🔐 CVE Alert

CVE-2025-59732

UNKNOWN 0.0

Heap-buffer-overflow write in FFmpeg EXR dwa_uncompress

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

When decoding an OpenEXR file that uses DWAA or DWAB compression, there's an implicit assumption that the height and width are divisible by 8. If the height or width of the image is not divisible by 8, the copy loops at [0] and [1] will continue to write until the next multiple of 8. The buffer td->uncompressed_data is allocated in decode_block based on the precise height and width of the image, so the "rounded-up" multiple of 8 in the copy loop can exceed the buffer bounds, and the write block starting at [2] can corrupt following heap memory. We recommend upgrading to version 8.0 or beyond.

CWE CWE-787
Vendor ffmpeg
Product ffmpeg
Published Oct 6, 2025
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for ffmpeg ffmpeg

Be the first to know when new unknown vulnerabilities affecting ffmpeg ffmpeg are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

FFmpeg / FFmpeg
9a32b863074ed4140141e0d3613905c6f1fe61c5 < 8.0 7.1.1 < 8.0

References

NVD ↗ CVE.org ↗ EPSS Data ↗
issuetracker.google.com: https://issuetracker.google.com/436510316

Credits

Google Big Sleep