Description
A vulnerability was found in libvips 8.19.0. Impacted is the function vips_extract_area_build of the file libvips/conversion/extract.c. The manipulation of the argument extract_area results in integer overflow. The attack requires a local approach. The exploit has been made public and could be used. The patch is identified as 24795bb3d19d84f7b6f5ed86451ad556c8f2fe70. It is advisable to implement a patch to correct this issue.
Problem types
Timeline
| 2026-02-26: | Advisory disclosed |
| 2026-02-26: | VulDB entry created |
| 2026-02-26: | VulDB entry last update |
Credits
Niebelungen (VulDB User)
References
vuldb.com/?id.348013 (VDB-348013 | libvips extract.c vips_extract_area_build integer overflow)
vuldb.com/?ctiid.348013 (VDB-348013 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.758864 (Submit #758864 | libvips 8.19.0(7fab325d2) Integer Overflow or Wraparound)
github.com/libvips/libvips/issues/4879
github.com/libvips/libvips/pull/4887
github.com/libvips/libvips/issues/4879
github.com/...ommit/24795bb3d19d84f7b6f5ed86451ad556c8f2fe70
github.com/libvips/libvips/