OESA-2026-1269

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2026-1269
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2026-1269.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2026-1269
Upstream
Published
2026-01-30T12:28:28Z
Modified
2026-01-30T13:42:45.276340Z
Summary
assimp security update
Details

Assimp is a library to load and process geometric scenes from various data formats. Assimp aims to provide a full asset conversion pipeline for use in game engines and real-time rendering systems of any kind, but is not limited to this purpose.

Security Fix(es):

A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3. Affected is the function Assimp::MD3Importer::ValidateSurfaceHeaderOffsets of the file code/AssetLib/MD3/MD3Loader.cpp of the component File Handler. The manipulation leads to heap-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.(CVE-2025-3549)

A vulnerability was found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This issue affects the function MDCImporter::ValidateSurfaceHeader of the file assimp/code/AssetLib/MDC/MDCLoader.cpp. The manipulation of the argument pcSurface2 leads to out-of-bounds read. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future.(CVE-2025-5165)

A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been rated as problematic. Affected by this issue is the function MDLImporter::ImportUVCoordinate3DGSMDL345 of the file assimp/code/AssetLib/MDL/MDLLoader.cpp. The manipulation of the argument iIndex leads to out-of-bounds read. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future.(CVE-2025-5168)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:24.03-LTS-SP1 / assimp

Package

Name
assimp
Purl
pkg:rpm/openEuler/assimp&distro=openEuler-24.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.1-14.oe2403sp1

Ecosystem specific

{
    "src": [
        "assimp-5.3.1-14.oe2403sp1.src.rpm"
    ],
    "x86_64": [
        "assimp-5.3.1-14.oe2403sp1.x86_64.rpm",
        "assimp-debuginfo-5.3.1-14.oe2403sp1.x86_64.rpm",
        "assimp-debugsource-5.3.1-14.oe2403sp1.x86_64.rpm",
        "assimp-devel-5.3.1-14.oe2403sp1.x86_64.rpm"
    ],
    "noarch": [
        "assimp-help-5.3.1-14.oe2403sp1.noarch.rpm",
        "python3-assimp-5.3.1-14.oe2403sp1.noarch.rpm"
    ],
    "aarch64": [
        "assimp-5.3.1-14.oe2403sp1.aarch64.rpm",
        "assimp-debuginfo-5.3.1-14.oe2403sp1.aarch64.rpm",
        "assimp-debugsource-5.3.1-14.oe2403sp1.aarch64.rpm",
        "assimp-devel-5.3.1-14.oe2403sp1.aarch64.rpm"
    ]
}

Database specific

source

"https://repo.openeuler.org/security/data/osv/OESA-2026-1269.json"