Source: vips
Version: 8.18.0-2
Severity: important
Tags: security upstream
Forwarded: https://github.com/libvips/libvips/issues/4874
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for vips.

CVE-2026-3147[0]:
| A vulnerability was found in libvips up to 8.18.0. This affects the
| function vips_foreign_load_csv_build of the file
| libvips/foreign/csvload.c. The manipulation results in heap-based
| buffer overflow. The attack requires a local approach. The exploit
| has been made public and could be used. The patch is identified as
| b3ab458a25e0e261cbd1788474bbc763f7435780. It is advisable to
| implement a patch to correct this issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-3147
    https://www.cve.org/CVERecord?id=CVE-2026-3147
[1] https://github.com/libvips/libvips/issues/4874
[2] https://github.com/libvips/libvips/pull/4894
[3] 
https://github.com/libvips/libvips/commit/b3ab458a25e0e261cbd1788474bbc763f7435780

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to