Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 26 Feb 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Feb 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openexr
Openexr openexr |
|
| CPEs | cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openexr
Openexr openexr |
Wed, 25 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-191 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 24 Feb 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Academysoftwarefoundation
Academysoftwarefoundation openexr |
|
| Vendors & Products |
Academysoftwarefoundation
Academysoftwarefoundation openexr |
Tue, 24 Feb 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.3.0 through 3.3.6 and 3.4.0 through 3.4.4, a heap-buffer-overflow (OOB read) occurs in the `istream_nonparallel_read` function in `ImfContextInit.cpp` when parsing a malformed EXR file through a memory-mapped `IStream`. A signed integer subtraction produces a negative value that is implicitly converted to `size_t`, resulting in a massive length being passed to `memcpy`. Versions 3.3.7 and 3.4.5 contain a patch. | |
| Title | OpenEXR has heap-buffer-overflow via signed integer underflow in ImfContextInit.cpp | |
| Weaknesses | CWE-195 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-24T20:03:54.667Z
Reserved: 2026-02-17T01:41:24.605Z
Link: CVE-2026-26981
Updated: 2026-02-24T20:03:49.168Z
Status : Analyzed
Published: 2026-02-24T03:16:01.890
Modified: 2026-02-25T17:30:34.797
Link: CVE-2026-26981
OpenCVE Enrichment
Updated: 2026-02-24T09:53:22Z