Home

Description

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, jpeg2000input.cpp:395 computes buffer size as const int bufsize = w * h * ch * buffer_bpp using signed 32-bit arithmetic. When the product exceeds INT_MAX, the result wraps to 0 or a small value. m_buf.resize() allocates an undersized buffer, and subsequent pixel write loops cause heap overflow. Conditional on USE_OPENJPH build flag. This vulnerability is fixed in 3.0.18.0 and 3.1.13.0.

PUBLISHED Reserved 2026-05-04 | Published 2026-05-14 | Updated 2026-05-14 | Assigner GitHub_M




HIGH: 7.1CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-190: Integer Overflow or Wraparound

Product status

< 3.0.18.0
affected

>= 3.1.4.0-beta, < 3.1.13.0
affected

References

github.com/...mageIO/security/advisories/GHSA-pj45-cf3g-28gq exploit

github.com/...mageIO/security/advisories/GHSA-pj45-cf3g-28gq

cve.org (CVE-2026-43905)

nvd.nist.gov (CVE-2026-43905)

Download JSON