GHSA-vc68-257w-m432

Suggest an improvement
Source
https://github.com/advisories/GHSA-vc68-257w-m432
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-vc68-257w-m432/GHSA-vc68-257w-m432.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-vc68-257w-m432
Aliases
  • CVE-2026-34543
Published
2026-04-03T21:50:14Z
Modified
2026-04-03T22:04:00.604060Z
Severity
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
OpenEXR: Heap information disclosure in PXR24 decompression via unchecked decompressed size (undo_pxr24_impl)
Details

Summary

The PXR24 decompression function undopxr24impl in OpenEXR (internalpxr24.c) ignores the actual decompressed size (outSize) returned by exruncompressbuffer() and instead reads from the scratch buffer based solely on the expected size (uncompressedsize) derived from the header metadata.

Additionally, exruncompressbuffer() (compression.c:202) treats LIBDEFLATESHORTOUTPUT (where the compressed stream decompresses to fewer bytes than expected) as a successful result rather than an error.

When these two issues are combined, an attacker can craft a PXR24 EXR file containing a valid but truncated zlib stream. As a result, the decoder reads uninitialized heap memory and incorporates it into the output pixel data.

Details

This issue occurs due to the combination of two flaws.

  1. compression.c:202–205 — LIBDEFLATESHORTOUTPUT treated as success

    else if (res == LIBDEFLATE_SHORT_OUTPUT)
    {
        /* TODO: is this an error? */
        return EXR_ERR_SUCCESS;
    }
    

    libdeflatezlibdecompressex() returns LIBDEFLATESHORTOUTPUT when the compressed stream is successfully decompressed but the resulting output size is smaller than the provided output buffer size. In this case, the actual number of decompressed bytes is written to actualout. However, the function does not treat this condition as an error and instead returns success.

  2. internal_pxr24.c:279–287 — outSize return value ignored

    rstat = exr_uncompress_buffer(
        decode->context, compressed_data, comp_buf_size,
        scratch_data, scratch_size, &outSize);   // outSize = actual bytes written
    
    if (rstat != EXR_ERR_SUCCESS) return rstat;
    
    // outSize is never referenced afterwards.
    // The loop below reads the entire scratch_data buffer based on
    // uncompressed_size (the header-derived expected size).
    for (int y = 0; y < decode->chunk.height; ++y) { ... }
    

    After exruncompressbuffer() returns success, the code does not verify whether the actual decompressed size (outSize) matches the expected size (uncompressedsize). The subsequent byte-plane reconstruction loop reads from the scratch buffer up to uncompressedsize bytes. As a result, the region between outSize and uncompressed_size consists of uninitialized heap memory, which is then read by the decoder.

Affected component - src/lib/OpenEXRCore/internalpxr24.c — undopxr24impl() (line 261–399) - src/lib/OpenEXRCore/compression.c — exruncompress_buffer() (line 202–205)

PoC

Please refer to the atta poc.zip ched archive file and proceed after extracting it.

  1. git clone https://github.com/AcademySoftwareFoundation/openexr.git
  2. mv poc openexr/
  3. cd openexr
  4. docker build -f poc/Dockerfile -t pxr24-poc .
  5. docker run --rm pxr24-poc

<img width="858" height="155" alt="스크린샷 2026-03-15 오후 4 38 18" src="https://github.com/user-attachments/assets/ded9eab6-9b92-40f7-9a0d-7b00db7e6088" />

Impact

  • Sensitive information from heap memory may be leaked through the decoded pixel data (information disclosure). Trigger Condition: Occurs under default settings; simply reading a malicious EXR file is sufficient to trigger the issue, without any user interaction.
Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2026-04-03T21:50:14Z",
    "severity": "HIGH",
    "nvd_published_at": "2026-04-01T21:17:01Z",
    "cwe_ids": [
        "CWE-908"
    ]
}
References

Affected packages

PyPI / openexr

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.4.0
Fixed
3.4.8

Affected versions

3.*
3.4.0
3.4.1
3.4.2
3.4.3
3.4.4
3.4.5
3.4.6
3.4.7

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-vc68-257w-m432/GHSA-vc68-257w-m432.json"
last_known_affected_version_range
"<= 3.4.7"

PyPI / openexr

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.3.0
Last affected
3.3.8

Affected versions

3.*
3.3.0
3.3.1
3.3.2
3.3.3
3.3.4
3.3.5
3.3.6
3.3.7
3.3.8

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-vc68-257w-m432/GHSA-vc68-257w-m432.json"

PyPI / openexr

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.2.0
Last affected
3.2.6

Affected versions

3.*
3.2.3
3.2.4
3.2.5
3.2.6

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-vc68-257w-m432/GHSA-vc68-257w-m432.json"