CVE-2026-34380 — Integer Overflow or Wraparound in Openexr
Severity
5.9MEDIUMNVD
EPSS
0.0%
top 85.26%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 6
Description
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From 3.2.0 to before 3.2.7, 3.3.9, and 3.4.9, a signed integer overflow exists in undo_pxr24_impl() in src/lib/OpenEXRCore/internal_pxr24.c at line 377. The expression (uint64_t)(w * 3) computes w * 3 as a signed 32-bit integer before casting to uint64_t. When w is large, this multiplication constitutes undefined behavior under the C standard. On tested…
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:HExploitability: 1.6 | Impact: 4.2
Affected Packages3 packages
▶CVEListV5academysoftwarefoundation/openexr>= 3.2.0, < 3.2.7, >= 3.3.0, < 3.3.9, >= 3.4.0, < 3.4.9+2
🔴Vulnerability Details
1OSV▶
CVE-2026-34380: OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry↗2026-04-06
📋Vendor Advisories
2🕵️Threat Intelligence
1💬Community
5Bugzilla▶
CVE-2026-34380 mingw-openexr: OpenEXR: Denial of Service due to signed integer overflow in image decoding [fedora-all]↗2026-04-06
Bugzilla▶
CVE-2026-34380 OpenEXR: OpenEXR: Denial of Service due to signed integer overflow in image decoding↗2026-04-06
Bugzilla▶
CVE-2026-34380 openexr2: OpenEXR: Denial of Service due to signed integer overflow in image decoding [fedora-all]↗2026-04-06
Bugzilla▶
CVE-2026-34380 openexr: OpenEXR: Denial of Service due to signed integer overflow in image decoding [fedora-all]↗2026-04-06
Bugzilla▶
CVE-2026-34380 usd: OpenEXR: Denial of Service due to signed integer overflow in image decoding [fedora-all]↗2026-04-06