Description
A flaw has been found in libvips 8.19.0. This vulnerability affects the function vips_unpremultiply_build of the file libvips/conversion/unpremultiply.c. Executing a manipulation of the argument alpha_band can lead to out-of-bounds read. The attack needs to be launched locally. The exploit has been published and may be used. This patch is called 7215ead1e0cd7d3703cc4f5fca06d7d0f4c22b91. A patch should be applied to remediate this issue.
Published: 2026-02-27
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Potential local information disclosure via out‑of‑bounds read
Action: Apply patch
AI Analysis

Impact

A flaw in libvips 8.19.0 allows manipulation of the alpha_band argument in the vips_unpremultiply_build function to cause an out‑of‑bounds read. The vulnerability is limited to local execution and could expose arbitrary memory contents to the attacker, creating a potential information disclosure. The weakness is a classic out‑of‑bounds read (CWE‑125) that can be triggered by crafted input to the conversion routine.

Affected Systems

The issue is found in libvips version 8.19.0, the distribution currently in use. No other versions are reported as affected, and earlier releases are not known to contain this specific bug.

Risk and Exploitability

The CVSS score of 4.8 places the vulnerability in a low‑to‑medium severity range. The EPSS score indicates a exploitation probability of less than 1%, and the vulnerability is not listed in the CISA KEV catalog. Because the exploit requires local execution and the attack surface is limited to processes with access to the vulnerable library, the overall risk to remote adversaries is low, but internal users or compromised local processes can leverage the flaw for data leakage.

Generated by OpenCVE AI on April 16, 2026 at 15:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch identified by commit 7215ead1e0cd7d3703cc4f5fca06d7d0f4c22b91 to libvips 8.19.0.
  • Upgrade to a newer libvips release that incorporates the patch, such as 8.19.1 or later.
  • If an immediate upgrade is not possible, limit local execution of the affected library by enforcing strict process isolation or disabling the conversion feature in applications that use libvips.

Generated by OpenCVE AI on April 16, 2026 at 15:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:libvips:libvips:8.19.0:*:*:*:*:*:*:*

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 03:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in libvips 8.19.0. This vulnerability affects the function vips_unpremultiply_build of the file libvips/conversion/unpremultiply.c. Executing a manipulation of the argument alpha_band can lead to out-of-bounds read. The attack needs to be launched locally. The exploit has been published and may be used. This patch is called 7215ead1e0cd7d3703cc4f5fca06d7d0f4c22b91. A patch should be applied to remediate this issue.
Title libvips unpremultiply.c vips_unpremultiply_build out-of-bounds
First Time appeared Libvips
Libvips libvips
Weaknesses CWE-119
CWE-125
CPEs cpe:2.3:a:libvips:libvips:*:*:*:*:*:*:*:*
Vendors & Products Libvips
Libvips libvips
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-27T18:55:47.355Z

Reserved: 2026-02-26T16:33:03.817Z

Link: CVE-2026-3282

cve-icon Vulnrichment

Updated: 2026-02-27T18:55:42.672Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T03:16:02.713

Modified: 2026-03-02T17:58:30.950

Link: CVE-2026-3282

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T15:45:16Z

Weaknesses