Source: vips
Version: 8.18.0-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/libvips/libvips/issues/4857
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for vips.

CVE-2026-2913[0]:
| A vulnerability was determined in libvips up to 8.19.0. The affected
| element is the function vips_source_read_to_memory of the file
| libvips/iofuncs/source.c. This manipulation causes heap-based buffer
| overflow. It is possible to launch the attack on the local host. The
| attack's complexity is rated as high. The exploitability is
| described as difficult. The exploit has been publicly disclosed and
| may be utilized. Patch name:
| a56feecbe9ed66521d9647ec9fbcd2546eccd7ee. Applying a patch is the
| recommended action to fix this issue. The confirmation of the bugfix
| mentions: "[T]he impact of this is negligible, since this only
| affects custom seekable sources larger than 4 GiB (and the crash
| occurs in user code rather than libvips itself)."


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-2913
    https://www.cve.org/CVERecord?id=CVE-2026-2913
[1] https://github.com/libvips/libvips/issues/4857
[2] 
https://github.com/libvips/libvips/commit/a56feecbe9ed66521d9647ec9fbcd2546eccd7ee

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to