| Titre | libvips (libvips project) libvips 8.19.0 Integer Overflow to Buffer Overflow |
|---|
| Description | In vips_source_read_to_memory() (called via vips_source_map()), a 64-bit source->length is used to size a GByteArray via g_byte_array_set_size() (32-bit guint). For sources larger than G_MAXUINT (>4GiB), the allocation truncates but the subsequent read loop writes up to the full 64-bit length, causing a heap-buffer-overflow. Triggered when libvips processes a seekable VipsSource with length >4GiB and uses the read-to-memory fallback (e.g., when mmap() is unavailable/fails). |
|---|
| La source | ⚠️ https://github.com/libvips/libvips/issues/4857 |
|---|
| Utilisateur | Niebelungen (UID 95430) |
|---|
| Soumission | 10/02/2026 09:52 (il y a 2 mois) |
|---|
| Modérer | 20/02/2026 21:21 (10 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 347222 [libvips jusqu’à 8.19.0 libvips/iofuncs/source.c vips_source_read_to_memory buffer overflow] |
|---|
| Points | 20 |
|---|