Debian Package Tracker
Register | Log in
Subscribe

libheif

Choose email to subscribe with

general
  • source: libheif (main)
  • version: 1.21.2-3
  • maintainer: Debian Multimedia Maintainers (archive) (DMD)
  • uploaders: Joachim Bauch [DMD]
  • arch: any
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.11.0-1
  • o-o-sec: 1.11.0-1+deb11u2
  • oldstable: 1.15.1-1+deb12u1
  • old-sec: 1.15.1-1+deb12u1
  • old-bpo: 1.19.7-1~bpo12+1
  • stable: 1.19.8-1
  • testing: 1.21.2-3
  • unstable: 1.21.2-3
versioned links
  • 1.11.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.11.0-1+deb11u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.15.1-1+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.19.7-1~bpo12+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.19.8-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.20.2-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.21.2-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • heif-gdk-pixbuf (1 bugs: 0, 1, 0, 0)
  • heif-thumbnailer
  • heif-view
  • libheif-dev
  • libheif-examples
  • libheif-plugin-aomdec
  • libheif-plugin-aomenc
  • libheif-plugin-dav1d
  • libheif-plugin-ffmpegdec
  • libheif-plugin-j2kdec
  • libheif-plugin-j2kenc
  • libheif-plugin-jpegdec
  • libheif-plugin-jpegenc
  • libheif-plugin-kvazaar
  • libheif-plugin-libde265
  • libheif-plugin-rav1e
  • libheif-plugin-svtenc
  • libheif-plugin-x265
  • libheif-plugins-all
  • libheif1 (2 bugs: 0, 1, 1, 0)
action needed
3 security issues in trixie high

There are 3 open security issues in trixie.

2 important issues:
  • CVE-2026-3949: A vulnerability was determined in strukturag libheif up to 1.21.2. This affects the function vvdec_push_data2 of the file libheif/plugins/decoder_vvdec.cc of the component HEIF File Parser. Executing a manipulation of the argument size can lead to out-of-bounds read. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. This patch is called b97c8b5f198b27f375127cd597a35f2113544d03. It is advisable to implement a patch to correct this issue.
  • CVE-2026-3950: A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.
1 issue left for the package maintainer to handle:
  • CVE-2025-68431: (needs triaging) libheif is an HEIF and AVIF file format decoder and encoder. Prior to version 1.21.0, a crafted HEIF that exercises the overlay image item path triggers a heap buffer over-read in `HeifPixelImage::overlay()`. The function computes a negative row length (likely from an unclipped overlay rectangle or invalid offsets), which then underflows when converted to `size_t` and is passed to `memcpy`, causing a very large read past the end of the source plane and a crash. Version 1.21.0 contains a patch. As a workaround, avoid decoding images using `iovl` overlay boxes.

You can find information about how to handle this issue in the security team's documentation.

Created: 2025-12-29 Last update: 2026-03-12 20:02
3 security issues in bookworm high

There are 3 open security issues in bookworm.

2 important issues:
  • CVE-2026-3949: A vulnerability was determined in strukturag libheif up to 1.21.2. This affects the function vvdec_push_data2 of the file libheif/plugins/decoder_vvdec.cc of the component HEIF File Parser. Executing a manipulation of the argument size can lead to out-of-bounds read. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. This patch is called b97c8b5f198b27f375127cd597a35f2113544d03. It is advisable to implement a patch to correct this issue.
  • CVE-2026-3950: A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.
1 issue left for the package maintainer to handle:
  • CVE-2025-68431: (needs triaging) libheif is an HEIF and AVIF file format decoder and encoder. Prior to version 1.21.0, a crafted HEIF that exercises the overlay image item path triggers a heap buffer over-read in `HeifPixelImage::overlay()`. The function computes a negative row length (likely from an unclipped overlay rectangle or invalid offsets), which then underflows when converted to `size_t` and is passed to `memcpy`, causing a very large read past the end of the source plane and a crash. Version 1.21.0 contains a patch. As a workaround, avoid decoding images using `iovl` overlay boxes.

You can find information about how to handle this issue in the security team's documentation.

Created: 2025-12-29 Last update: 2026-03-12 20:02
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2026-3949: A vulnerability was determined in strukturag libheif up to 1.21.2. This affects the function vvdec_push_data2 of the file libheif/plugins/decoder_vvdec.cc of the component HEIF File Parser. Executing a manipulation of the argument size can lead to out-of-bounds read. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. This patch is called b97c8b5f198b27f375127cd597a35f2113544d03. It is advisable to implement a patch to correct this issue.
  • CVE-2026-3950: A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.
Created: 2026-03-12 Last update: 2026-03-12 20:02
2 security issues in forky high

There are 2 open security issues in forky.

2 important issues:
  • CVE-2026-3949: A vulnerability was determined in strukturag libheif up to 1.21.2. This affects the function vvdec_push_data2 of the file libheif/plugins/decoder_vvdec.cc of the component HEIF File Parser. Executing a manipulation of the argument size can lead to out-of-bounds read. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. This patch is called b97c8b5f198b27f375127cd597a35f2113544d03. It is advisable to implement a patch to correct this issue.
  • CVE-2026-3950: A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.
Created: 2026-03-12 Last update: 2026-03-12 20:02
3 security issues in bullseye high

There are 3 open security issues in bullseye.

2 important issues:
  • CVE-2026-3949: A vulnerability was determined in strukturag libheif up to 1.21.2. This affects the function vvdec_push_data2 of the file libheif/plugins/decoder_vvdec.cc of the component HEIF File Parser. Executing a manipulation of the argument size can lead to out-of-bounds read. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. This patch is called b97c8b5f198b27f375127cd597a35f2113544d03. It is advisable to implement a patch to correct this issue.
  • CVE-2026-3950: A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet.
1 issue postponed or untriaged:
  • CVE-2025-68431: (postponed; to be fixed through a stable update) libheif is an HEIF and AVIF file format decoder and encoder. Prior to version 1.21.0, a crafted HEIF that exercises the overlay image item path triggers a heap buffer over-read in `HeifPixelImage::overlay()`. The function computes a negative row length (likely from an unclipped overlay rectangle or invalid offsets), which then underflows when converted to `size_t` and is passed to `memcpy`, causing a very large read past the end of the source plane and a crash. Version 1.21.0 contains a patch. As a workaround, avoid decoding images using `iovl` overlay boxes.
Created: 2026-03-12 Last update: 2026-03-12 20:02
lintian reports 1 error and 1 warning high
Lintian reports 1 error and 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2026-02-08 Last update: 2026-02-08 05:30
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2026-03-10 Last update: 2026-03-13 14:30
Does not build reproducibly during testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2026-02-24 Last update: 2026-03-13 14:00
testing migrations
  • This package will soon be part of the auto-svt-av1 transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
news
[rss feed]
  • [2026-02-24] libheif 1.21.2-3 MIGRATED to testing (Debian testing watch)
  • [2026-02-22] Accepted libheif 1.21.2-3 (source) into unstable (Charles) (signed by: Jeremy Bícha)
  • [2026-02-11] libheif 1.21.2-2 MIGRATED to testing (Debian testing watch)
  • [2026-02-07] Accepted libheif 1.21.2-2 (source) into unstable (Jeremy Bícha)
  • [2026-01-22] libheif 1.21.2-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-19] Accepted libheif 1.21.2-1 (source) into unstable (Joachim Bauch)
  • [2025-08-21] libheif 1.20.2-2 MIGRATED to testing (Debian testing watch)
  • [2025-08-18] Accepted libheif 1.20.2-2 (source) into unstable (Joachim Bauch)
  • [2025-08-05] Accepted libheif 1.20.2-1 (source) into experimental (Joachim Bauch)
  • [2025-07-29] Accepted libheif 1.20.1-1 (source amd64) into experimental (Debian FTP Masters) (signed by: Joachim Bauch)
  • [2025-05-09] libheif 1.19.8-1 MIGRATED to testing (Debian testing watch)
  • [2025-04-29] Accepted libheif 1.19.8-1 (source) into unstable (Joachim Bauch)
  • [2025-03-24] Accepted libheif 1.19.7-1~bpo12+1 (source) into stable-backports (Joachim Bauch)
  • [2025-03-14] libheif 1.19.7-1 MIGRATED to testing (Debian testing watch)
  • [2025-03-10] Accepted libheif 1.19.7-1 (source) into unstable (Joachim Bauch)
  • [2025-01-10] libheif 1.19.5-1 MIGRATED to testing (Debian testing watch)
  • [2025-01-07] Accepted libheif 1.19.5-1 (source) into unstable (Joachim Bauch)
  • [2024-11-16] Accepted libheif 1.19.3-1~bpo12+1 (source) into stable-backports (Joachim Bauch)
  • [2024-11-14] libheif 1.19.3-1 MIGRATED to testing (Debian testing watch)
  • [2024-11-13] Accepted libheif 1.19.1-1~bpo12+2 (source amd64) into stable-backports (Debian FTP Masters) (signed by: Joachim Bauch)
  • [2024-11-13] Accepted libheif 1.19.1-1~bpo12+1 (source amd64) into stable-backports (Debian FTP Masters) (signed by: Joachim Bauch)
  • [2024-11-11] Accepted libheif 1.19.3-1 (source) into unstable (Joachim Bauch)
  • [2024-11-06] libheif 1.19.1-1 MIGRATED to testing (Debian testing watch)
  • [2024-11-05] Accepted libheif 1.11.0-1+deb11u2 (source) into oldstable-security (Chris Lamb)
  • [2024-11-04] Accepted libheif 1.19.1-1 (source) into unstable (Joachim Bauch)
  • [2024-10-26] Accepted libheif 1.15.1-1+deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2024-10-25] Accepted libheif 1.15.1-1+deb12u1 (source) into stable-security (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2024-10-22] Accepted libheif 1.11.0-1+deb11u1 (source) into oldstable-security (Chris Lamb)
  • [2024-09-30] libheif 1.18.2-2 MIGRATED to testing (Debian testing watch)
  • [2024-09-26] Accepted libheif 1.18.2-2 (source) into unstable (Joachim Bauch)
  • 1
  • 2
bugs [bug history graph]
  • all: 3
  • RC: 0
  • I&N: 2
  • M&W: 1
  • F&P: 0
  • patch: 1
links
  • homepage
  • lintian (1, 1)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.21.2-3
  • 2 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing