{"id":"UBUNTU-CVE-2025-64182","details":"OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.2.0 through 3.2.4, 3.3.0 through 3.3.5, and 3.4.0 through 3.4.2, a memory safety bug in the legacy OpenEXR Python adapter (the deprecated OpenEXR.InputFile wrapper) allow crashes and likely code execution when opening attacker-controlled EXR files or when passing crafted Python objects. Integer overflow and unchecked allocation in InputFile.channel() and InputFile.channels() can lead to heap overflow (32 bit) or a NULL deref (64 bit). Versions 3.2.5, 3.3.6, and 3.4.3 contain a patch for the issue.","modified":"2026-01-20T18:37:58.977065Z","published":"2025-11-10T22:15:00Z","upstream":["CVE-2025-64182"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-64182"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2025-64182"},{"type":"REPORT","url":"https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-vh63-9mqx-wmjr"},{"type":"REPORT","url":"https://github.com/AcademySoftwareFoundation/openexr/blob/b3a19903db0672c63055023aa788e592b16ec3c5/src/wrappers/python/PyOpenEXR_old.cpp#L528-L536"}],"affected":[{"package":{"name":"openexr","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/openexr@2.2.0-10ubuntu2.6+esm3?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.2.0-1ubuntu3","2.2.0-7ubuntu1","2.2.0-9ubuntu1","2.2.0-10ubuntu2","2.2.0-10ubuntu2.1","2.2.0-10ubuntu2.2","2.2.0-10ubuntu2.3","2.2.0-10ubuntu2.4","2.2.0-10ubuntu2.6","2.2.0-10ubuntu2.6+esm1","2.2.0-10ubuntu2.6+esm2","2.2.0-10ubuntu2.6+esm3"],"ecosystem_specific":{"binaries":[{"binary_version":"2.2.0-10ubuntu2.6+esm3","binary_name":"libopenexr-dev"},{"binary_version":"2.2.0-10ubuntu2.6+esm3","binary_name":"libopenexr22"},{"binary_version":"2.2.0-10ubuntu2.6+esm3","binary_name":"openexr"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-64182.json"}},{"package":{"name":"openexr","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/openexr@2.2.0-11.1ubuntu1.9?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.2.0-11ubuntu1","2.2.0-11.1ubuntu1","2.2.0-11.1ubuntu1.1","2.2.0-11.1ubuntu1.2","2.2.0-11.1ubuntu1.3","2.2.0-11.1ubuntu1.4","2.2.0-11.1ubuntu1.6","2.2.0-11.1ubuntu1.7","2.2.0-11.1ubuntu1.8","2.2.0-11.1ubuntu1.9"],"ecosystem_specific":{"binaries":[{"binary_version":"2.2.0-11.1ubuntu1.9","binary_name":"libopenexr-dev"},{"binary_version":"2.2.0-11.1ubuntu1.9","binary_name":"libopenexr22"},{"binary_version":"2.2.0-11.1ubuntu1.9","binary_name":"openexr"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-64182.json"}},{"package":{"name":"openexr","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/openexr@2.3.0-6ubuntu0.5+esm1?arch=source&distro=esm-apps/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.2.1-4.1ubuntu1","2.3.0-6","2.3.0-6build1","2.3.0-6ubuntu0.1","2.3.0-6ubuntu0.2","2.3.0-6ubuntu0.3","2.3.0-6ubuntu0.5","2.3.0-6ubuntu0.5+esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.3.0-6ubuntu0.5+esm1","binary_name":"libopenexr-dev"},{"binary_version":"2.3.0-6ubuntu0.5+esm1","binary_name":"libopenexr24"},{"binary_version":"2.3.0-6ubuntu0.5+esm1","binary_name":"openexr"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-64182.json"}},{"package":{"name":"openexr","ecosystem":"Ubuntu:Pro:22.04:LTS","purl":"pkg:deb/ubuntu/openexr@2.5.7-1ubuntu0.1~esm1?arch=source&distro=esm-apps/jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.5.4-2","2.5.7-1","2.5.7-1ubuntu0.1~esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.5.7-1ubuntu0.1~esm1","binary_name":"libopenexr-dev"},{"binary_version":"2.5.7-1ubuntu0.1~esm1","binary_name":"libopenexr25"},{"binary_version":"2.5.7-1ubuntu0.1~esm1","binary_name":"openexr"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-64182.json"}},{"package":{"name":"openexr","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/openexr@3.1.5-5.1build3?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.1.5-5.1","3.1.5-5.1build1","3.1.5-5.1build2","3.1.5-5.1build3"],"ecosystem_specific":{"binaries":[{"binary_version":"3.1.5-5.1build3","binary_name":"libopenexr-3-1-30"},{"binary_version":"3.1.5-5.1build3","binary_name":"libopenexr-dev"},{"binary_version":"3.1.5-5.1build3","binary_name":"openexr"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-64182.json"}},{"package":{"name":"openexr","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/openexr@3.1.13-2?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.1.13-2"],"ecosystem_specific":{"binaries":[{"binary_version":"3.1.13-2","binary_name":"libopenexr-3-1-30"},{"binary_version":"3.1.13-2","binary_name":"libopenexr-dev"},{"binary_version":"3.1.13-2","binary_name":"openexr"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-64182.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:P"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}