Source: vips Version: 8.18.0-1 Severity: important Tags: security upstream Forwarded: https://github.com/libvips/libvips/issues/4857 X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for vips. CVE-2026-2913[0]: | A vulnerability was determined in libvips up to 8.19.0. The affected | element is the function vips_source_read_to_memory of the file | libvips/iofuncs/source.c. This manipulation causes heap-based buffer | overflow. It is possible to launch the attack on the local host. The | attack's complexity is rated as high. The exploitability is | described as difficult. The exploit has been publicly disclosed and | may be utilized. Patch name: | a56feecbe9ed66521d9647ec9fbcd2546eccd7ee. Applying a patch is the | recommended action to fix this issue. The confirmation of the bugfix | mentions: "[T]he impact of this is negligible, since this only | affects custom seekable sources larger than 4 GiB (and the crash | occurs in user code rather than libvips itself)." If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2026-2913 https://www.cve.org/CVERecord?id=CVE-2026-2913 [1] https://github.com/libvips/libvips/issues/4857 [2] https://github.com/libvips/libvips/commit/a56feecbe9ed66521d9647ec9fbcd2546eccd7ee Please adjust the affected versions in the BTS as needed. Regards, Salvatore

