DEBIAN-CVE-2026-3950

Source
https://security-tracker.debian.org/tracker/CVE-2026-3950
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3950.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-3950
Upstream
Published
2026-03-11T20:16:22.567Z
Modified
2026-03-15T21:02:40.085958Z
Severity
  • 3.3 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.

References

Affected packages

Debian:14 / libheif

Package

Name
libheif
Purl
pkg:deb/debian/libheif?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.19.8-1
1.20.1-1
1.20.2-1
1.20.2-2
1.21.2-1
1.21.2-2
1.21.2-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3950.json"