CVE-2026-27622
HIGHOpenEXR - Memory Corruption
Title source: llmDescription
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In CompositeDeepScanLine::readPixels, per-pixel totals are accumulated in vector<unsigned int> total_sizes for attacker-controlled large counts across many parts, total_sizes[ptr] wraps modulo 2^32. overall_sample_count is then derived from wrapped totals and used in samples[channel].resize(overall_sample_count). Decode pointer setup/consumption proceeds with true sample counts, and write operations in core unpack (generic_unpack_deep_pointers) overrun the undersized composite sample buffer. This vulnerability is fixed in v3.2.6, v3.3.8, and v3.4.6.
Scores
CVSS v3
7.8
EPSS
0.0001
EPSS Percentile
2.2%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Classification
CWE
CWE-787
Status
published
Affected Products (2)
pypi/OpenEXR
< 3.2.6PyPI
openexr/openexr
< 3.2.6
Timeline
Published
Mar 03, 2026
Tracked Since
Mar 04, 2026