An out-of-bounds read vulnerability exists in the TGAInput::decode_pixel() functionality of OpenImageIO Project OpenImageIO v2.4.7.1. A specially crafted targa file can lead to information disclosure. An attacker can provide a malicious file to trigger this vulnerability.
{ "binaries": [ { "binary_name": "libopenimageio-dev", "binary_version": "2.4.17.0+dfsg-1.1build4" }, { "binary_name": "libopenimageio-doc", "binary_version": "2.4.17.0+dfsg-1.1build4" }, { "binary_name": "libopenimageio2.4t64", "binary_version": "2.4.17.0+dfsg-1.1build4" }, { "binary_name": "libopenimageio2.4t64-dbgsym", "binary_version": "2.4.17.0+dfsg-1.1build4" }, { "binary_name": "openimageio-tools", "binary_version": "2.4.17.0+dfsg-1.1build4" }, { "binary_name": "openimageio-tools-dbgsym", "binary_version": "2.4.17.0+dfsg-1.1build4" }, { "binary_name": "python3-openimageio", "binary_version": "2.4.17.0+dfsg-1.1build4" } ], "availability": "No subscription required", "ubuntu_priority": "medium" }