Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 02 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:libvips:libvips:8.19.0:*:*:*:*:*:*:* |
Fri, 27 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Feb 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in libvips 8.19.0. Impacted is the function vips_extract_area_build of the file libvips/conversion/extract.c. The manipulation of the argument extract_area results in integer overflow. The attack requires a local approach. The exploit has been made public and could be used. The patch is identified as 24795bb3d19d84f7b6f5ed86451ad556c8f2fe70. It is advisable to implement a patch to correct this issue. | |
| Title | libvips extract.c vips_extract_area_build integer overflow | |
| First Time appeared |
Libvips
Libvips libvips |
|
| Weaknesses | CWE-189 CWE-190 |
|
| CPEs | cpe:2.3:a:libvips:libvips:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Libvips
Libvips libvips |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-27T18:49:42.929Z
Reserved: 2026-02-26T16:33:08.940Z
Link: CVE-2026-3284
Updated: 2026-02-27T18:49:39.980Z
Status : Analyzed
Published: 2026-02-27T03:16:03.167
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-3284
No data.
OpenCVE Enrichment
Updated: 2026-04-18T10:30:35Z