Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-3147

Опубликовано: 25 фев. 2026
Источник: debian
EPSS Низкий

Описание

A vulnerability was found in libvips up to 8.18.0. This affects the function vips_foreign_load_csv_build of the file libvips/foreign/csvload.c. The manipulation results in heap-based buffer overflow. The attack requires a local approach. The exploit has been made public and could be used. The patch is identified as b3ab458a25e0e261cbd1788474bbc763f7435780. It is advisable to implement a patch to correct this issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
vipsfixed8.18.0-3package

Примечания

  • https://github.com/libvips/libvips/issues/4874

  • https://github.com/libvips/libvips/pull/4894

  • Fixed by: https://github.com/libvips/libvips/commit/b3ab458a25e0e261cbd1788474bbc763f7435780

EPSS

Процентиль: 5%
0.0002
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 1 месяца назад

A vulnerability was found in libvips up to 8.18.0. This affects the function vips_foreign_load_csv_build of the file libvips/foreign/csvload.c. The manipulation results in heap-based buffer overflow. The attack requires a local approach. The exploit has been made public and could be used. The patch is identified as b3ab458a25e0e261cbd1788474bbc763f7435780. It is advisable to implement a patch to correct this issue.

CVSS3: 5.3
nvd
около 1 месяца назад

A vulnerability was found in libvips up to 8.18.0. This affects the function vips_foreign_load_csv_build of the file libvips/foreign/csvload.c. The manipulation results in heap-based buffer overflow. The attack requires a local approach. The exploit has been made public and could be used. The patch is identified as b3ab458a25e0e261cbd1788474bbc763f7435780. It is advisable to implement a patch to correct this issue.

CVSS3: 5.3
github
около 1 месяца назад

A vulnerability was found in libvips up to 8.18.0. This affects the function vips_foreign_load_csv_build of the file libvips/foreign/csvload.c. The manipulation results in heap-based buffer overflow. The attack requires a local approach. The exploit has been made public and could be used. The patch is identified as b3ab458a25e0e261cbd1788474bbc763f7435780. It is advisable to implement a patch to correct this issue.

EPSS

Процентиль: 5%
0.0002
Низкий