A vulnerability was found in libvips 8.19.0. Impacted is the function vips_extract_area_build of the file libvips/conversion/extract.c. The manipulation of the argument extract_area results in integer overflow. The attack requires a local approach. The exploit has been made public and could be used. The patch is identified as 24795bb3d19d84f7b6f5ed86451ad556c8f2fe70. It is advisable to implement a patch to correct this issue.
References
| Link | Resource |
|---|---|
| https://github.com/libvips/libvips/ | Product |
| https://github.com/libvips/libvips/commit/24795bb3d19d84f7b6f5ed86451ad556c8f2fe70 | Patch |
| https://github.com/libvips/libvips/issues/4879 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/libvips/libvips/issues/4879#issue-3944211794 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/libvips/libvips/pull/4887 | Issue Tracking Patch |
| https://vuldb.com/?ctiid.348013 | Permissions Required VDB Entry |
| https://vuldb.com/?id.348013 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.758864 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-02-27 03:16
Updated : 2026-03-02 16:30
NVD link : CVE-2026-3284
Mitre link : CVE-2026-3284
CVE.ORG link : CVE-2026-3284
JSON object : View
Products Affected
libvips
- libvips
