CVE-2026-3284
A vulnerability was found in libvips 8.19.0. Impacted is the function vips_extract_area_build of the file libvips/conversion/extract.c. The manipulation of the argument extract_area results in integer overflow. The attack requires a local approach. The exploit has been made public and could be used. The patch is identified as 24795bb3d19d84f7b6f5ed86451ad556c8f2fe70. It is advisable to implement a patch to correct this issue.
Vendor
Product
CWE
Yayın Tarihi
2026-02-27 03:16:03
Güncelleme
2026-03-02 16:30:59
Source Identifier
cna@vuldb.com
KEV Date Added
-
Kategoriler
Referanslar
https://github.com/libvips/libvips/
https://github.com/libvips/libvips/commit/24795bb3d19d84f7b6f5ed86451ad556c8f2fe70
https://github.com/libvips/libvips/issues/4879
https://github.com/libvips/libvips/issues/4879#issue-3944211794
https://github.com/libvips/libvips/pull/4887
https://vuldb.com/?ctiid.348013
https://vuldb.com/?id.348013
https://vuldb.com/?submit.758864