Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. imageproc
  4. ›
  5. GHSA-5qv7-j6w5-fr4m

GHSA-5qv7-j6w5-fr4m: imageproc has fragile bounds check when sampling from image

May 7, 2026

A read of pixels was coded as modifying coordinates to lie within the image bounds. It would calculate a coordinate by adding a constant to an input and taking the minimum of the resulting coordinate and ‘dimension - 1’. This would not protect against malicious inputs that could overflow the addition. Following the tricked bounds check, the image could then be sampled at multiple differently calculated coordinates that exceeded the bounds.

References

  • github.com/advisories/GHSA-5qv7-j6w5-fr4m
  • github.com/image-rs/imageproc
  • rustsec.org/advisories/RUSTSEC-2026-0115.html

Code Behaviors & Features

Detect and mitigate GHSA-5qv7-j6w5-fr4m with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.24.0 before 0.24.1, version 0.24.0, all versions starting from 0.25.0 before 0.25.1, version 0.25.0, all versions starting from 0.26.0 before 0.26.2

Fixed versions

  • 0.24.1
  • 0.25.1
  • 0.26.2

Solution

Upgrade to versions 0.24.1, 0.25.1, 0.26.2 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Learn more about CVSS

Weakness

  • CWE-190: Integer Overflow or Wraparound

Source file

cargo/imageproc/GHSA-5qv7-j6w5-fr4m.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 00:18:35 +0000.