Bug 2477571 (CVE-2026-43996) - CVE-2026-43996 OpenImageIO: OpenImageIO: Denial of Service via integer overflow in image processing
Summary: CVE-2026-43996 OpenImageIO: OpenImageIO: Denial of Service via integer overfl...
Keywords:
Status: NEW
Alias: CVE-2026-43996
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2477877 2477878 2477879
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-05-14 20:01 UTC by OSIDB Bzimport
Modified: 2026-05-15 13:28 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-05-14 20:01:34 UTC
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, the bounds check in TGAInput::decode_pixel computes k + palbytespp as unsigned 32-bit arithmetic. When k = 0xFFFFFFFC and palbytespp = 4, the addition wraps to 0, which compares less than palette_alloc_size and passes the check. The subsequent palette access uses the unwrapped k (0xFFFFFFFC) as the index, reading ~4 GB past the start of the palette buffer — SEGV. This vulnerability is fixed in 3.0.18.0 and 3.1.13.0.


Note You need to log in before you can comment on or make changes to this bug.