Source: openexr Version: 3.1.13-2 Severity: important Tags: security upstream X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for openexr. CVE-2026-27622[0]: | OpenEXR provides the specification and reference implementation of | the EXR file format, an image storage format for the motion picture | industry. In CompositeDeepScanLine::readPixels, per-pixel totals are | accumulated in vector<unsigned int> total_sizes for attacker- | controlled large counts across many parts, total_sizes[ptr] wraps | modulo 2^32. overall_sample_count is then derived from wrapped | totals and used in samples[channel].resize(overall_sample_count). | Decode pointer setup/consumption proceeds with true sample counts, | and write operations in core unpack (generic_unpack_deep_pointers) | overrun the undersized composite sample buffer. This vulnerability | is fixed in v3.2.6, v3.3.8, and v3.4.6. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2026-27622 https://www.cve.org/CVERecord?id=CVE-2026-27622 [1] https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-cr4v-6jm6-4963 [2] https://github.com/AcademySoftwareFoundation/openexr/commit/e69bf4b929b9c4f17d8546e28ee4c410c3d0a088 Please adjust the affected versions in the BTS as needed. Regards, Salvatore

