DEBIAN-CVE-2026-3284

Source
https://security-tracker.debian.org/tracker/CVE-2026-3284
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3284.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-3284
Upstream
Published
2026-02-27T03:16:03.167Z
Modified
2026-03-06T05:01:08.274478Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was found in libvips 8.19.0. Impacted is the function vipsextractareabuild of the file libvips/conversion/extract.c. The manipulation of the argument extractarea results in integer overflow. The attack requires a local approach. The exploit has been made public and could be used. The patch is identified as 24795bb3d19d84f7b6f5ed86451ad556c8f2fe70. It is advisable to implement a patch to correct this issue.

References

Affected packages

Debian:11 / vips

Package

Name
vips
Purl
pkg:deb/debian/vips?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*
8.10.5-2
8.10.5-2+deb11u1
8.11.4-1
8.11.4-2
8.12.1-1
8.12.2-1
8.13.0-1
8.13.1-1
8.13.2-1
8.13.3-1
8.13.3-2
8.14.1-1
8.14.1-2
8.14.1-3
8.14.2-1
8.14.3-1
8.14.4-1
8.14.5-1
8.15.0~rc2-1
8.15.0~rc2-2
8.15.0-1
8.15.0-2
8.15.1-1
8.15.1-1.1~exp1
8.15.1-1.1
8.15.2-1
8.15.2-2
8.15.3-1
8.16.0-1
8.16.0-2
8.16.1-1
8.16.1-2
8.17.3-1
8.17.3-2
8.18.0-1
8.18.0-2
8.18.0-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3284.json"

Debian:12 / vips

Package

Name
vips
Purl
pkg:deb/debian/vips?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*
8.14.1-3
8.14.1-3+deb12u1
8.14.1-3+deb12u2
8.14.2-1
8.14.3-1
8.14.4-1
8.14.5-1
8.15.0~rc2-1
8.15.0~rc2-2
8.15.0-1
8.15.0-2
8.15.1-1
8.15.1-1.1~exp1
8.15.1-1.1
8.15.2-1
8.15.2-2
8.15.3-1
8.16.0-1
8.16.0-2
8.16.1-1
8.16.1-2
8.17.3-1
8.17.3-2
8.18.0-1
8.18.0-2
8.18.0-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3284.json"

Debian:13 / vips

Package

Name
vips
Purl
pkg:deb/debian/vips?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*
8.16.1-1
8.16.1-2
8.17.3-1
8.17.3-2
8.18.0-1
8.18.0-2
8.18.0-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3284.json"

Debian:14 / vips

Package

Name
vips
Purl
pkg:deb/debian/vips?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.18.0-3

Affected versions

8.*
8.16.1-1
8.16.1-2
8.17.3-1
8.17.3-2
8.18.0-1
8.18.0-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3284.json"