SB2026050552 - Multiple vulnerabilities in Openimageio
Published: May 5, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 8 secuirty vulnerabilities.
1) Integer overflow (CVE-ID: CVE-2026-43909)
The vulnerability allows a remote attacker to execute arbitrary code or cause a denial of service.
The vulnerability exists due to integer overflow in SwapRGBABytes() in the DPX ABGR decoder when parsing a crafted kABGR DPX image with large dimensions. A remote attacker can supply a specially crafted DPX file to execute arbitrary code or cause a denial of service.
User interaction is required to open or process the crafted DPX file.
2) Integer overflow (CVE-ID: CVE-2026-43908)
The vulnerability allows a remote attacker to cause a denial of service and potentially execute arbitrary code.
The vulnerability exists due to integer overflow leading to an out-of-bounds write in the ConvertCbYCrYToRGB function in the DPX 4:2:2 decoder when parsing a crafted DPX file. A remote attacker can supply a specially crafted DPX file to cause a denial of service and potentially execute arbitrary code.
User interaction is required to open or process a crafted DPX file.
3) Integer overflow (CVE-ID: CVE-2026-43907)
The vulnerability allows a remote attacker to cause a denial of service and overwrite heap memory.
The vulnerability exists due to integer overflow in QueryRGBBufferSizeInternal in the DPX decoder when parsing a crafted DPX file with kCbYCr or kABGR descriptors. A remote attacker can supply a specially crafted DPX file to cause a denial of service and overwrite heap memory.
User interaction is required to open or process the crafted DPX file through a code path that reads pixel data.
4) Out-of-bounds read (CVE-ID: N/A)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to out-of-bounds read in TGAInput::decode_pixel in the TGA paletted image decoder when parsing a crafted TYPE_PALETTED TGA file with 32-bit palette entries. A remote attacker can trick the victim into opening a crafted file to cause a denial of service.
User interaction is required to open a crafted file.
5) Heap-based buffer overflow (CVE-ID: CVE-2026-43906)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to a heap-based buffer overflow in the HEIF decoder when processing crafted HEIF images with mismatched subimage metadata. A remote attacker can supply a specially crafted image to execute arbitrary code.
The issue occurs when a larger scanline from one subimage is copied into a buffer allocated for a smaller subimage after subimage switching.
6) Integer overflow (CVE-ID: N/A)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to integer overflow or wraparound in the JPEG2000 reader buffer allocation in jpeg2000input.cpp when parsing a crafted JPEG2000 file with large dimensions. A remote attacker can supply a specially crafted JPEG2000 file to execute arbitrary code.
Only builds compiled with the USE_OPENJPH flag are vulnerable. User interaction is required to open the crafted file.
7) Out-of-bounds write (CVE-ID: CVE-2026-43904)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to out-of-bounds write in the Softimage PIC RLE decoder when parsing a crafted .pic file. A remote attacker can trick the victim into opening a crafted file to execute arbitrary code.
User interaction is required to open a crafted file.
8) Out-of-bounds write (CVE-ID: CVE-2026-43903)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to out-of-bounds write in the SGI RLE decoder when parsing a crafted .sgi file. A remote attacker can supply a crafted .sgi file with an RLE count exceeding the scanline width to cause a denial of service.
User interaction is required to open the crafted file, and the issue affects release builds where the bounds checks compile to no-ops.
Remediation
Install update from vendor's website.
References
- https://github.com/AcademySoftwareFoundation/OpenImageIO/security/advisories/GHSA-g267-j53j-5258
- https://github.com/AcademySoftwareFoundation/OpenImageIO/commit/c75e31faa1bc24dea923c03a51db7be78b71c660
- https://github.com/AcademySoftwareFoundation/OpenImageIO/security/advisories/GHSA-2jr5-q49v-3858
- https://github.com/AcademySoftwareFoundation/OpenImageIO/security/advisories/GHSA-cq46-hp4h-cvfr
- https://github.com/AcademySoftwareFoundation/OpenImageIO/security/advisories/GHSA-mq8j-73c4-cr55
- https://github.com/AcademySoftwareFoundation/OpenImageIO/security/advisories/GHSA-gmrp-x952-3m66
- https://github.com/AcademySoftwareFoundation/OpenImageIO/security/advisories/GHSA-pj45-cf3g-28gq
- https://github.com/advisories/GHSA-pj45-cf3g-28gq
- https://github.com/AcademySoftwareFoundation/OpenImageIO/security/advisories/GHSA-4499-j545-7q33
- https://github.com/AcademySoftwareFoundation/OpenImageIO/security/advisories/GHSA-jg3q-vm3q-2j35