CVE-2026-3950

Source
https://cve.org/CVERecord?id=CVE-2026-3950
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-3950.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-3950
Downstream
Published
2026-03-11T20:16:22.567Z
Modified
2026-03-15T22:46:52.096860Z
Severity
  • 3.3 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-3950.json"