A vulnerability was found in libvips 8.19.0. Impacted is the function vips_extract_area_build of the file libvips/conversion/extract.c. The manipulation of the argument extract_area results in integer overflow. The attack requires a local approach. The exploit has been made public and could be used. The patch is identified as 24795bb3d19d84f7b6f5ed86451ad556c8f2fe70. It is advisable to implement a patch to correct this issue.
Use CWE-189, Libvips vendor hub and Libvips product page to widen CVE-2026-3284 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-29769, CVE-2021-27847 and CVE-2023-40032 for nearby disclosures in the same product family.