CVE-2026-34378 PUBLISHED

OpenEXR has a signed integer overflow in generic_unpack() when parsing EXR files with crafted negative dataWindow.min.x

Assigner: GitHub_M
Reserved: 27.03.2026 Published: 06.04.2026 Updated: 06.04.2026

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From 3.4.0 to before 3.4.9, a missing bounds check on the dataWindow attribute in EXR file headers allows an attacker to trigger a signed integer overflow in generic_unpack(). By setting dataWindow.min.x to a large negative value, OpenEXRCore computes an enormous image width, which is later used in a signed integer multiplication that overflows, causing the process to terminate with SIGILL via UBSan. This vulnerability is fixed in 3.4.9.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS Score: 6.5

Product Status

Vendor AcademySoftwareFoundation
Product openexr
Versions
  • Version >= 3.4.0, < 3.4.9 is affected

References

Problem Types

  • CWE-190: Integer Overflow or Wraparound CWE