TopVuln

High-risk vulnerability digests

CVE-2026-27622

  • HIGH

RHSA-2026:12341 Red Hat Security Advisory: OpenEXR security update

Details

CVSS v3
7.8
CVSS v4
8.4
NVD published
2026-03-03 23:15:55
EPSS
<0.1% probability · 5.5th percentile — 2026-05-01
Affected versions
cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:*
Summary
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In CompositeDeepScanLine::readPixels, per-pixel totals are accumulated in vector<unsigned int> total_sizes for attacker-controlled large counts across many parts, total_sizes[ptr] wraps modulo 2^32. overall_sample_count is then derived from wrapped totals and used in samples[channel].resize(overall_sample_count). Decode pointer setup/consumption proceeds with true sample counts, and write operations in core unpack (generic_unpack_deep_pointers) overrun the undersized composite sample buffer. This vulnerability is fixed in v3.2.6, v3.3.8, and v3.4.6.
Remediation
Not available in our cache.
Exploit info
https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-cr4v-6jm6-4963

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.