04-06
📋Vendor Advisories
2🕵️Threat Intelligence
1💬Community
5Bugzilla▶
CVE-2026-34378 usd: OpenEXR: Denial of Service via crafted EXR file integer overflow [fedora-all]↗2026-04-06
Bugzilla
▶
Bugzilla▶
CVE-2026-34378 mingw-openexr: OpenEXR: Denial of Service via crafted EXR file integer overflow [fedora-all]↗2026-04-06
Bugzilla▶
CVE-2026-34378 openexr2: OpenEXR: Denial of Service via crafted EXR file integer overflow [fedora-all]↗2026-04-06
Bugzilla▶
CVE-2026-34378 openexr: OpenEXR: Denial of Service via crafted EXR file integer overflow [fedora-all]↗2026-04-06