Miggo Logo

GHSA-58p5-r2f6-g2cj: Pixar OpenUSD Sdf_PathNode Module Use-After-Free Vulnerability Leading to Potential Remote Code Execution

9.4

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
9/4/2025
Updated
9/4/2025
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
usd-corepip< 25.825.8

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability is a use-after-free caused by a race condition when parsing a specially crafted .usdc file. The root cause lies in the pxrInternal_v0_24__pxrReserved__::Usd_CrateFile::_ReadCompressedPaths function, which fails to validate for duplicate path indexes in the compressed data. This allows a malicious file to trigger a race condition in pxrInternal_v0_24__pxrReserved__::Usd_CrateFile::_BuildDecompressedPathsImpl, where multiple threads attempt to modify the same SdfPath object simultaneously. This leads to memory corruption. The program then crashes when the destructor pxrInternal_v0_24__pxrReserved__::Sdf_PrimPathNode::~Sdf_PrimPathNode is called on a freed object, as evidenced by the provided crash logs. The fix involves adding a check for duplicate path indexes in _ReadCompressedPaths to prevent the race condition from occurring.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry * Us*-**t*r-*r** (U**) vuln*r**ility **s ***n *is*ov*r** in t** S**_P*t*No** mo*ul* o* t** Pix*r Op*nUS* li*r*ry. T*is issu* o**urs *urin* t** **l*tion o* t** S**_PrimP*t*No** o*j**t in multi-t*r***** *nvironm*nts, w**r* *r*** m*mory is *

Reasoning

T** vuln*r**ility is * us*-**t*r-*r** **us** *y * r*** *on*ition w**n p*rsin* * sp**i*lly *r**t** `.us**` *il*. T** root **us* li*s in t** `pxrInt*rn*l_v*_**__pxrR*s*rv**__::Us*_*r*t**il*::_R****ompr*ss**P*t*s` *un*tion, w*i** **ils to v*li**t* *or *