Home

Description

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed 32-bit integer overflow in the loop index expression i * 4 inside SwapRGBABytes() causes the function to compute a large negative pointer offset when processing kABGR DPX images with large dimensions. The immediate crash is an out-of-bounds read (the memcpy at line 45 reads from &input[i * 4] first), but the subsequent write operations at lines 46–49 target the same wrapped offset — making this a combined OOB read+write primitive. This vulnerability is fixed in 3.0.18.0 and 3.1.13.0.

PUBLISHED Reserved 2026-05-04 | Published 2026-05-14 | Updated 2026-05-14 | Assigner GitHub_M




HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-125: Out-of-bounds Read

CWE-190: Integer Overflow or Wraparound

CWE-787: Out-of-bounds Write

Product status

< 3.0.18.0
affected

>= 3.1.4.0-beta, < 3.1.13.0
affected

References

github.com/...mageIO/security/advisories/GHSA-g267-j53j-5258 exploit

github.com/...mageIO/security/advisories/GHSA-g267-j53j-5258

cve.org (CVE-2026-43909)

nvd.nist.gov (CVE-2026-43909)

Download JSON