Metrics
Affected Vendors & Products
Sat, 18 Oct 2025 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:libvips:libvips:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 30 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 30 Sep 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Libvips
Libvips libvips |
|
| Vendors & Products |
Libvips
Libvips libvips |
Mon, 29 Sep 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | libvips is a demand-driven, horizontally threaded image processing library. For versions 8.17.1 and below, when libvips is compiled with support for PDF input via poppler, the pdfload operation is affected by a buffer read overflow when parsing the header of a crafted PDF with a page that defines a width but not a height. Those using libvips compiled without support for PDF input are unaffected as well as thosewith support for PDF input via PDFium. This issue is fixed in version 8.17.2. A workaround for those affected is to block the VipsForeignLoadPdf operation via vips_operation_block_set, which is available in most language bindings, or to set VIPS_BLOCK_UNTRUSTED environment variable at runtime, which will block all untrusted loaders including PDF input via poppler. | |
| Title | libvips is vulnerable to Buffer Over-Read in poppler-based pdfload | |
| Weaknesses | CWE-126 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-30T13:41:59.765Z
Reserved: 2025-09-23T14:33:49.504Z
Link: CVE-2025-59933
Updated: 2025-09-30T13:32:24.826Z
Status : Analyzed
Published: 2025-09-29T22:15:36.767
Modified: 2025-10-18T01:23:06.320
Link: CVE-2025-59933
No data.