CVE-2026-3949Improper Restriction of Operations within the Bounds of a Memory Buffer in Libheif

Severity
4.8MEDIUMNVD
EPSS
0.0%
top 96.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 11

Description

A vulnerability was determined in strukturag libheif up to 1.21.2. This affects the function vvdec_push_data2 of the file libheif/plugins/decoder_vvdec.cc of the component HEIF File Parser. Executing a manipulation of the argument size can lead to out-of-bounds read. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. This patch is called b97c8b5f198b27f375127cd597a35f2113544d03. It is advisable to implement a patch to correct this issue.

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5strukturag/libheif1.21.0, 1.21.1, 1.21.2+2

🔴Vulnerability Details

2
OSV
CVE-2026-3949: A vulnerability was determined in strukturag libheif up to 12026-03-11
GHSA
GHSA-2rvx-jpm5-g848: A vulnerability was determined in strukturag libheif up to 12026-03-11

📋Vendor Advisories

2
Red Hat
libheif: libheif: Out-of-bounds read via local argument manipulation2026-03-11
Debian
CVE-2026-3949: libheif - A vulnerability was determined in strukturag libheif up to 1.21.2. This affects ...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-3949 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-3949 — Strukturag Libheif vulnerability | cvebase