JLSEC-2026-139

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2026/JLSEC-2026-139.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-139.json
JSON Data
https://api.osv.dev/v1/vulns/JLSEC-2026-139
Upstream
Published
2026-04-17T15:19:54.657Z
Modified
2026-04-17T15:30:58.553258Z
Summary
[none]
Details

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.2.0 through 3.2.4, 3.3.0 through 3.3.5, and 3.4.0 through 3.4.2, there is a use-after-free in PyObjectStealAttrString of pyOpenEXRold.cpp. The legacy adapter defines PyObjectStealAttrString that calls PyObjectGetAttrString to obtain a new reference, immediately decrefs it, and returns the pointer. Callers then pass this dangling pointer to APIs like PyLongAsLong/PyFloatAsDouble, resulting in a use-after-free. This is invoked in multiple places (e.g., reading PixelType.v, Box2i, V2f, etc.) Versions 3.2.5, 3.3.6, and 3.4.3 fix the issue.

Database specific
{
    "license": "CC-BY-4.0",
    "sources": [
        {
            "modified": "2025-12-08T16:00:58.283Z",
            "published": "2025-11-10T22:15:37.323Z",
            "imported": "2026-04-17T13:59:24.403Z",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64183",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-64183",
            "database_specific": {
                "status": "Analyzed"
            },
            "id": "CVE-2025-64183"
        }
    ]
}
References

Affected packages

Julia / OpenEXR_jll

Package

Name
OpenEXR_jll
Purl
pkg:julia/OpenEXR_jll?uuid=18a262bb-aa17-5467-a713-aee519bc75cb

Affected ranges

Type
SEMVER
Events
Introduced
3.1.4+0
Fixed
3.4.4+0

Database specific

source
"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-139.json"