Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-3950

Опубликовано: 11 мар. 2026
Источник: debian
EPSS Низкий

Описание

A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libheifunfixedpackage
libheifnot-affectedtrixiepackage
libheifnot-affectedbookwormpackage
libheifnot-affectedbullseyepackage

Примечания

  • Introduced after: https://github.com/strukturag/libheif/commit/16e205f12bfe9a3717ca1d3b447fa83f66bc87e9 (v1.20.0)

  • https://github.com/strukturag/libheif/issues/1715

  • Fixed by: https://github.com/strukturag/libheif/pull/1721

EPSS

Процентиль: 3%
0.00014
Низкий

Связанные уязвимости

CVSS3: 3.3
ubuntu
14 дней назад

A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.

CVSS3: 3.3
redhat
14 дней назад

A flaw was found in libheif. A local attacker could exploit an out-of-bounds read vulnerability in the `Track::load` function within the `stsz/stts` component. This manipulation could lead to a Denial of Service (DoS), making the affected system or application unavailable.

CVSS3: 3.3
nvd
14 дней назад

A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.

CVSS3: 3.3
github
14 дней назад

A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.

EPSS

Процентиль: 3%
0.00014
Низкий