Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-3950

Опубликовано: 11 мар. 2026
Источник: redhat
CVSS3: 3.3
EPSS Низкий

Описание

A flaw was found in libheif. A local attacker could exploit an out-of-bounds read vulnerability in the Track::load function within the stsz/stts component. This manipulation could lead to a Denial of Service (DoS), making the affected system or application unavailable.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10glycin-loadersNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=2446751libheif: libheif: Denial of Service via out-of-bounds read in Track::load function

EPSS

Процентиль: 3%
0.00014
Низкий

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 3.3
ubuntu
14 дней назад

A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.

CVSS3: 3.3
nvd
14 дней назад

A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.

CVSS3: 3.3
debian
14 дней назад

A vulnerability was identified in strukturag libheif up to 1.21.2. Thi ...

CVSS3: 3.3
github
14 дней назад

A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.

EPSS

Процентиль: 3%
0.00014
Низкий

3.3 Low

CVSS3