CVE-2025-48073

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-48073
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-48073.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-48073
Aliases
Downstream
Withdrawn
2025-08-02T09:56:43.163339Z
Published
2025-07-31T21:15:28Z
Modified
2025-08-02T02:11:24.773926Z
Summary
[none]
Details

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In version 3.3.2, when reading a deep scanline image with a large sample count in reduceMemory mode, it is possible to crash a target application with a NULL pointer dereference in a write operation. This is fixed in version 3.3.3.

References

Affected packages

Debian:11 / openexr

Package

Name
openexr
Purl
pkg:deb/debian/openexr?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.5.4-2
2.5.4-2+deb11u1
2.5.7-1

3.*

3.1.3-1
3.1.3-2
3.1.4-1
3.1.5-1
3.1.5-2
3.1.5-3
3.1.5-4
3.1.5-5
3.1.5-5.1
3.1.5-5.1+hurd.1
3.1.13-1
3.1.13-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / openexr

Package

Name
openexr
Purl
pkg:deb/debian/openexr?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.1.5-5
3.1.5-5.1
3.1.5-5.1+hurd.1
3.1.13-1
3.1.13-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / openexr

Package

Name
openexr
Purl
pkg:deb/debian/openexr?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.1.13-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}