Vulnerability Description
A vulnerability was found in libvips 8.19.0. Impacted is the function vips_extract_area_build of the file libvips/conversion/extract.c. The manipulation of the argument extract_area results in integer overflow. The attack requires a local approach. The exploit has been made public and could be used. The patch is identified as 24795bb3d19d84f7b6f5ed86451ad556c8f2fe70. It is advisable to implement a patch to correct this issue.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libvips | Libvips | 8.19.0 |
Related Weaknesses (CWE)
References
- https://github.com/libvips/libvips/Product
- https://github.com/libvips/libvips/commit/24795bb3d19d84f7b6f5ed86451ad556c8f2fePatch
- https://github.com/libvips/libvips/issues/4879ExploitIssue TrackingVendor Advisory
- https://github.com/libvips/libvips/issues/4879#issue-3944211794ExploitIssue TrackingVendor Advisory
- https://github.com/libvips/libvips/pull/4887Issue TrackingPatch
- https://vuldb.com/?ctiid.348013Permissions RequiredVDB Entry
- https://vuldb.com/?id.348013Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.758864Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-3284?
CVE-2026-3284 is a vulnerability with a CVSS score of 3.3 (LOW). A vulnerability was found in libvips 8.19.0. Impacted is the function vips_extract_area_build of the file libvips/conversion/extract.c. The manipulation of the argument extract_area results in integer...
How severe is CVE-2026-3284?
CVE-2026-3284 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3284?
Check the references section above for vendor advisories and patch information. Affected products include: Libvips Libvips.