CVE-2026-43996 PUBLISHED

OpenImageIO: Integer wraparound in bounds check of decode_pixel leads to out-of-bounds read in TGA paletted image decoder

Assigner: GitHub_M
Reserved: 04.05.2026 Published: 14.05.2026 Updated: 14.05.2026

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, the bounds check in TGAInput::decode_pixel computes k + palbytespp as unsigned 32-bit arithmetic. When k = 0xFFFFFFFC and palbytespp = 4, the addition wraps to 0, which compares less than palette_alloc_size and passes the check. The subsequent palette access uses the unwrapped k (0xFFFFFFFC) as the index, reading ~4 GB past the start of the palette buffer — SEGV. This vulnerability is fixed in 3.0.18.0 and 3.1.13.0.

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS Score: 5.5

Product Status

Vendor AcademySoftwareFoundation
Product OpenImageIO
Versions
  • Version < 3.0.18.0 is affected
  • Version >= 3.1.4.0-beta, < 3.1.13.0 is affected

References

Problem Types

  • CWE-125: Out-of-bounds Read CWE