Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2026-3950

Опубликовано: 11 мар. 2026
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 1.7
CVSS3: 3.3

Описание

A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.

РелизСтатусПримечание
devel

deferred

2026-03-12
esm-apps/bionic

deferred

2026-03-12
esm-apps/focal

deferred

2026-03-12
esm-apps/jammy

deferred

2026-03-12
jammy

deferred

2026-03-12
noble

deferred

2026-03-12
questing

deferred

2026-03-12
upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 3%
0.00014
Низкий

1.7 Low

CVSS2

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 3.3
redhat
14 дней назад

A flaw was found in libheif. A local attacker could exploit an out-of-bounds read vulnerability in the `Track::load` function within the `stsz/stts` component. This manipulation could lead to a Denial of Service (DoS), making the affected system or application unavailable.

CVSS3: 3.3
nvd
14 дней назад

A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.

CVSS3: 3.3
debian
14 дней назад

A vulnerability was identified in strukturag libheif up to 1.21.2. Thi ...

CVSS3: 3.3
github
14 дней назад

A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.

EPSS

Процентиль: 3%
0.00014
Низкий

1.7 Low

CVSS2

3.3 Low

CVSS3