{"id":"UBUNTU-CVE-2025-64183","details":"OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.2.0 through 3.2.4, 3.3.0 through 3.3.5, and 3.4.0 through 3.4.2, there is a use-after-free in PyObject_StealAttrString of pyOpenEXR_old.cpp. The legacy adapter defines PyObject_StealAttrString that calls PyObject_GetAttrString to obtain a new reference, immediately decrefs it, and returns the pointer. Callers then pass this dangling pointer to APIs like PyLong_AsLong/PyFloat_AsDouble, resulting in a use-after-free. This is invoked in multiple places (e.g., reading PixelType.v, Box2i, V2f, etc.) Versions 3.2.5, 3.3.6, and 3.4.3 fix the issue.","modified":"2026-04-17T10:11:30.294439Z","published":"2025-11-10T22:15:00Z","withdrawn":"2026-04-17T09:10:44Z","upstream":["CVE-2025-64183"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-64183"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2025-64183"},{"type":"REPORT","url":"https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-57cw-j6vp-2p9m"},{"type":"REPORT","url":"https://github.com/AcademySoftwareFoundation/openexr/blob/b3a19903db0672c63055023aa788e592b16ec3c5/src/wrappers/python/PyOpenEXR_old.cpp#L109-L115"}],"affected":[{"package":{"name":"openexr","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/openexr@2.2.0-10ubuntu2.6+esm3?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.2.0-1ubuntu3","2.2.0-7ubuntu1","2.2.0-9ubuntu1","2.2.0-10ubuntu2","2.2.0-10ubuntu2.1","2.2.0-10ubuntu2.2","2.2.0-10ubuntu2.3","2.2.0-10ubuntu2.4","2.2.0-10ubuntu2.6","2.2.0-10ubuntu2.6+esm1","2.2.0-10ubuntu2.6+esm2","2.2.0-10ubuntu2.6+esm3"],"ecosystem_specific":{"binaries":[{"binary_version":"2.2.0-10ubuntu2.6+esm3","binary_name":"libopenexr-dev"},{"binary_version":"2.2.0-10ubuntu2.6+esm3","binary_name":"libopenexr22"},{"binary_version":"2.2.0-10ubuntu2.6+esm3","binary_name":"openexr"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-64183.json"}},{"package":{"name":"openexr","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/openexr@2.2.0-11.1ubuntu1.9?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.2.0-11ubuntu1","2.2.0-11.1ubuntu1","2.2.0-11.1ubuntu1.1","2.2.0-11.1ubuntu1.2","2.2.0-11.1ubuntu1.3","2.2.0-11.1ubuntu1.4","2.2.0-11.1ubuntu1.6","2.2.0-11.1ubuntu1.7","2.2.0-11.1ubuntu1.8","2.2.0-11.1ubuntu1.9"],"ecosystem_specific":{"binaries":[{"binary_version":"2.2.0-11.1ubuntu1.9","binary_name":"libopenexr-dev"},{"binary_version":"2.2.0-11.1ubuntu1.9","binary_name":"libopenexr22"},{"binary_version":"2.2.0-11.1ubuntu1.9","binary_name":"openexr"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-64183.json"}},{"package":{"name":"openexr","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/openexr@2.3.0-6ubuntu0.5+esm1?arch=source&distro=esm-apps/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.2.1-4.1ubuntu1","2.3.0-6","2.3.0-6build1","2.3.0-6ubuntu0.1","2.3.0-6ubuntu0.2","2.3.0-6ubuntu0.3","2.3.0-6ubuntu0.5","2.3.0-6ubuntu0.5+esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.3.0-6ubuntu0.5+esm1","binary_name":"libopenexr-dev"},{"binary_version":"2.3.0-6ubuntu0.5+esm1","binary_name":"libopenexr24"},{"binary_version":"2.3.0-6ubuntu0.5+esm1","binary_name":"openexr"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-64183.json"}},{"package":{"name":"openexr","ecosystem":"Ubuntu:Pro:22.04:LTS","purl":"pkg:deb/ubuntu/openexr@2.5.7-1ubuntu0.1~esm1?arch=source&distro=esm-apps/jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.5.4-2","2.5.7-1","2.5.7-1ubuntu0.1~esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.5.7-1ubuntu0.1~esm1","binary_name":"libopenexr-dev"},{"binary_version":"2.5.7-1ubuntu0.1~esm1","binary_name":"libopenexr25"},{"binary_version":"2.5.7-1ubuntu0.1~esm1","binary_name":"openexr"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-64183.json"}},{"package":{"name":"openexr","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/openexr@3.1.5-5.1build3?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.1.5-5.1","3.1.5-5.1build1","3.1.5-5.1build2","3.1.5-5.1build3"],"ecosystem_specific":{"binaries":[{"binary_version":"3.1.5-5.1build3","binary_name":"libopenexr-3-1-30"},{"binary_version":"3.1.5-5.1build3","binary_name":"libopenexr-dev"},{"binary_version":"3.1.5-5.1build3","binary_name":"openexr"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-64183.json"}},{"package":{"name":"openexr","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/openexr@3.1.13-2?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.1.13-2"],"ecosystem_specific":{"binaries":[{"binary_version":"3.1.13-2","binary_name":"libopenexr-3-1-30"},{"binary_version":"3.1.13-2","binary_name":"libopenexr-dev"},{"binary_version":"3.1.13-2","binary_name":"openexr"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-64183.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}