CVE-2026-3950

NameCVE-2026-3950
DescriptionA vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1130640

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libheif (PTS)bullseye1.11.0-1fixed
bullseye (security)1.11.0-1+deb11u2fixed
bookworm, bookworm (security)1.15.1-1+deb12u1fixed
trixie1.19.8-1fixed
forky, sid1.21.2-3vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libheifsourcebullseye(not affected)
libheifsourcebookworm(not affected)
libheifsourcetrixie(not affected)
libheifsource(unstable)(unfixed)1130640

Notes

[trixie] - libheif <not-affected> (Vulnerable code not present)
[bookworm] - libheif <not-affected> (Vulnerable code not present)
[bullseye] - libheif <not-affected> (Vulnerable code not present)
Introduced after: https://github.com/strukturag/libheif/commit/16e205f12bfe9a3717ca1d3b447fa83f66bc87e9 (v1.20.0)
https://github.com/strukturag/libheif/issues/1715
Fixed by: https://github.com/strukturag/libheif/pull/1721

Search for package or bug name: Reporting problems