DEBIAN-CVE-2026-34545

Source
https://security-tracker.debian.org/tracker/CVE-2026-34545
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34545.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-34545
Upstream
  • CVE-2026-34545
Published
2026-04-01T21:17:01.640Z
Modified
2026-04-02T15:00:13.842566Z
Severity
  • 8.4 (High) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From version 3.4.0 to before version 3.4.7, an attacker providing a crafted .exr file with HTJ2K compression and a channel width of 32768 can write controlled data beyond the output heap buffer in any application that decodes EXR images. The write primitive is 2 bytes per overflow iteration or 4 bytes (by another path), repeating for each additional pixel past the overflow point. In this context, a heap write overflow can lead to remote code execution on systems. This issue has been patched in version 3.4.7.

References

Affected packages

Debian:11 / openexr

Package

Name
openexr
Purl
pkg:deb/debian/openexr?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.5.4-2
2.5.4-2+deb11u1
2.5.7-1
3.*
3.1.3-1
3.1.3-2
3.1.4-1
3.1.5-1
3.1.5-2
3.1.5-3
3.1.5-4
3.1.5-5
3.1.5-5.1
3.1.5-5.1+hurd.1
3.1.13-1
3.1.13-2
3.4.6+ds-1
3.4.6+ds-2
3.4.6+ds-3
3.4.6+ds-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34545.json"

Debian:12 / openexr

Package

Name
openexr
Purl
pkg:deb/debian/openexr?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.1.5-5
3.1.5-5.1
3.1.5-5.1+hurd.1
3.1.13-1
3.1.13-2
3.4.6+ds-1
3.4.6+ds-2
3.4.6+ds-3
3.4.6+ds-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34545.json"

Debian:13 / openexr

Package

Name
openexr
Purl
pkg:deb/debian/openexr?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.1.13-2
3.4.6+ds-1
3.4.6+ds-2
3.4.6+ds-3
3.4.6+ds-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34545.json"

Debian:14 / openexr

Package

Name
openexr
Purl
pkg:deb/debian/openexr?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.1.13-2
3.4.6+ds-1
3.4.6+ds-2
3.4.6+ds-3
3.4.6+ds-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34545.json"