Vulnerability Description
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.3.0 through 3.3.6 and 3.4.0 through 3.4.4, a heap-buffer-overflow (OOB read) occurs in the `istream_nonparallel_read` function in `ImfContextInit.cpp` when parsing a malformed EXR file through a memory-mapped `IStream`. A signed integer subtraction produces a negative value that is implicitly converted to `size_t`, resulting in a massive length being passed to `memcpy`. Versions 3.3.7 and 3.4.5 contain a patch.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openexr | Openexr | >= 3.3.0, < 3.3.7 |
Related Weaknesses (CWE)
References
- https://github.com/AcademySoftwareFoundation/openexr/commit/6bb2ddf1068573d073edPatch
- https://github.com/AcademySoftwareFoundation/openexr/commit/d2be382758adc3e9ab83Patch
- https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-q6ExploitVendor Advisory
FAQ
What is CVE-2026-26981?
CVE-2026-26981 is a vulnerability with a CVSS score of 6.5 (MEDIUM). OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.3.0 through 3.3.6 and 3.4.0 through 3.4.4...
How severe is CVE-2026-26981?
CVE-2026-26981 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-26981?
Check the references section above for vendor advisories and patch information. Affected products include: Openexr Openexr.