CVE-2025-59732
Heap-buffer-overflow write in FFmpeg EXR dwa_uncompress
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
When decoding an OpenEXR file that uses DWAA or DWAB compression, there's an implicit assumption that the height and width are divisible by 8. If the height or width of the image is not divisible by 8, the copy loops at [0] and [1] will continue to write until the next multiple of 8. The buffer td->uncompressed_data is allocated in decode_block based on the precise height and width of the image, so the "rounded-up" multiple of 8 in the copy loop can exceed the buffer bounds, and the write block starting at [2] can corrupt following heap memory. We recommend upgrading to version 8.0 or beyond.
| CWE | CWE-787 |
| Vendor | ffmpeg |
| Product | ffmpeg |
| Published | Oct 6, 2025 |
| Last Updated | Feb 26, 2026 |
Stay Ahead of the Next One
Get instant alerts for ffmpeg ffmpeg
Be the first to know when new unknown vulnerabilities affecting ffmpeg ffmpeg are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
FFmpeg / FFmpeg
9a32b863074ed4140141e0d3613905c6f1fe61c5 < 8.0 7.1.1 < 8.0
References
Credits
Google Big Sleep