CVE-2026-34378

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From 3.4.0 to before 3.4.9, a missing bounds check on the dataWindow attribute in EXR file headers allows an attacker to trigger a signed integer overflow in generic_unpack(). By setting dataWindow.min.x to a large negative value, OpenEXRCore computes an enormous image width, which is later used in a signed integer multiplication that overflows, causing the process to terminate with SIGILL via UBSan. This vulnerability is fixed in 3.4.9.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:*

History

07 Apr 2026, 19:05

Type Values Removed Values Added
CPE cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:*
First Time Openexr
Openexr openexr
References () https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.4.9 - () https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.4.9 - Product, Release Notes
References () https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-v76p-4qvv-vh4g - () https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-v76p-4qvv-vh4g - Exploit, Vendor Advisory

07 Apr 2026, 04:17

Type Values Removed Values Added
References
  • () https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.4.9 -

06 Apr 2026, 17:17

Type Values Removed Values Added
References () https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-v76p-4qvv-vh4g - () https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-v76p-4qvv-vh4g -

06 Apr 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-06 16:16

Updated : 2026-04-07 19:05


NVD link : CVE-2026-34378

Mitre link : CVE-2026-34378

CVE.ORG link : CVE-2026-34378


JSON object : View

Products Affected

openexr

  • openexr
CWE
CWE-190

Integer Overflow or Wraparound