A vulnerability was detected in libvips 8.19.0. This affects the function vipsbandrankbuild of the file libvips/conversion/bandrank.c. Performing a manipulation of the argument index results in heap-based buffer overflow. The attack must be initiated from a local position. The exploit is now public and may be used. The patch is named fd28c5463697712cb0ab116a2c55e4f4d92c4088. It is suggested to install a patch to address this issue.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-3281.json"
[
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "64737474583627862420267642810450278",
"length": 819.0
},
"source": "https://github.com/libvips/libvips/commit/fd28c5463697712cb0ab116a2c55e4f4d92c4088",
"signature_type": "Function",
"id": "CVE-2026-3281-d055aac2",
"target": {
"file": "libvips/conversion/bandrank.c",
"function": "vips_bandrank_build"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"269942529069610671195324525812446997803",
"10702238698644525995171409682350402141",
"25405986217839980413399567908813300936",
"300714864125365666452886631192331693202"
]
},
"source": "https://github.com/libvips/libvips/commit/fd28c5463697712cb0ab116a2c55e4f4d92c4088",
"signature_type": "Line",
"id": "CVE-2026-3281-e3939894",
"target": {
"file": "libvips/conversion/bandrank.c"
}
}
]