Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-59731

Опубликовано: 06 окт. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий

Описание

When decoding an OpenEXR file that uses DWAA or DWAB compression, the specified raw length of run-length-encoded data is not checked when using it to calculate the output data. We read rle_raw_size from the input file at [0], we decompress and decode into the buffer td->rle_raw_data of size rle_raw_size at [1], and then at [2] we will access entries in this buffer up to (td->xsize - 1) * (td->ysize - 1) + rle_raw_size / 2, which may exceed rle_raw_size. We recommend upgrading to version 8.0 or beyond.

РелизСтатусПримечание
devel

not-affected

7:8.0.1-3ubuntu1
esm-apps/bionic

not-affected

code not present
esm-apps/focal

not-affected

code not present
esm-apps/jammy

released

7:4.4.2-0ubuntu0.22.04.1+esm11
esm-apps/noble

released

7:6.1.1-3ubuntu5+esm7
esm-apps/xenial

not-affected

code not present
jammy

needed

noble

needed

plucky

ignored

end of life, was needs-triage
questing

released

7:7.1.1-1ubuntu4.2

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

needs-triage

jammy

DNE

noble

DNE

plucky

DNE

questing

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 9%
0.00032
Низкий

Связанные уязвимости

nvd
4 месяца назад

When decoding an OpenEXR file that uses DWAA or DWAB compression, the specified raw length of run-length-encoded data is not checked when using it to calculate the output data. We read rle_raw_size from the input file at [0], we decompress and decode into the buffer td->rle_raw_data of size rle_raw_size at [1], and then at [2] we will access entries in this buffer up to (td->xsize - 1) * (td->ysize - 1) + rle_raw_size / 2, which may exceed rle_raw_size. We recommend upgrading to version 8.0 or beyond.

debian
4 месяца назад

When decoding an OpenEXR file that uses DWAA or DWAB compression, the ...

github
4 месяца назад

When decoding an OpenEXR file that uses DWAA or DWAB compression, the specified raw length of run-length-encoded data is not checked when using it to calculate the output data. We read rle_raw_size from the input file at [0], we decompress and decode into the buffer td->rle_raw_data of size rle_raw_size at [1], and then at [2] we will access entries in this buffer up to (td->xsize - 1) * (td->ysize - 1) + rle_raw_size / 2, which may exceed rle_raw_size. We recommend upgrading to version 8.0 or beyond.

CVSS3: 6.1
fstec
6 месяцев назад

Уязвимость функции rle_raw_size мультимедийной библиотеки FFmpeg, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.5
redos
3 месяца назад

Множественные уязвимости ffmpeg

EPSS

Процентиль: 9%
0.00032
Низкий