CVE-2026-3282

A flaw has been found in libvips 8.19.0. This vulnerability affects the function vips_unpremultiply_build of the file libvips/conversion/unpremultiply.c. Executing a manipulation of the argument alpha_band can lead to out-of-bounds read. The attack needs to be launched locally. The exploit has been published and may be used. This patch is called 7215ead1e0cd7d3703cc4f5fca06d7d0f4c22b91. A patch should be applied to remediate this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:libvips:libvips:8.19.0:*:*:*:*:*:*:*

History

02 Mar 2026, 17:58

Type Values Removed Values Added
References () https://github.com/libvips/libvips/ - () https://github.com/libvips/libvips/ - Product
References () https://github.com/libvips/libvips/commit/7215ead1e0cd7d3703cc4f5fca06d7d0f4c22b91 - () https://github.com/libvips/libvips/commit/7215ead1e0cd7d3703cc4f5fca06d7d0f4c22b91 - Patch
References () https://github.com/libvips/libvips/issues/4881 - () https://github.com/libvips/libvips/issues/4881 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/libvips/libvips/issues/4881#issue-3944216443 - () https://github.com/libvips/libvips/issues/4881#issue-3944216443 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/libvips/libvips/pull/4886 - () https://github.com/libvips/libvips/pull/4886 - Issue Tracking, Patch
References () https://vuldb.com/?ctiid.348011 - () https://vuldb.com/?ctiid.348011 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.348011 - () https://vuldb.com/?id.348011 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.758862 - () https://vuldb.com/?submit.758862 - Third Party Advisory, VDB Entry
First Time Libvips libvips
Libvips
CPE cpe:2.3:a:libvips:libvips:8.19.0:*:*:*:*:*:*:*

27 Feb 2026, 14:06

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una falla en libvips 8.19.0. Esta vulnerabilidad afecta a la función vips_unpremultiply_build del archivo libvips/conversion/unpremultiply.c. La ejecución de una manipulación del argumento alpha_band puede llevar a una lectura fuera de límites. El ataque debe ser lanzado localmente. El exploit ha sido publicado y puede ser usado. Este parche se llama 7215ead1e0cd7d3703cc4f5fca06d7d0f4c22b91. Se debe aplicar un parche para remediar este problema.

27 Feb 2026, 03:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-27 03:16

Updated : 2026-03-02 17:58


NVD link : CVE-2026-3282

Mitre link : CVE-2026-3282

CVE.ORG link : CVE-2026-3282


JSON object : View

Products Affected

libvips

  • libvips
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-125

Out-of-bounds Read