CVE-2026-6491
Received Received - Intake
Heap-Based Buffer Overflow in libvips nip2 Handler (im_minpos_vec

Publication date: 2026-04-17

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security vulnerability has been detected in libvips up to 8.18.2. The affected element is the function im_minpos_vec of the file libvips/deprecated/vips7compat.c of the component nip2 Handler. Such manipulation of the argument n leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed publicly and may be used. The vendor confirms that they will "be removing the deprecated area in libvips 8.19".
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-17
Last Modified
2026-04-29
Generated
2026-05-06
AI Q&A
2026-04-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
libvips libvips to 8.18.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-119 The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
CWE-122 A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the libvips library up to version 8.18.2, specifically in the function im_minpos_vec within the file libvips/deprecated/vips7compat.c of the nip2 Handler component. It involves manipulation of the argument 'n' which leads to a heap-based buffer overflow. This means that an attacker who has local access to the system can exploit this flaw to cause memory corruption.


How can this vulnerability impact me? :

The vulnerability can lead to a heap-based buffer overflow, which may allow an attacker with local access to execute arbitrary code, cause a crash, or corrupt memory. This can compromise the stability and security of the affected system or application using libvips.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability affects libvips up to version 8.18.2 in the deprecated function im_minpos_vec. Since the vendor plans to remove the deprecated area in libvips 8.19, an immediate mitigation step is to upgrade libvips to version 8.19 or later once available.

Additionally, because the attack requires local access, restricting local user permissions and limiting access to systems running vulnerable versions of libvips can help reduce risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart