A vulnerability was detected in libvips 8.19.0. This affects the function vips_bandrank_build of the file libvips/conversion/bandrank.c. Performing a manipulation of the argument index results in heap-based buffer overflow. The attack must be initiated from a local position. The exploit is now public and may be used. The patch is named fd28c5463697712cb0ab116a2c55e4f4d92c4088. It is suggested to install a patch to address this issue.
References
| Link | Resource |
|---|---|
| https://github.com/libvips/libvips/ | Product |
| https://github.com/libvips/libvips/commit/fd28c5463697712cb0ab116a2c55e4f4d92c4088 | Patch |
| https://github.com/libvips/libvips/issues/4878 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/libvips/libvips/issues/4878#issue-3944209102 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/libvips/libvips/pull/4895 | Issue Tracking Patch |
| https://vuldb.com/?ctiid.348010 | Permissions Required VDB Entry |
| https://vuldb.com/?id.348010 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.758861 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-02-27 02:16
Updated : 2026-03-02 17:59
NVD link : CVE-2026-3281
Mitre link : CVE-2026-3281
CVE.ORG link : CVE-2026-3281
JSON object : View
Products Affected
libvips
- libvips
