Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-0510

NIXPKGS-2026-0510
published on
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored
    2 packages
    • haskellPackages.openexr-write
    • openexrid-unstable
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
OpenEXR CompositeDeepScanLine integer-overflow leads to heap OOB write

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In CompositeDeepScanLine::readPixels, per-pixel totals are accumulated in vector<unsigned int> total_sizes for attacker-controlled large counts across many parts, total_sizes[ptr] wraps modulo 2^32. overall_sample_count is then derived from wrapped totals and used in samples[channel].resize(overall_sample_count). Decode pointer setup/consumption proceeds with true sample counts, and write operations in core unpack (generic_unpack_deep_pointers) overrun the undersized composite sample buffer. This vulnerability is fixed in v3.2.6, v3.3.8, and v3.4.6.

Affected products

openexr
  • ==>= 2.3.0, < 3.2.6
  • ==>= 3.3.0, < 3.3.8
  • ==>= 3.4.0, < 3.4.6

Matching in nixpkgs

pkgs.openexr

High dynamic-range (HDR) image file format

Ignored packages (2)

Package maintainers

Upstream advisory: https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-cr4v-6jm6-4963