Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-1445

NIXPKGS-2026-1445
published on
updated 8 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    3 packages
    • openexr_2
    • openexrid-unstable
    • haskellPackages.openexr-write
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
OpenEXR: Shift exponent overflow in `readVariableLengthInteger()` (`ImfIDManifest.cpp`)

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From versions 3.0.0 to before 3.2.9, 3.3.0 to before 3.3.11, and 3.4.0 to before 3.4.11, readVariableLengthInteger() decodes a variable-length integer from untrusted EXR input without bounding the shift count. After enough continuation bytes, the code executes a left shift by 70 on a 64-bit value, which is undefined behavior. This issue has been patched in versions 3.2.9, 3.3.11, and 3.4.11.

Affected products

openexr
  • ==>= 3.0.0, < 3.2.9
  • ==>= 3.4.0, < 3.4.11
  • ==>= 3.3.0, < 3.3.11

Matching in nixpkgs

pkgs.openexr

High dynamic-range (HDR) image file format

Ignored packages (3)

Package maintainers