Source: vips
Version: 8.18.0-2
Severity: important
Tags: security upstream
Forwarded: https://github.com/libvips/libvips/issues/4878
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for vips.

CVE-2026-3281[0]:
| A vulnerability was detected in libvips 8.19.0. This affects the
| function vips_bandrank_build of the file
| libvips/conversion/bandrank.c. Performing a manipulation of the
| argument index results in heap-based buffer overflow. The attack
| must be initiated from a local position. The exploit is now public
| and may be used. The patch is named
| fd28c5463697712cb0ab116a2c55e4f4d92c4088. It is suggested to install
| a patch to address this issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-3281
    https://www.cve.org/CVERecord?id=CVE-2026-3281
[1] https://github.com/libvips/libvips/issues/4878
[2] https://github.com/libvips/libvips/pull/4895
[3] 
https://github.com/libvips/libvips/commit/fd28c5463697712cb0ab116a2c55e4f4d92c4088

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to