
CVE-2023-43281
https://notcve.org/view.php?id=CVE-2023-43281
24 Oct 2023 — Double Free vulnerability in Nothings Stb Image.h v.2.28 allows a remote attacker to cause a denial of service via a crafted file to the stbi_load_gif_main function. Vulnerabilidad de Double Free en Nothings Stb Image.h v.2.28 permite a un atacante remoto provocar una Denegación de Servicio (DoS) a través de un archivo manipulado en la función stbi_load_gif_main. • https://gist.github.com/peccc/d8761f6ac45ad55cbd194dd7e6fdfdac • CWE-415: Double Free •

CVE-2023-45667 – Null pointer dereference because of an uninitialized variable in stb_image
https://notcve.org/view.php?id=CVE-2023-45667
20 Oct 2023 — stb_image is a single file MIT licensed library for processing images. If `stbi__load_gif_main` in `stbi_load_gif_from_memory` fails it returns a null pointer and may keep the `z` variable uninitialized. In case the caller also sets the flip vertically flag, it continues and calls `stbi__vertical_flip_slices` with the null pointer result value and the uninitialized `z` value. This may result in a program crash. stb_image es una librería con licencia MIT de un solo archivo para procesar imágenes. Si falla `s... • https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L1442-L1454 • CWE-476: NULL Pointer Dereference •

CVE-2023-45666 – Possible double-free or memory leak in stbi__load_gif_main in stb_image
https://notcve.org/view.php?id=CVE-2023-45666
20 Oct 2023 — stb_image is a single file MIT licensed library for processing images. It may look like `stbi__load_gif_main` doesn’t give guarantees about the content of output value `*delays` upon failure. Although it sets `*delays` to zero at the beginning, it doesn’t do it in case the image is not recognized as GIF and a call to `stbi__load_gif_main_outofmem` only frees possibly allocated memory in `*delays` without resetting it to zero. Thus it would be fair to say the caller of `stbi__load_gif_main` is responsible to... • https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L6957 • CWE-415: Double Free •

CVE-2023-45664 – Double-free in stbi__load_gif_main_outofmem in stb_image
https://notcve.org/view.php?id=CVE-2023-45664
20 Oct 2023 — stb_image is a single file MIT licensed library for processing images. A crafted image file can trigger `stbi__load_gif_main_outofmem` attempt to double-free the out variable. This happens in `stbi__load_gif_main` because when the `layers * stride` value is zero the behavior is implementation defined, but common that realloc frees the old memory and returns null pointer. Since it attempts to double-free the memory a few lines below the first “free”, the issue can be potentially exploited only in a multi-thr... • https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L6993-L6995 • CWE-415: Double Free •

CVE-2023-45663 – Disclosure of uninitialized memory in stbi__tga_load in stb_image
https://notcve.org/view.php?id=CVE-2023-45663
20 Oct 2023 — stb_image is a single file MIT licensed library for processing images. The stbi__getn function reads a specified number of bytes from context (typically a file) into the specified buffer. In case the file stream points to the end, it returns zero. There are two places where its return value is not checked: In the `stbi__hdr_load` function and in the `stbi__tga_load` function. The latter of the two is likely more exploitable as an attacker may also control the size of an uninitialized buffer. stb_image es un... • https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L1664 • CWE-908: Use of Uninitialized Resource •

CVE-2023-45662 – Multi-byte read heap buffer overflow in stbi__vertical_flip in stb_image
https://notcve.org/view.php?id=CVE-2023-45662
20 Oct 2023 — stb_image is a single file MIT licensed library for processing images. When `stbi_set_flip_vertically_on_load` is set to `TRUE` and `req_comp` is set to a number that doesn’t match the real number of components per pixel, the library attempts to flip the image vertically. A crafted image file can trigger `memcpy` out-of-bounds read because `bytes_per_pixel` used to calculate `bytes_per_row` doesn’t match the real image array dimensions. stb_image es una librería con licencia MIT de un solo archivo para proc... • https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L1235 • CWE-125: Out-of-bounds Read •

CVE-2023-45661 – Wild address read in stbi__gif_load_next in stb_image
https://notcve.org/view.php?id=CVE-2023-45661
20 Oct 2023 — stb_image is a single file MIT licensed library for processing images. A crafted image file may trigger out of bounds memcpy read in `stbi__gif_load_next`. This happens because two_back points to a memory address lower than the start of the buffer out. This issue may be used to leak internal memory allocation information. stb_image es una librería con licencia MIT de un solo archivo para procesar imágenes. Un archivo de imagen manipulado puede provocar una lectura de memcpy fuera de límites en `stbi__gif_lo... • https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L6817 • CWE-125: Out-of-bounds Read •

CVE-2023-43898
https://notcve.org/view.php?id=CVE-2023-43898
03 Oct 2023 — Nothings stb 2.28 was discovered to contain a Null Pointer Dereference via the function stbi__convert_format. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted pic file. Se descubrió que Nothings stb 2.28 contenía un Null Pointer Dereference a través de la función stbi__convert_format. Esta vulnerabilidad permite a los atacantes provocar una denegación de servicio (DoS) a través de un archivo de imagen manipulado. • https://github.com/nothings/stb/issues/1452 • CWE-476: NULL Pointer Dereference •

CVE-2022-28041 – Gentoo Linux Security Advisory 202409-15
https://notcve.org/view.php?id=CVE-2022-28041
15 Apr 2022 — stb_image.h v2.27 was discovered to contain an integer overflow via the function stbi__jpeg_decode_block_prog_dc. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors. Se ha detectado que stb_image.h versión v2.27, contiene un desbordamiento de enteros por medio de la función stbi__jpeg_decode_block_prog_dc. Esta vulnerabilidad permite a atacantes causar una Denegación de Servicio (DoS) por medio de vectores no especificados Multiple vulnerabilities have been discov... • https://github.com/nothings/stb/issues/1292 • CWE-190: Integer Overflow or Wraparound •

CVE-2022-28042 – Gentoo Linux Security Advisory 202409-15
https://notcve.org/view.php?id=CVE-2022-28042
15 Apr 2022 — stb_image.h v2.27 was discovered to contain an heap-based use-after-free via the function stbi__jpeg_huff_decode. Se ha detectado que stb_image.h versión v2.27, contenía un uso de memoria previamente liberada en la región heap de la memoria por medio de la función stbi__jpeg_huff_decode Multiple vulnerabilities have been discovered in stb, the worst of which lead to a denial of service. Versions greater than or equal to 20240201 are affected. • https://github.com/nothings/stb/issues/1289 • CWE-416: Use After Free •