Buffer Over-read Affecting libvips/libvips package, versions [,8.17.2)


Severity

Recommended
0.0
low
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (3rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-LIBVIPSLIBVIPS-13147714
  • published30 Sept 2025
  • disclosed29 Sept 2025
  • creditYang Luo, Yanju Chen

Introduced: 29 Sep 2025

NewCVE-2025-59933  (opens in a new tab)
CWE-126  (opens in a new tab)

How to fix?

Upgrade libvips/libvips to version 8.17.2 or higher.

Overview

Affected versions of this package are vulnerable to Buffer Over-read in the pdfload process, if compiled with support for PDF input via Poppler. An attacker can cause the application to read beyond the bounds of allocated memory by submitting a specially crafted PDF document with media headers that define a width but not a height.

Note: Using libvips versions compiled with support for PDF input via PDFium or without support for PDF input at all are unaffected.

Workaround

This vulnerability can be mitigated by blocking the VipsForeignLoadPdf operation via vips_operation_block_set or by setting the VIPS_BLOCK_UNTRUSTED environment variable at runtime.

References

CVSS Base Scores

version 4.0
version 3.1