{"schema_version":"1.7.2","id":"OESA-2026-1689","modified":"2026-03-20T14:25:31Z","published":"2026-03-20T14:25:31Z","upstream":["CVE-2026-27622"],"summary":"OpenEXR security update","details":"OpenEXR is a high dynamic-range (HDR) image file format originally developed by Industrial Light &amp;amp; Magic for use in computer imaging applications.\r\n\r\nSecurity Fix(es):\n\nOpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In CompositeDeepScanLine::readPixels, per-pixel totals are accumulated in vector&lt;unsigned int&gt; total_sizes for attacker-controlled large counts across many parts, total_sizes[ptr] wraps modulo 2^32.  overall_sample_count is then derived from wrapped totals and used in samples[channel].resize(overall_sample_count). Decode pointer setup/consumption proceeds with true sample counts, and write operations in core unpack (generic_unpack_deep_pointers) overrun the undersized composite sample buffer. This vulnerability is fixed in v3.2.6, v3.3.8, and v3.4.6.(CVE-2026-27622)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP3","name":"OpenEXR","purl":"pkg:rpm/openEuler/OpenEXR&distro=openEuler-24.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.1.11-5.oe2403sp3"}]}],"ecosystem_specific":{"aarch64":["OpenEXR-3.1.11-5.oe2403sp3.aarch64.rpm","OpenEXR-debuginfo-3.1.11-5.oe2403sp3.aarch64.rpm","OpenEXR-debugsource-3.1.11-5.oe2403sp3.aarch64.rpm","OpenEXR-devel-3.1.11-5.oe2403sp3.aarch64.rpm","OpenEXR-libs-3.1.11-5.oe2403sp3.aarch64.rpm"],"src":["OpenEXR-3.1.11-5.oe2403sp3.src.rpm"],"x86_64":["OpenEXR-3.1.11-5.oe2403sp3.x86_64.rpm","OpenEXR-debuginfo-3.1.11-5.oe2403sp3.x86_64.rpm","OpenEXR-debugsource-3.1.11-5.oe2403sp3.x86_64.rpm","OpenEXR-devel-3.1.11-5.oe2403sp3.x86_64.rpm","OpenEXR-libs-3.1.11-5.oe2403sp3.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1689"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-27622"}],"database_specific":{"severity":"High"}}
