CVE-2026-3281

A vulnerability was detected in libvips 8.19.0. This affects the function vips_bandrank_build of the file libvips/conversion/bandrank.c. Performing a manipulation of the argument index results in heap-based buffer overflow. The attack must be initiated from a local position. The exploit is now public and may be used. The patch is named fd28c5463697712cb0ab116a2c55e4f4d92c4088. It is suggested to install a patch to address this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:libvips:libvips:8.19.0:*:*:*:*:*:*:*

History

02 Mar 2026, 17:59

Type Values Removed Values Added
References () https://github.com/libvips/libvips/ - () https://github.com/libvips/libvips/ - Product
References () https://github.com/libvips/libvips/commit/fd28c5463697712cb0ab116a2c55e4f4d92c4088 - () https://github.com/libvips/libvips/commit/fd28c5463697712cb0ab116a2c55e4f4d92c4088 - Patch
References () https://github.com/libvips/libvips/issues/4878 - () https://github.com/libvips/libvips/issues/4878 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/libvips/libvips/issues/4878#issue-3944209102 - () https://github.com/libvips/libvips/issues/4878#issue-3944209102 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/libvips/libvips/pull/4895 - () https://github.com/libvips/libvips/pull/4895 - Issue Tracking, Patch
References () https://vuldb.com/?ctiid.348010 - () https://vuldb.com/?ctiid.348010 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.348010 - () https://vuldb.com/?id.348010 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.758861 - () https://vuldb.com/?submit.758861 - Third Party Advisory, VDB Entry
First Time Libvips libvips
Libvips
CPE cpe:2.3:a:libvips:libvips:8.19.0:*:*:*:*:*:*:*

27 Feb 2026, 14:06

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad fue detectada en libvips 8.19.0. Esto afecta la función vips_bandrank_build del archivo libvips/conversion/bandrank.c. Realizar una manipulación del argumento index resulta en desbordamiento de búfer basado en montículo. El ataque debe ser iniciado desde una posición local. El exploit ahora es público y puede ser usado. El parche se llama fd28c5463697712cb0ab116a2c55e4f4d92c4088. Se sugiere instalar un parche para abordar este problema.

27 Feb 2026, 02:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-27 02:16

Updated : 2026-03-02 17:59


NVD link : CVE-2026-3281

Mitre link : CVE-2026-3281

CVE.ORG link : CVE-2026-3281


JSON object : View

Products Affected

libvips

  • libvips
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-122

Heap-based Buffer Overflow