Source: openexr Version: 3.1.13-2 Severity: important Tags: security upstream X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerabilities were published for openexr. The information found so far is unfortunately very light, the ZDI advisory only add that they are fixed in the v3.4.3 release, cf. [2]. CVE-2025-12839[0]: | Academy Software Foundation OpenEXR EXR File Parsing Heap-based | Buffer Overflow Remote Code Execution Vulnerability. This | vulnerability allows remote attackers to execute arbitrary code on | affected installations of Academy Software Foundation OpenEXR. User | interaction is required to exploit this vulnerability in that the | target must visit a malicious page or open a malicious file. The | specific flaw exists within the parsing of EXR files. The issue | results from the lack of proper validation of the length of user- | supplied data prior to copying it to a heap-based buffer. An | attacker can leverage this vulnerability to execute code in the | context of the current process. Was ZDI-CAN-27947. CVE-2025-128340[1]: No description was found (try on a search engine) If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-12839 https://www.cve.org/CVERecord?id=CVE-2025-12839 [1] https://security-tracker.debian.org/tracker/CVE-2025-128340 https://www.cve.org/CVERecord?id=CVE-2025-128340 [2] https://lists.aswf.io/g/openexr-dev/topic/openexr_v3_4_3_is_staged_for/116040425 Please adjust the affected versions in the BTS as needed. Regards, Salvatore

