Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61146: n/a

0
Medium
VulnerabilityCVE-2025-61146cvecve-2025-61146
Published: Mon Feb 23 2026 (02/23/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

saitoha libsixel until v1.8.7 was discovered to contain a memory leak via the component malloc_stub.c.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 01:46:59 UTC

Technical Analysis

CVE-2025-61146 identifies a memory leak vulnerability in the saitoha libsixel library, a tool used for converting images into sixel graphics format, commonly utilized in terminal graphics and embedded systems. The vulnerability resides in the malloc_stub.c component, where allocated memory is not properly released, leading to gradual memory consumption over time. This can degrade system performance or cause denial of service by exhausting available memory resources. The flaw affects all versions up to 1.8.7 of libsixel. The CVSS v3.1 base score is 4.0, reflecting a local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impact limited to availability (A:L) with no confidentiality or integrity impact. No known exploits have been reported, and no patches have been released yet. The vulnerability is categorized under CWE-401, indicating a classic memory leak issue. Given libsixel's use in image processing and terminal graphics, systems relying on this library for rendering or conversion tasks may experience resource depletion if exposed to crafted inputs or sustained usage. The lack of remote exploitability and requirement for local access limit the threat but do not eliminate risk in multi-user or shared environments.

Potential Impact

The primary impact of CVE-2025-61146 is on system availability due to memory exhaustion caused by the leak. In environments where libsixel is used extensively, such as servers processing large batches of images or embedded devices with limited memory, this could lead to degraded performance, application crashes, or system instability. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized modifications are unlikely. However, denial of service conditions could disrupt business operations, especially in critical systems relying on continuous image processing or terminal graphics rendering. The local attack vector and no privilege requirement mean that any local user or process could potentially trigger the leak, posing a risk in multi-tenant or shared systems. The absence of known exploits and patches reduces immediate risk but highlights the need for vigilance and timely remediation once fixes become available.

Mitigation Recommendations

To mitigate CVE-2025-61146, organizations should first monitor official libsixel repositories and security advisories for patches or updates addressing the memory leak. Until a patch is available, limiting the use of vulnerable libsixel versions in critical or resource-constrained environments is advisable. Employ resource monitoring and limits (e.g., cgroups on Linux) to detect and contain abnormal memory usage by processes utilizing libsixel. Consider sandboxing or isolating applications that invoke libsixel to prevent system-wide impact. For developers, reviewing and updating code to ensure proper memory management in malloc_stub.c or replacing libsixel with alternative libraries without this vulnerability can be effective. Additionally, restricting local access to trusted users and processes reduces exploitation risk. Regularly auditing systems for signs of memory leaks or performance degradation related to image processing tasks will help in early detection.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699cbd8cbe58cf853bc4b484

Added to database: 2/23/2026, 8:50:20 PM

Last enriched: 3/3/2026, 1:46:59 AM

Last updated: 4/10/2026, 5:06:17 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses