DEBIAN-CVE-2026-3949

Source
https://security-tracker.debian.org/tracker/CVE-2026-3949
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3949.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-3949
Upstream
Published
2026-03-11T19:16:05.297Z
Modified
2026-03-13T21:03:32.314376Z
Severity
  • 3.3 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

A vulnerability was determined in strukturag libheif up to 1.21.2. This affects the function vvdecpushdata2 of the file libheif/plugins/decoder_vvdec.cc of the component HEIF File Parser. Executing a manipulation of the argument size can lead to out-of-bounds read. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. This patch is called b97c8b5f198b27f375127cd597a35f2113544d03. It is advisable to implement a patch to correct this issue.

References

Affected packages

Debian:11 / libheif

Package

Name
libheif
Purl
pkg:deb/debian/libheif?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.11.0-1
1.11.0-1+deb11u1
1.11.0-1+deb11u2
1.12.0-1
1.12.0-2
1.13.0-1
1.14.2-1
1.15.1-1
1.16.2-1
1.16.2-2
1.16.2-3
1.17.0-1
1.17.1-1
1.17.4-1
1.17.6-1
1.17.6-2
1.17.6-3
1.17.6-4
1.18.1-1
1.18.1-2
1.18.2-1
1.18.2-2
1.19.1-1~bpo12+1
1.19.1-1~bpo12+2
1.19.1-1
1.19.3-1~bpo12+1
1.19.3-1
1.19.5-1
1.19.7-1~bpo12+1
1.19.7-1
1.19.8-1
1.20.1-1
1.20.2-1
1.20.2-2
1.21.2-1
1.21.2-2
1.21.2-3

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3949.json"

Debian:12 / libheif

Package

Name
libheif
Purl
pkg:deb/debian/libheif?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.15.1-1
1.15.1-1+deb12u1
1.16.2-1
1.16.2-2
1.16.2-3
1.17.0-1
1.17.1-1
1.17.4-1
1.17.6-1
1.17.6-2
1.17.6-3
1.17.6-4
1.18.1-1
1.18.1-2
1.18.2-1
1.18.2-2
1.19.1-1~bpo12+1
1.19.1-1~bpo12+2
1.19.1-1
1.19.3-1~bpo12+1
1.19.3-1
1.19.5-1
1.19.7-1~bpo12+1
1.19.7-1
1.19.8-1
1.20.1-1
1.20.2-1
1.20.2-2
1.21.2-1
1.21.2-2
1.21.2-3

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3949.json"

Debian:13 / libheif

Package

Name
libheif
Purl
pkg:deb/debian/libheif?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.19.8-1
1.20.1-1
1.20.2-1
1.20.2-2
1.21.2-1
1.21.2-2
1.21.2-3

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3949.json"

Debian:14 / libheif

Package

Name
libheif
Purl
pkg:deb/debian/libheif?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.19.8-1
1.20.1-1
1.20.2-1
1.20.2-2
1.21.2-1
1.21.2-2
1.21.2-3

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3949.json"