CVE-2026-34543Use of Uninitialized Resource in Openexr

Severity
8.7HIGHNVD
EPSS
0.0%
top 88.69%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 1
Latest updateApr 3

Description

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From version 3.4.0 to before version 3.4.8, sensitive information from heap memory may be leaked through the decoded pixel data (information disclosure). This occurs under default settings; simply reading a malicious EXR file is sufficient to trigger the issue, without any user interaction. This issue has been patched in version 3.4.8.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Affected Packages4 packages

NVDopenexr/openexr3.2.03.2.7+2
PyPIopenexr/openexr3.4.03.4.8+2
CVEListV5academysoftwarefoundation/openexr>= 3.4.0, < 3.4.8

Patches

🔴Vulnerability Details

3
GHSA
OpenEXR: Heap information disclosure in PXR24 decompression via unchecked decompressed size (undo_pxr24_impl)2026-04-03
OSV
OpenEXR: Heap information disclosure in PXR24 decompression via unchecked decompressed size (undo_pxr24_impl)2026-04-03
OSV
CVE-2026-34543: OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry2026-04-01

📋Vendor Advisories

2
Red Hat
OpenEXR: OpenEXR: Information disclosure via malicious EXR file2026-04-01
Debian
CVE-2026-34543: openexr - OpenEXR provides the specification and reference implementation of the EXR file ...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-34543 Impact, Exploitability, and Mitigation Steps | Wiz

💬Community

1
Bugzilla
CVE-2026-34543 usd: OpenEXR: Information disclosure via malicious EXR file [fedora-all]2026-04-02
CVE-2026-34543 — Use of Uninitialized Resource | cvebase