Bug#1123963: openexr: CVE-2025-12839 CVE-2025-128340

Salvatore Bonaccorso carnil at debian.org
Thu Dec 25 07:44:46 GMT 2025


Source: openexr
Version: 3.1.13-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>

Hi,

The following vulnerabilities were published for openexr.

The information found so far is unfortunately very light, the ZDI
advisory only add that they are fixed in the v3.4.3 release, cf. [2].

CVE-2025-12839[0]:
| Academy Software Foundation OpenEXR EXR File Parsing Heap-based
| Buffer Overflow Remote Code Execution Vulnerability. This
| vulnerability allows remote attackers to execute arbitrary code on
| affected installations of Academy Software Foundation OpenEXR. User
| interaction is required to exploit this vulnerability in that the
| target must visit a malicious page or open a malicious file.  The
| specific flaw exists within the parsing of EXR files. The issue
| results from the lack of proper validation of the length of user-
| supplied data prior to copying it to a heap-based buffer. An
| attacker can leverage this vulnerability to execute code in the
| context of the current process. Was ZDI-CAN-27947.


CVE-2025-128340[1]:
No description was found (try on a search engine)


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-12839
    https://www.cve.org/CVERecord?id=CVE-2025-12839
[1] https://security-tracker.debian.org/tracker/CVE-2025-128340
    https://www.cve.org/CVERecord?id=CVE-2025-128340
[2] https://lists.aswf.io/g/openexr-dev/topic/openexr_v3_4_3_is_staged_for/116040425

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



More information about the Pkg-phototools-devel mailing list