DEBIAN-CVE-2026-3281

Source
https://security-tracker.debian.org/tracker/CVE-2026-3281
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3281.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-3281
Upstream
Published
2026-02-27T02:16:20.963Z
Modified
2026-03-06T05:01:07.991126Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was detected in libvips 8.19.0. This affects the function vipsbandrankbuild of the file libvips/conversion/bandrank.c. Performing a manipulation of the argument index results in heap-based buffer overflow. The attack must be initiated from a local position. The exploit is now public and may be used. The patch is named fd28c5463697712cb0ab116a2c55e4f4d92c4088. It is suggested to install a patch to address this issue.

References

Affected packages

Debian:11 / vips

Package

Name
vips
Purl
pkg:deb/debian/vips?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*
8.10.5-2
8.10.5-2+deb11u1
8.11.4-1
8.11.4-2
8.12.1-1
8.12.2-1
8.13.0-1
8.13.1-1
8.13.2-1
8.13.3-1
8.13.3-2
8.14.1-1
8.14.1-2
8.14.1-3
8.14.2-1
8.14.3-1
8.14.4-1
8.14.5-1
8.15.0~rc2-1
8.15.0~rc2-2
8.15.0-1
8.15.0-2
8.15.1-1
8.15.1-1.1~exp1
8.15.1-1.1
8.15.2-1
8.15.2-2
8.15.3-1
8.16.0-1
8.16.0-2
8.16.1-1
8.16.1-2
8.17.3-1
8.17.3-2
8.18.0-1
8.18.0-2
8.18.0-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3281.json"

Debian:12 / vips

Package

Name
vips
Purl
pkg:deb/debian/vips?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*
8.14.1-3
8.14.1-3+deb12u1
8.14.1-3+deb12u2
8.14.2-1
8.14.3-1
8.14.4-1
8.14.5-1
8.15.0~rc2-1
8.15.0~rc2-2
8.15.0-1
8.15.0-2
8.15.1-1
8.15.1-1.1~exp1
8.15.1-1.1
8.15.2-1
8.15.2-2
8.15.3-1
8.16.0-1
8.16.0-2
8.16.1-1
8.16.1-2
8.17.3-1
8.17.3-2
8.18.0-1
8.18.0-2
8.18.0-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3281.json"

Debian:13 / vips

Package

Name
vips
Purl
pkg:deb/debian/vips?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*
8.16.1-1
8.16.1-2
8.17.3-1
8.17.3-2
8.18.0-1
8.18.0-2
8.18.0-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3281.json"

Debian:14 / vips

Package

Name
vips
Purl
pkg:deb/debian/vips?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.18.0-3

Affected versions

8.*
8.16.1-1
8.16.1-2
8.17.3-1
8.17.3-2
8.18.0-1
8.18.0-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3281.json"