Bug#1130041: openexr: CVE-2026-27622
Salvatore Bonaccorso
carnil at debian.org
Sat Mar 7 20:09:28 GMT 2026
Source: openexr
Version: 3.1.13-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>
Hi,
The following vulnerability was published for openexr.
CVE-2026-27622[0]:
| OpenEXR provides the specification and reference implementation of
| the EXR file format, an image storage format for the motion picture
| industry. In CompositeDeepScanLine::readPixels, per-pixel totals are
| accumulated in vector<unsigned int> total_sizes for attacker-
| controlled large counts across many parts, total_sizes[ptr] wraps
| modulo 2^32. overall_sample_count is then derived from wrapped
| totals and used in samples[channel].resize(overall_sample_count).
| Decode pointer setup/consumption proceeds with true sample counts,
| and write operations in core unpack (generic_unpack_deep_pointers)
| overrun the undersized composite sample buffer. This vulnerability
| is fixed in v3.2.6, v3.3.8, and v3.4.6.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2026-27622
https://www.cve.org/CVERecord?id=CVE-2026-27622
[1] https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-cr4v-6jm6-4963
[2] https://github.com/AcademySoftwareFoundation/openexr/commit/e69bf4b929b9c4f17d8546e28ee4c410c3d0a088
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
More information about the Pkg-phototools-devel
mailing list