Source: libsixel
Version: 1.10.5-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/saitoha/libsixel/issues/200
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for libsixel.

CVE-2025-9300[0]:
| A vulnerability was found in saitoha libsixel up to 1.10.3. Affected
| by this issue is the function sixel_debug_print_palette of the file
| src/encoder.c of the component img2sixel. The manipulation results
| in stack-based buffer overflow. The attack must be initiated from a
| local position. The exploit has been made public and could be used.
| The patch is identified as 316c086e79d66b62c0c4bc66229ee894e4fdb7d1.
| Applying a patch is advised to resolve this issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-9300
    https://www.cve.org/CVERecord?id=CVE-2025-9300
[1] https://github.com/saitoha/libsixel/issues/200
[2] 
https://github.com/saitoha/libsixel/commit/316c086e79d66b62c0c4bc66229ee894e4fdb7d1

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to