Description
A security vulnerability has been detected in libvips up to 8.18.2. The affected element is the function im_minpos_vec of the file libvips/deprecated/vips7compat.c of the component nip2 Handler. Such manipulation of the argument n leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed publicly and may be used. The vendor confirms that they will "be removing the deprecated area in libvips 8.19".
Published: 2026-04-17
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Heap-based buffer overflow with local exploitation potential
Action: Patch
AI Analysis

Impact

A heap-based buffer overflow occurs in the function im_minpos_vec located in libvips/deprecated/vips7compat.c. An attacker who can influence the argument n can cause the function to write past the bounds of a dynamically allocated buffer, potentially corrupting adjacent heap objects. The vulnerability is limited to local use, but local corruption can lead to application crashes or may lead to arbitrary code execution under certain conditions. Based on the description, it is inferred that arbitrary code execution could be achieved if the heap overwrite is leveraged properly, though the vulnerability statement itself does not explicitly confirm this capability.

Affected Systems

Versions of libvips up to and including 8.18.2 are affected. The vulnerability resides in the deprecated nip2 handler. A newer release (8.19) will remove the deprecated code path, removing the vulnerability.

Risk and Exploitability

The CVSS score of 4.8 places the vulnerability in the moderate range. The EPSS score of < 1% indicates a very low probability of exploitation, and the issue is not listed in the CISA KEV catalog, suggesting limited known exploitation at the time. Because an attacker must have local access to the system running libvips, the risk is primarily to environments where untrusted users can invoke libvips; however, local exploitation can still lead to service disruption or may allow privilege escalation if the heap overwrite is leveraged carefully.

Generated by OpenCVE AI on April 18, 2026 at 20:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade libvips to version 8.19 or later, where the deprecated nip2 functionality is removed.
  • If an immediate upgrade is not possible, disable or remove the nip2 handler or alternate code paths that invoke im_minpos_vec to eliminate the vulnerable function.
  • Monitor local processes that utilize libvips for abnormal crashes or signs of heap corruption, and restrict execution of those processes to trusted users only.

Generated by OpenCVE AI on April 18, 2026 at 20:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 17 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in libvips up to 8.18.2. The affected element is the function im_minpos_vec of the file libvips/deprecated/vips7compat.c of the component nip2 Handler. Such manipulation of the argument n leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed publicly and may be used. The vendor confirms that they will "be removing the deprecated area in libvips 8.19".
Title libvips nip2 vips7compat.c im_minpos_vec heap-based overflow
First Time appeared Libvips
Libvips libvips
Weaknesses CWE-119
CWE-122
CPEs cpe:2.3:a:libvips:libvips:*:*:*:*:*:*:*:*
Vendors & Products Libvips
Libvips libvips
References
Metrics cvssV2_0

{'score': 4.3, 'vector': 'AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:TF/RC:C'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:T/RC:C'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:T/RC:C'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-18T02:59:14.319Z

Reserved: 2026-04-17T07:21:38.455Z

Link: CVE-2026-6491

cve-icon Vulnrichment

Updated: 2026-04-18T02:59:10.753Z

cve-icon NVD

Status : Deferred

Published: 2026-04-17T14:16:35.187

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-6491

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T20:15:09Z

Weaknesses