| Title | libvips 8.19.0(7fab325d2) Integer Overflow or Wraparound |
|---|
| Description | In `libvips/conversion/extract.c`, function `vips_extract_area_build()` uses signed additions (`left + width`, `top + height`) in bounds checks. Large attacker-controlled coordinates can overflow and bypass validation. `vips_extract_area_gen()` propagates these unchecked offsets into region copy preparation, reaching invalid `memcpy` paths via `vips_region_copy`. The issue is reachable through normal `vips extract_area` CLI usage (with `--vips-max-coord` set high) and is reproducible with ASAN as `SEGV`. |
|---|
| Source | ⚠️ https://github.com/libvips/libvips/issues/4879 |
|---|
| User | Niebelungen (UID 95430) |
|---|
| Submission | 02/15/2026 04:03 PM (2 months ago) |
|---|
| Moderation | 02/26/2026 05:33 PM (11 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 348013 [libvips 8.19.0 extract.c vips_extract_area_build extract_area integer overflow] |
|---|
| Points | 20 |
|---|