Home

Description

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, the bounds check in TGAInput::decode_pixel computes k + palbytespp as unsigned 32-bit arithmetic. When k = 0xFFFFFFFC and palbytespp = 4, the addition wraps to 0, which compares less than palette_alloc_size and passes the check. The subsequent palette access uses the unwrapped k (0xFFFFFFFC) as the index, reading ~4 GB past the start of the palette buffer — SEGV. This vulnerability is fixed in 3.0.18.0 and 3.1.13.0.

PUBLISHED Reserved 2026-05-04 | Published 2026-05-14 | Updated 2026-05-16 | Assigner GitHub_M




MEDIUM: 5.5CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Problem types

CWE-125: Out-of-bounds Read

Product status

< 3.0.18.0
affected

>= 3.1.4.0-beta, < 3.1.13.0
affected

References

github.com/...mageIO/security/advisories/GHSA-mq8j-73c4-cr55 exploit

github.com/...mageIO/security/advisories/GHSA-mq8j-73c4-cr55

cve.org (CVE-2026-43996)

nvd.nist.gov (CVE-2026-43996)

Download JSON