Vulnerability Description
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.4.0 through 3.4.9, 3.3.0 through 3.3.9, and 3.2.0 through 3.2.7, `internal_dwa_compressor.h:1040` performs `chan->width * chan->bytes_per_element` in `int32` arithmetic without a `(size_t)` cast. This is the same overflow pattern fixed in other decoders by CVE-2026-34589/34588/34544, but this line was missed. Versions 3.4.10, 3.3.10, and 3.2.8 contain a fix that addresses `internal_dwa_compressor.h:1040`.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openexr | Openexr | >= 3.2.0, < 3.2.8 |
Related Weaknesses (CWE)
References
- https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.2.8ProductRelease Notes
- https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.3.10ProductRelease Notes
- https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.4.10ProductRelease Notes
- https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-m5MitigationVendor Advisory
FAQ
What is CVE-2026-40250?
CVE-2026-40250 is a vulnerability with a CVSS score of 7.1 (HIGH). OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.4.0 through 3.4.9, 3.3.0 through 3.3.9, a...
How severe is CVE-2026-40250?
CVE-2026-40250 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-40250?
Check the references section above for vendor advisories and patch information. Affected products include: Openexr Openexr.