{"schema_version":"1.7.2","id":"OESA-2026-2180","modified":"2026-05-03T09:57:38Z","published":"2026-05-03T09:57:38Z","upstream":["CVE-2026-40244","CVE-2026-40250"],"summary":"OpenEXR security update","details":"OpenEXR is a high dynamic-range (HDR) image file format originally developed by Industrial Light &amp;amp; Magic for use in computer imaging applications.\r\n\r\nSecurity Fix(es):\n\nOpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.4.0 through 3.4.9, 3.3.0 through 3.3.9, and 3.2.0 through 3.2.7, `internal_dwa_compressor.h:1722` performs `curc-&gt;width * curc-&gt;height` in `int32` arithmetic without a `(size_t)` cast. This is the same overflow pattern fixed in other locations by the recent CVE-2026-34589 batch, but this line was missed. Versions 3.4.10, 3.3.10, and 3.2.8 contain a fix that addresses `internal_dwa_compressor.h:1722`.(CVE-2026-40244)\n\nOpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.4.0 through 3.4.9, 3.3.0 through 3.3.9, and 3.2.0 through 3.2.7, `internal_dwa_compressor.h:1040` performs `chan-&gt;width * chan-&gt;bytes_per_element` in `int32` arithmetic without a `(size_t)` cast. This is the same overflow pattern fixed in other decoders by CVE-2026-34589/34588/34544, but this line was missed. Versions 3.4.10, 3.3.10, and 3.2.8 contain a fix that addresses `internal_dwa_compressor.h:1040`.(CVE-2026-40250)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP3","name":"OpenEXR","purl":"pkg:rpm/openEuler/OpenEXR&distro=openEuler-24.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.1.11-8.oe2403sp3"}]}],"ecosystem_specific":{"aarch64":["OpenEXR-3.1.11-8.oe2403sp3.aarch64.rpm","OpenEXR-debuginfo-3.1.11-8.oe2403sp3.aarch64.rpm","OpenEXR-debugsource-3.1.11-8.oe2403sp3.aarch64.rpm","OpenEXR-devel-3.1.11-8.oe2403sp3.aarch64.rpm","OpenEXR-libs-3.1.11-8.oe2403sp3.aarch64.rpm"],"src":["OpenEXR-3.1.11-8.oe2403sp3.src.rpm"],"x86_64":["OpenEXR-3.1.11-8.oe2403sp3.x86_64.rpm","OpenEXR-debuginfo-3.1.11-8.oe2403sp3.x86_64.rpm","OpenEXR-debugsource-3.1.11-8.oe2403sp3.x86_64.rpm","OpenEXR-devel-3.1.11-8.oe2403sp3.x86_64.rpm","OpenEXR-libs-3.1.11-8.oe2403sp3.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2180"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-40244"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-40250"}],"database_specific":{"severity":"High"}}
