Soumettre #755224: libvips (libvips project) libvips 8.19.0 Integer Overflow to Buffer Overflowinformation

Titrelibvips (libvips project) libvips 8.19.0 Integer Overflow to Buffer Overflow
DescriptionIn vips_source_read_to_memory() (called via vips_source_map()), a 64-bit source->length is used to size a GByteArray via g_byte_array_set_size() (32-bit guint). For sources larger than G_MAXUINT (>4GiB), the allocation truncates but the subsequent read loop writes up to the full 64-bit length, causing a heap-buffer-overflow. Triggered when libvips processes a seekable VipsSource with length >4GiB and uses the read-to-memory fallback (e.g., when mmap() is unavailable/fails).
La source⚠️ https://github.com/libvips/libvips/issues/4857
Utilisateur
 Niebelungen (UID 95430)
Soumission10/02/2026 09:52 (il y a 2 mois)
Modérer20/02/2026 21:21 (10 days later)
StatutAccepté
Entrée VulDB347222 [libvips jusqu’à 8.19.0 libvips/iofuncs/source.c vips_source_read_to_memory buffer overflow]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!