U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2025-29769

Change History

New CVE Received from GitHub, Inc. 4/07/2025 4:15:21 PM

Action Type Old Value New Value
Added Description

								
							
							
						
libvips is a demand-driven, horizontally threaded image processing library.  The heifsave operation could incorrectly determine the presence of an alpha channel in an input when it was not possible to determine the colour interpretation, known internally within libvips as "multiband". There aren't many ways to create a "multiband" input, but it is possible with a well-crafted TIFF image. If a "multiband" TIFF input image had 4 channels and HEIF-based output was requested, this led to libvips creating a 3 channel HEIF image without an alpha channel but then attempting to write 4 channels of data. This caused a heap buffer overflow, which could crash the process. This vulnerability is fixed in 8.16.1.
Added CVSS V4.0

								
							
							
						
AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Added CWE

								
							
							
						
CWE-122
Added Reference

								
							
							
						
https://github.com/libvips/libvips/commit/9ab6784f693de50b00fa535b9efbbe9d2cbf71f2
Added Reference

								
							
							
						
https://github.com/libvips/libvips/pull/4392
Added Reference

								
							
							
						
https://github.com/libvips/libvips/pull/4394
Added Reference

								
							
							
						
https://github.com/libvips/libvips/security/advisories/GHSA-f8r8-43hh-rghm
Added Reference

								
							
							
						
https://issues.oss-fuzz.com/issues/396460413