OpenUSD File Parsing Use-After-Free Remote Code Execution Vulnerability
Moderate severity
GitHub Reviewed
Published
Oct 29, 2025
in
PixarAnimationStudios/OpenUSD
•
Updated Oct 29, 2025
Description
Published to the GitHub Advisory Database
Oct 29, 2025
Reviewed
Oct 29, 2025
Last updated
Oct 29, 2025
Patch
This is fixed with commit b953092, with the fix available in OpenUSD 25.11 and onwards.
Summary
We have been advised by Zero Day Initiative that our usage of the USD framework may constitute a Use-After-Free Remote Code Execution Vulnerability. They have sent us the attached file illustrating the issue. Indeed, we see a use after free exception when running the file through our importer with an address sanitizer.
zdi-23709-poc0.zip
Thanks in advance.
References