CVE-2025-64183Use After Free in Openexr

CWE-416Use After Free6 documents5 sources
Severity
5.5MEDIUMNVD
EPSS
0.1%
top 80.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 10
Latest updateApr 6

Description

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.2.0 through 3.2.4, 3.3.0 through 3.3.5, and 3.4.0 through 3.4.2, there is a use-after-free in PyObject_StealAttrString of pyOpenEXR_old.cpp. The legacy adapter defines PyObject_StealAttrString that calls PyObject_GetAttrString to obtain a new reference, immediately decrefs it, and returns the pointer. Callers then pass this dangling pointe

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Packages4 packages

NVDopenexr/openexr3.2.03.2.5+2
PyPIopenexr/openexr3.2.03.2.5+2
CVEListV5academysoftwarefoundation/openexr>= 3.2.0, < 3.2.5, >= 3.3.0, < 3.3.6, >= 3.4.0, < 3.4.3+2

🔴Vulnerability Details

3
OSV
OpenEXR has use after free in PyObject_StealAttrString2026-04-06
GHSA
OpenEXR has use after free in PyObject_StealAttrString2026-04-06
OSV
CVE-2025-64183: OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry2025-11-10

📋Vendor Advisories

2
Red Hat
openexr: use after free in PyObject_StealAttrString2025-11-10
Debian
CVE-2025-64183: openexr - OpenEXR provides the specification and reference implementation of the EXR file ...2025
CVE-2025-64183 — Use After Free in Openexr | cvebase