๐Ÿ” CVE Alert

CVE-2026-33021

HIGH 7.3

libsixel: Use-after-free in sixel_encoder_encode_bytes()

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
3th

libsixel is a SIXEL encoder/decoder implementation derived from kmiya's sixel. Versions 1.8.7 and prior contain a use-after-free vulnerability in sixel_encoder_encode_bytes() because sixel_frame_init() stores the caller-owned pixel buffer pointer directly in frame->pixels without making a defensive copy. When a resize operation is triggered, sixel_frame_convert_to_rgb888() unconditionally frees this caller-owned buffer and replaces it with a new internal allocation, leaving the caller with a dangling pointer. Any subsequent access to the original buffer by the caller constitutes a use-after-free, confirmed by AddressSanitizer. An attacker who controls incoming frames can trigger this bug repeatedly and predictably, resulting in a reliable crash with potential for code execution. This issue has been fixed in version 1.8.7-r1.

CWE CWE-416
Vendor saitoha
Product libsixel
Published Apr 14, 2026
Last Updated Apr 16, 2026
Stay Ahead of the Next One

Get instant alerts for saitoha libsixel

Be the first to know when new high vulnerabilities affecting saitoha libsixel are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
High

Affected Versions

saitoha / libsixel
< 1.8.7-r1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/saitoha/libsixel/security/advisories/GHSA-j6m5-2cc7-3whc github.com: https://github.com/saitoha/libsixel/releases/tag/v1.8.7-r1