Incorrect Type Conversion or Cast Affecting openexr package, versions [3.2.3,3.2.7)[3.3.0,3.3.9)[3.4.0,3.4.9)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (14th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-OPENEXR-15993246
  • published12 Apr 2026
  • disclosed6 Apr 2026
  • creditpwn2woot

Introduced: 6 Apr 2026

NewCVE-2026-34379  (opens in a new tab)
CWE-704  (opens in a new tab)

How to fix?

Upgrade OpenEXR to version 3.2.7, 3.3.9, 3.4.9 or higher.

Overview

OpenEXR is a Python bindings for the OpenEXR image file format

Affected versions of this package are vulnerable to Incorrect Type Conversion or Cast in the LossyDctDecoder_execute process when decoding DWA or DWAB-compressed files containing FLOAT-type channels. An attacker can cause undefined behavior, potentially leading to application crashes or unintended code execution, by supplying specially crafted EXR files that trigger misaligned memory writes. This is only exploitable if the target system enforces strict memory alignment (such as ARM or RISC-V architectures), or if compiler optimizations assume aligned access.

CVSS Base Scores

version 4.0
version 3.1