No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 13 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in uclouvain openjpeg up to 2.5.4. This impacts the function opj_pi_initialise_encode in the library src/lib/openjp2/pi.c. The manipulation leads to integer overflow. The attack must be carried out locally. The exploit is publicly available and might be used. The identifier of the patch is 839936aa33eb8899bbbd80fda02796bb65068951. It is suggested to install a patch to address this issue. | |
| Title | uclouvain openjpeg pi.c opj_pi_initialise_encode integer overflow | |
| First Time appeared |
Uclouvain
Uclouvain openjpeg |
|
| Weaknesses | CWE-189 CWE-190 |
|
| CPEs | cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Uclouvain
Uclouvain openjpeg |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-13T16:45:11.772Z
Reserved: 2026-04-13T08:41:16.591Z
Link: CVE-2026-6192
No data.
Status : Received
Published: 2026-04-13T17:16:32.333
Modified: 2026-04-13T17:16:32.333
Link: CVE-2026-6192
No data.
OpenCVE Enrichment
No data.