Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-59732

Опубликовано: 06 окт. 2025
Источник: ubuntu
Приоритет: medium

Описание

When decoding an OpenEXR file that uses DWAA or DWAB compression, there's an implicit assumption that the height and width are divisible by 8. If the height or width of the image is not divisible by 8, the copy loops at [0] and [1] will continue to write until the next multiple of 8. The buffer td->uncompressed_data is allocated in decode_block based on the precise height and width of the image, so the "rounded-up" multiple of 8 in the copy loop can exceed the buffer bounds, and the write block starting at [2] can corrupt following heap memory. We recommend upgrading to version 8.0 or beyond.

РелизСтатусПримечание
devel

not-affected

7:8.0.1-3ubuntu1
esm-apps/bionic

not-affected

code not present
esm-apps/focal

not-affected

code not present
esm-apps/jammy

released

7:4.4.2-0ubuntu0.22.04.1+esm11
esm-apps/noble

released

7:6.1.1-3ubuntu5+esm7
esm-apps/xenial

not-affected

code not present
jammy

needed

noble

needed

plucky

ignored

end of life, was needs-triage
questing

released

7:7.1.1-1ubuntu4.2

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

needs-triage

jammy

DNE

noble

DNE

plucky

DNE

questing

DNE

upstream

needs-triage

Показывать по

Связанные уязвимости

nvd
4 месяца назад

When decoding an OpenEXR file that uses DWAA or DWAB compression, there's an implicit assumption that the height and width are divisible by 8. If the height or width of the image is not divisible by 8, the copy loops at [0] and [1] will continue to write until the next multiple of 8. The buffer td->uncompressed_data is allocated in decode_block based on the precise height and width of the image, so the "rounded-up" multiple of 8 in the copy loop can exceed the buffer bounds, and the write block starting at [2] can corrupt following heap memory. We recommend upgrading to version 8.0 or beyond.

debian
4 месяца назад

When decoding an OpenEXR file that uses DWAA or DWAB compression, ther ...

github
4 месяца назад

When decoding an OpenEXR file that uses DWAA or DWAB compression, there's an implicit assumption that the height and width are divisible by 8. If the height or width of the image is not divisible by 8, the copy loops at [0] and [1] will continue to write until the next multiple of 8. The buffer td->uncompressed_data is allocated in decode_block based on the precise height and width of the image, so the "rounded-up" multiple of 8 in the copy loop can exceed the buffer bounds, and the write block starting at [2] can corrupt following heap memory. We recommend upgrading to version 8.0 or beyond.

CVSS3: 6.4
fstec
6 месяцев назад

Уязвимость функции uncompressed_data мультимедийной библиотеки FFmpeg, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.5
redos
3 месяца назад

Множественные уязвимости ffmpeg