Description
Little CMS (lcms2) through 2.18 has an integer overflow in CubeSize in cmslut.c because the overflow check is performed after the multiplication.
Published: 2026-04-18
Score: 4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Memory Corruption
Action: Assess Impact
AI Analysis

Impact

Little CMS (lcms2) up to version 2.18 contains an integer overflow in the CubeSize function in cmslut.c, because the overflow check is performed after the multiplication. This defect can cause an incorrectly computed size value, leading to memory corruption when the library allocates space for lookup tables. The flaw exhibits characteristics of integer overflow (CWE-190) and improper order of operations (CWE-696).

Affected Systems

The Little CMS Color Engine, specifically all releases up to and including 2.18, is affected. The vulnerability originates from the lcms2 source code and is therefore present in any software that links to this library without an updated version.

Risk and Exploitability

The CVSS score of 4.0 indicates a moderate severity. The EPSS score is less than 1%, indicating a very low exploitation probability. The vulnerability is not listed in CISA’s KEV catalog. The likely attack vector requires an attacker to supply crafted input that reaches the CubeSize routine, such as malicious image data processed by the library. If successfully exploited, the overflow could lead to a denial‑of‑service condition or, in certain contexts, further memory corruption that might be escalated to arbitrary code execution.

Generated by OpenCVE AI on April 20, 2026 at 13:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest Little CMS release that addresses the CubeSize calculation bug; consult the project’s changelog for the applicable patch.
  • If an upgrade is not immediately possible, validate all input parameters that reach the CubeSize routine and enforce bounds checks to prevent excessively large values from being processed.
  • Monitor applications that use Little CMS for abnormal crashes or memory errors, and apply additional hardening such as memory protection mechanisms (ASLR, stack canaries) to reduce the impact of potential exploitation.

Generated by OpenCVE AI on April 20, 2026 at 13:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4568-1 lcms2 security update
History

Thu, 07 May 2026 18:30:00 +0000

Type Values Removed Values Added
References

Wed, 22 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Littlecms little Cms
CPEs cpe:2.3:a:littlecms:little_cms:*:*:*:*:*:*:*:*
Vendors & Products Littlecms little Cms

Mon, 20 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title Little CMS: lcms2: mm2/Little-CMS: Little CMS: Information disclosure or denial of service via integer overflow in CubeSize
Weaknesses CWE-190
References
Metrics threat_severity

None

threat_severity

Moderate


Sat, 18 Apr 2026 07:00:00 +0000

Type Values Removed Values Added
Description Little CMS (lcms2) through 2.18 has an integer overflow in CubeSize in cmslut.c because the overflow check is performed after the multiplication.
First Time appeared Littlecms
Littlecms little Cms Color Engine
Weaknesses CWE-696
CPEs cpe:2.3:a:littlecms:little_cms_color_engine:*:*:*:*:*:*:*:*
Vendors & Products Littlecms
Littlecms little Cms Color Engine
References
Metrics cvssV3_1

{'score': 4, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L'}


Subscriptions

Littlecms Little Cms Little Cms Color Engine
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-07T17:33:56.924Z

Reserved: 2026-04-18T06:43:13.323Z

Link: CVE-2026-41254

cve-icon Vulnrichment

Updated: 2026-05-07T17:33:56.924Z

cve-icon NVD

Status : Modified

Published: 2026-04-18T07:16:10.807

Modified: 2026-05-07T18:16:19.300

Link: CVE-2026-41254

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-18T06:43:13Z

Links: CVE-2026-41254 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T14:00:08Z

Weaknesses