Access of Uninitialized Pointer The advisory has been revoked - it doesn't affect any version of package openexr-devel  (opens in a new tab)


Threat Intelligence

EPSS
0.06% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL10-OPENEXRDEVEL-15894841
  • published5 Apr 2026
  • disclosed1 Apr 2026

Introduced: 1 Apr 2026

CVE-2026-34543  (opens in a new tab)
CWE-824  (opens in a new tab)

Amendment

The Red Hat security team deemed this advisory irrelevant for RHEL:10.

NVD Description

Note: Versions mentioned in the description apply only to the upstream openexr-devel package and not the openexr-devel package as distributed by RHEL.

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From version 3.4.0 to before version 3.4.8, sensitive information from heap memory may be leaked through the decoded pixel data (information disclosure). This occurs under default settings; simply reading a malicious EXR file is sufficient to trigger the issue, without any user interaction. This issue has been patched in version 3.4.8.