{"id":"CVE-2025-9300","details":"A vulnerability was found in saitoha libsixel up to 1.10.3. Affected by this issue is the function sixel_debug_print_palette of the file src/encoder.c of the component img2sixel. The manipulation results in stack-based buffer overflow. The attack must be initiated from a local position. The exploit has been made public and could be used. The patch is identified as 316c086e79d66b62c0c4bc66229ee894e4fdb7d1. Applying a patch is advised to resolve this issue.","modified":"2026-04-10T05:37:44.383956Z","published":"2025-08-21T13:15:37.873Z","related":["openSUSE-SU-2025:15526-1"],"references":[{"type":"ADVISORY","url":"https://vuldb.com/?id.320905"},{"type":"REPORT","url":"https://github.com/saitoha/libsixel/issues/200"},{"type":"REPORT","url":"https://github.com/saitoha/libsixel/issues/200#issuecomment-3178785635"},{"type":"REPORT","url":"https://vuldb.com/?ctiid.320905"},{"type":"FIX","url":"https://github.com/saitoha/libsixel/commit/316c086e79d66b62c0c4bc66229ee894e4fdb7d1"},{"type":"EVIDENCE","url":"https://vuldb.com/?submit.632366"},{"type":"EVIDENCE","url":"https://drive.google.com/file/d/1IIvvRFgUQZcySqeoqXXhsxd0HZCjClJ7/view?usp=sharing"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libsixel/libsixel","events":[{"introduced":"0"},{"last_affected":"8051f79190186884fba16a3cc87692ea069a02b9"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.10.3"}]}},{"type":"GIT","repo":"https://github.com/saitoha/libsixel","events":[{"introduced":"0"},{"fixed":"316c086e79d66b62c0c4bc66229ee894e4fdb7d1"}]}],"versions":["v0.14.0","v0.15.0","v0.16.0","v0.16.1","v0.17.0","v0.17.1","v0.17.2","v0.18.0","v0.19.2","v0.19.3","v0.19.4","v0.19.5","v0.19.6","v0.20.0","v0.21.0","v0.21.1","v0.22.0","v0.22.1","v0.22.2","v0.22.3","v0.23.0","v0.23.1","v0.23.2","v0.24.0","v0.24.2","v0.25.0","v0.25.1","v0.25.2","v0.25.3","v0.25.4","v0.25.5","v0.26.0","v0.27.0","v0.27.1","v0.28.0","v1.0.0","v1.0.1","v1.0.2","v1.1.0","v1.1.1","v1.1.2","v1.10.0","v1.10.1","v1.10.2","v1.10.3","v1.3.1","v1.3.2","v1.3.3","v1.3.4","v1.3.5","v1.3.6","v1.4.0","v1.4.1","v1.4.10","v1.4.11","v1.4.12","v1.4.13","v1.4.2","v1.4.3","v1.4.4","v1.4.5","v1.4.6","v1.4.7","v1.4.8","v1.4.9","v1.5.0","v1.5.1","v1.5.2","v1.6.1","v1.7.1","v1.7.2","v1.7.3","v1.8.0","v1.8.1","v1.8.2","v1.8.3","v1.8.4","v1.8.5","v1.8.6","v1.9.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-9300.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}