CVE-2026-34544Integer Overflow or Wraparound in Openexr

Severity
8.4HIGHNVD
EPSS
0.0%
top 96.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 1
Latest updateApr 3

Description

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From version 3.4.0 to before version 3.4.8, a crafted B44 or B44A EXR file can cause an out-of-bounds write in any application that decodes it via exr_decoding_run(). Consequences range from immediate crash (most likely) to corruption of adjacent heap allocations (layout-dependent). This issue has been patched in version 3.4.8.

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages4 packages

NVDopenexr/openexr3.2.03.2.7+2
PyPIopenexr/openexr3.4.03.4.8+2
CVEListV5academysoftwarefoundation/openexr>= 3.4.0, < 3.4.8

Patches

🔴Vulnerability Details

3
OSV
OpenEXR: integer overflow to OOB write in uncompress_b44_impl()2026-04-03
GHSA
OpenEXR: integer overflow to OOB write in uncompress_b44_impl()2026-04-03
OSV
CVE-2026-34544: OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry2026-04-01

📋Vendor Advisories

2
Red Hat
OpenEXR: OpenEXR: Memory corruption and Denial of Service via crafted EXR file processing2026-04-01
Debian
CVE-2026-34544: openexr - OpenEXR provides the specification and reference implementation of the EXR file ...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-34544 Impact, Exploitability, and Mitigation Steps | Wiz

💬Community

1
Bugzilla
CVE-2026-34544 usd: OpenEXR: Memory corruption and Denial of Service via crafted EXR file processing [fedora-all]2026-04-02
CVE-2026-34544 — Integer Overflow or Wraparound | cvebase