Submit #758864: libvips 8.19.0(7fab325d2) Integer Overflow or Wraparoundinfo

Titlelibvips 8.19.0(7fab325d2) Integer Overflow or Wraparound
DescriptionIn `libvips/conversion/extract.c`, function `vips_extract_area_build()` uses signed additions (`left + width`, `top + height`) in bounds checks. Large attacker-controlled coordinates can overflow and bypass validation. `vips_extract_area_gen()` propagates these unchecked offsets into region copy preparation, reaching invalid `memcpy` paths via `vips_region_copy`. The issue is reachable through normal `vips extract_area` CLI usage (with `--vips-max-coord` set high) and is reproducible with ASAN as `SEGV`.
Source⚠️ https://github.com/libvips/libvips/issues/4879
User
 Niebelungen (UID 95430)
Submission02/15/2026 04:03 PM (2 months ago)
Moderation02/26/2026 05:33 PM (11 days later)
StatusAccepted
VulDB entry348013 [libvips 8.19.0 extract.c vips_extract_area_build extract_area integer overflow]
Points20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!