Bug 2454127 (CVE-2026-34544) - CVE-2026-34544 OpenEXR: OpenEXR: Memory corruption and Denial of Service via crafted EXR file processing
Summary: CVE-2026-34544 OpenEXR: OpenEXR: Memory corruption and Denial of Service via ...
Keywords:
Status: NEW
Alias: CVE-2026-34544
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2454226 2454227 2454229 2454230
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-01 22:01 UTC by OSIDB Bzimport
Modified: 2026-04-02 06:13 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-01 22:01:47 UTC
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From version 3.4.0 to before version 3.4.8, a crafted B44 or B44A EXR file can cause an out-of-bounds write in any application that decodes it via exr_decoding_run(). Consequences range from immediate crash (most likely) to corruption of adjacent heap allocations (layout-dependent). This issue has been patched in version 3.4.8.


Note You need to log in before you can comment on or make changes to this bug.