{"id":"CVE-2023-40032","summary":"Potential segfault due to NULL pointer dereference in libvips","details":"libvips is a demand-driven, horizontally threaded image processing library. A specially crafted SVG input can cause libvips versions 8.14.3 or earlier to segfault when attempting to parse a malformed UTF-8 character. Users should upgrade to libvips version 8.14.4 (or later) when processing untrusted input.","aliases":["GHSA-33qp-9pq7-9584"],"modified":"2026-04-10T05:00:38.771810Z","published":"2023-09-11T18:34:59.025Z","database_specific":{"cwe_ids":["CWE-476"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/40xxx/CVE-2023-40032.json","cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YU2FFC47X2XDEGEHEWAGLU5L3R6FEYD2/"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/40xxx/CVE-2023-40032.json"},{"type":"ADVISORY","url":"https://github.com/libvips/libvips/security/advisories/GHSA-33qp-9pq7-9584"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-40032"},{"type":"FIX","url":"https://github.com/libvips/libvips/commit/e091d65835966ef56d53a4105a7362cafdb1582b"},{"type":"FIX","url":"https://github.com/libvips/libvips/pull/3604"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libvips/libvips","events":[{"introduced":"f352bcd1911d8076a5d5a218d2d15f5d583d4e5b"},{"fixed":"f049dcdfc434d643e3155bb990192d489ae5ff1a"}]}],"versions":["v8.12.0","v8.13.0","v8.13.0-pre1","v8.13.0-rc1","v8.13.0-rc2","v8.14.0","v8.14.0-rc1","v8.14.1","v8.14.2","v8.14.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-40032.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}