A vulnerability has been found in libvips 8.19.0. This issue affects the function vips_extract_band_build of the file libvips/conversion/extract.c. The manipulation of the argument extract_band leads to out-of-bounds read. The attack needs to be performed locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 24795bb3d19d84f7b6f5ed86451ad556c8f2fe70. To fix this issue, it is recommended to deploy a patch.
References
| Link | Resource |
|---|---|
| https://github.com/libvips/libvips/ | Product |
| https://github.com/libvips/libvips/commit/24795bb3d19d84f7b6f5ed86451ad556c8f2fe70 | Patch |
| https://github.com/libvips/libvips/issues/4880 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/libvips/libvips/issues/4880#issue-3944214985 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/libvips/libvips/pull/4887 | Issue Tracking Patch |
| https://vuldb.com/?ctiid.348012 | Permissions Required VDB Entry |
| https://vuldb.com/?id.348012 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.758863 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-02-27 03:16
Updated : 2026-03-02 17:56
NVD link : CVE-2026-3283
Mitre link : CVE-2026-3283
CVE.ORG link : CVE-2026-3283
JSON object : View
Products Affected
libvips
- libvips
