libvips is a demand-driven, horizontally threaded image processing library. For versions 8.17.1 and below, when libvips is compiled with support for PDF input via poppler, the pdfload operation is affected by a buffer read overflow when parsing the header of a crafted PDF with a page that defines a width but not a height. Those using libvips compiled without support for PDF input are unaffected as well as thosewith support for PDF input via PDFium. This issue is fixed in version 8.17.2. A workaround for those affected is to block the VipsForeignLoadPdf operation via vips_operation_block_set, which is available in most language bindings, or to set VIPS_BLOCK_UNTRUSTED environment variable at runtime, which will block all untrusted loaders including PDF input via poppler.
References
Link | Resource |
---|---|
https://github.com/libvips/libvips/commit/a58bfae9223a5466cc81ba9fe6dfb08233cf17d1 | Patch |
https://github.com/libvips/libvips/releases/tag/v8.17.2 | Release Notes |
https://github.com/libvips/libvips/security/advisories/GHSA-q8px-4w5q-c2r4 | Patch Vendor Advisory Mitigation |
Configurations
History
18 Oct 2025, 01:23
Type | Values Removed | Values Added |
---|---|---|
First Time |
Libvips
Libvips libvips |
|
References | () https://github.com/libvips/libvips/commit/a58bfae9223a5466cc81ba9fe6dfb08233cf17d1 - Patch | |
References | () https://github.com/libvips/libvips/releases/tag/v8.17.2 - Release Notes | |
References | () https://github.com/libvips/libvips/security/advisories/GHSA-q8px-4w5q-c2r4 - Patch, Vendor Advisory, Mitigation | |
CPE | cpe:2.3:a:libvips:libvips:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
29 Sep 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-29 22:15
Updated : 2025-10-18 01:23
NVD link : CVE-2025-59933
Mitre link : CVE-2025-59933
CVE.ORG link : CVE-2025-59933
JSON object : View
Products Affected
libvips
- libvips
CWE
CWE-126
Buffer Over-read