Source: libheif
Version: 1.21.2-3
Severity: important
Tags: security upstream
Forwarded: https://github.com/strukturag/libheif/issues/1715
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for libheif.

CVE-2026-3950[0]:
| A vulnerability was identified in strukturag libheif up to 1.21.2.
| This impacts the function Track::load of the file
| libheif/sequences/track.cc of the component stsz/stts. The
| manipulation leads to out-of-bounds read. The attack needs to be
| performed locally. The exploit is publicly available and might be
| used. Applying a patch is the recommended action to fix this issue.
| The patch available is inofficial and not approved yet.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-3950
    https://www.cve.org/CVERecord?id=CVE-2026-3950
[1] https://github.com/strukturag/libheif/issues/1715

Rgards,
Salvatore

Reply via email to