Bug 2358026 (CVE-2025-29482) - CVE-2025-29482 libheif: Stack Buffer Overflow in libheif SAO Processing [NEEDINFO]
Summary: CVE-2025-29482 libheif: Stack Buffer Overflow in libheif SAO Processing
Keywords:
Status: NEW
Alias: CVE-2025-29482
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2358146 2358147
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-04-07 20:01 UTC by OSIDB Bzimport
Modified: 2025-04-29 10:29 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:
dominik: needinfo? (prodsec-dev)


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-04-07 20:01:15 UTC
Buffer Overflow vulnerability in libheif 1.19.7 allows a local attacker to execute arbitrary code via the SAO (Sample Adaptive Offset) processing of libde265.

Comment 2 Dominik 'Rathann' Mierzejewski 2025-04-29 09:35:53 UTC
Fedora builds are not linked with libde265, so they're not affected.

Comment 3 Dominik 'Rathann' Mierzejewski 2025-04-29 09:46:48 UTC
Besides, the bug is in libde265. libheif was only used to call the vulnerable libde265 function in the PoC.

Comment 4 Dominik 'Rathann' Mierzejewski 2025-04-29 10:29:33 UTC
Correct upstream link: https://github.com/strukturag/libde265/issues/472 . Please add it to the references at https://access.redhat.com/security/cve/CVE-2025-29482 .


Note You need to log in before you can comment on or make changes to this bug.