Low severity3.3NVD Advisory· Published Feb 27, 2026· Updated Apr 29, 2026
CVE-2026-3284
CVE-2026-3284
Description
A vulnerability was found in libvips 8.19.0. Impacted is the function vips_extract_area_build of the file libvips/conversion/extract.c. The manipulation of the argument extract_area results in integer overflow. The attack requires a local approach. The exploit has been made public and could be used. The patch is identified as 24795bb3d19d84f7b6f5ed86451ad556c8f2fe70. It is advisable to implement a patch to correct this issue.
Affected products
1Patches
124795bb3d19dhttps://github.com/libvips/libvipsvia nvd-ref
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- github.com/libvips/libvips/commit/24795bb3d19d84f7b6f5ed86451ad556c8f2fe70nvdPatch
- github.com/libvips/libvips/pull/4887nvdIssue TrackingPatch
- github.com/libvips/libvips/issues/4879nvdExploitIssue TrackingVendor Advisory
- github.com/libvips/libvips/issues/4879nvdExploitIssue TrackingVendor Advisory
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdPermissions RequiredVDB Entry
News mentions
0No linked articles in our index yet.