Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-45666
HistoryOct 21, 2023 - 12:15 a.m.

CVE-2023-45666

2023-10-2100:15:09
Debian Security Bug Tracker
security-tracker.debian.org
21
stb_image
double-free
memory leak
mit licensed
stbi__load_gif_main
stbi__convert_format

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

41.4%

stb_image is a single file MIT licensed library for processing images. It may look like stbi__load_gif_main doesn’t give guarantees about the content of output value *delays upon failure. Although it sets *delays to zero at the beginning, it doesn’t do it in case the image is not recognized as GIF and a call to stbi__load_gif_main_outofmem only frees possibly allocated memory in *delays without resetting it to zero. Thus it would be fair to say the caller of stbi__load_gif_main is responsible to free the allocated memory in *delays only if stbi__load_gif_main returns a non null value. However at the same time the function may return null value, but fail to free the memory in *delays if internally stbi__convert_format is called and fails. Thus the issue may lead to a memory leak if the caller chooses to free delays only when stbi__load_gif_main didn’t fail or to a double-free if the delays is always freed

OSVersionArchitecturePackageVersionFilename
Debian12alllibstb<= 0.0~git20220908.8b5f1f3+ds-1libstb_0.0~git20220908.8b5f1f3+ds-1_all.deb
Debian11alllibstb<= 0.0~git20200713.b42009b+ds-1libstb_0.0~git20200713.b42009b+ds-1_all.deb
Debian10alllibstb<= 0.0~git20180212.15.e6afb9c-1libstb_0.0~git20180212.15.e6afb9c-1_all.deb
Debian999alllibstb<= 0.0~git20230129.5736b15+ds-1.2libstb_0.0~git20230129.5736b15+ds-1.2_all.deb
Debian13alllibstb<= 0.0~git20230129.5736b15+ds-1.2libstb_0.0~git20230129.5736b15+ds-1.2_all.deb

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

41.4%