<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2026-0085</id>
    <title>An update for OpenEXR is now available for HCE 2.0</title>
    <severity>Important</severity>
    <release>HCE 2.0</release>
    <issued date="2026-03-23 23:18:33"/>
    <updated date="2026-03-23 23:18:33"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-64181" id="CVE-2025-64181" title="CVE-2025-64181 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2026-27622" id="CVE-2026-27622" title="CVE-2026-27622 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.3.0 through 3.3.5 and 3.4.0 through 3.4.2, while fuzzing `openexr_exrcheck_fuzzer`, Valgrind reports a conditional branch depending on uninitialized data inside `generic_unpack`. This indicates a use of uninitialized memory. The issue can result in undefined behavior and/or a potential crash/denial of service. Versions 3.3.6 and 3.4.3 fix the issue. (CVE-2025-64181)

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In CompositeDeepScanLine::readPixels, per-pixel totals are accumulated in vector&lt;unsigned int&gt; total_sizes for attacker-controlled large counts across many parts, total_sizes[ptr] wraps modulo 2^32.  overall_sample_count is then derived from wrapped totals and used in samples[channel].resize(overall_sample_count). Decode pointer setup/consumption proceeds with true sample counts, and write operations in core unpack (generic_unpack_deep_pointers) overrun the undersized composite sample buffer. This vulnerability is fixed in v3.2.6, v3.3.8, and v3.4.6. (CVE-2026-27622)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="OpenEXR">
        <name>HCE 2.0</name>
        <package arch="x86_64" name="OpenEXR" version="3.1.5" release="4.r1.hce2">
          <filename>OpenEXR-3.1.5-4.r1.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="OpenEXR-devel" version="3.1.5" release="4.r1.hce2">
          <filename>OpenEXR-devel-3.1.5-4.r1.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="OpenEXR-libs" version="3.1.5" release="4.r1.hce2">
          <filename>OpenEXR-libs-3.1.5-4.r1.hce2.x86_64.rpm</filename>
        </package>
        <package arch="aarch64" name="OpenEXR" version="3.1.5" release="4.r1.hce2">
          <filename>OpenEXR-3.1.5-4.r1.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="OpenEXR-devel" version="3.1.5" release="4.r1.hce2">
          <filename>OpenEXR-devel-3.1.5-4.r1.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="OpenEXR-libs" version="3.1.5" release="4.r1.hce2">
          <filename>OpenEXR-libs-3.1.5-4.r1.hce2.aarch64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
