📢 Clarification Notice (CVE-2025-9300) #208
saitoha
announced in
Announcements
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
TL;DR:
CVE-2025-9300 is a one-byte Buffer Over-read (CWE-126) in a debug-only path of
img2sixel, reachable only when-v/--verboseis enabled.It performs no writes and provides no viable path to RCE. No stack buffers are involved—the palette data is either heap-allocated (
malloc) or astatic const unsigned char[]built-in.Note: some third-party posts have mischaracterized this as RCE (see examples in the Timeline below). No emergency response is required.
Technical summary
sixel_debug_print_palettewhen verbose logging is enabled.fprintfto the terminal.Why this is not RCE
-v/--verbose.malloc) or instatic const unsigned char[]tables; no stack buffer is used.Correct CWE classification
References:
https://cwe.mitre.org/documents/cwe_usage/mapping_examples.html
Timeline (how the confusion arose)
https://www.wiz.io/vulnerability-database/cve/cve-2025-9300
https://radar.offseq.com/threat/cve-2025-9300-stack-based-buffer-overflow-in-saito-168036dc
https://vuldb.com/?id.320905
Source: https://portallinuxferramentas.blogspot.com/2025/09/critical-security-alert-mitigating.html
https://bodhi.fedoraproject.org/updates/FEDORA-2025-4647d515fc
https://bodhi.fedoraproject.org/updates/FEDORA-2025-691c5cb4f4
Operational guidance
-v/--verboseis used, typical conversions are unaffected.Beta Was this translation helpful? Give feedback.
All reactions