An out-of-bounds read vulnerability exists in the TGAInput::decode_pixel() functionality of OpenImageIO Project OpenImageIO v2.4.7.1. A specially crafted targa file can lead to information disclosure. An attacker can provide a malicious file to trigger this vulnerability.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.4.17.0+dfsg-1.1build4", "binary_name": "libopenimageio-dev" }, { "binary_version": "2.4.17.0+dfsg-1.1build4", "binary_name": "libopenimageio-doc" }, { "binary_version": "2.4.17.0+dfsg-1.1build4", "binary_name": "libopenimageio2.4t64" }, { "binary_version": "2.4.17.0+dfsg-1.1build4", "binary_name": "libopenimageio2.4t64-dbgsym" }, { "binary_version": "2.4.17.0+dfsg-1.1build4", "binary_name": "openimageio-tools" }, { "binary_version": "2.4.17.0+dfsg-1.1build4", "binary_name": "openimageio-tools-dbgsym" }, { "binary_version": "2.4.17.0+dfsg-1.1build4", "binary_name": "python3-openimageio" } ] }