CVE-2025-48072

Name
CVE-2025-48072
Description
OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. Version 3.3.2 is vulnerable to a heap-based buffer overflow during a read operation due to bad pointer math when decompressing DWAA-packed scan-line EXR files with a maliciously forged chunk. This is fixed in version 3.3.3.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/AcademySoftwareFoundation/openexr/commit/2d09449427b13a05f7c31a98ab2c4347c23db361
MISC https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.3.3
CONFIRM https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-4r7w-q3jg-ff43

Match rules

CPE URI Source package Min version Max version
openexr >= 3.3.2 < 3.3.3
cpe:2.3:a:openexr:openexr:3.3.2:*:*:*:*:*:*:* openexr == None == 3.3.2

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
openexr edge-community 3.4.2-r0 Théo Zanchi <theo.zanchi@gmail.com> fixed
openexr edge-community 3.3.2-r0 Mark Riedesel <mark+alpine@klowner.com> possibly vulnerable
openexr 3.22-community 3.3.2-r0 Mark Riedesel <mark+alpine@klowner.com> possibly vulnerable