stb_image is a single file MIT licensed library for processing images. When `stbi_set_flip_vertically_on_load` is set to `TRUE` and `req_comp` is set to a number that doesn’t match the real number of components per pixel, the library attempts to flip the image vertically. A crafted image file can trigger `memcpy` out-of-bounds read because `bytes_per_pixel` used to calculate `bytes_per_row` doesn’t match the real image array dimensions.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Nothings stb Image
|
|
CPEs | cpe:2.3:a:nothings:stb_image:*:*:*:*:*:*:*:* | |
Vendors & Products |
Nothings stb Image
|
|
Metrics |
ssvc
|
Thu, 13 Feb 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | stb_image is a single file MIT licensed library for processing images. When `stbi_set_flip_vertically_on_load` is set to `TRUE` and `req_comp` is set to a number that doesn’t match the real number of components per pixel, the library attempts to flip the image vertically. A crafted image file can trigger `memcpy` out-of-bounds read because `bytes_per_pixel` used to calculate `bytes_per_row` doesn’t match the real image array dimensions. | stb_image is a single file MIT licensed library for processing images. When `stbi_set_flip_vertically_on_load` is set to `TRUE` and `req_comp` is set to a number that doesn’t match the real number of components per pixel, the library attempts to flip the image vertically. A crafted image file can trigger `memcpy` out-of-bounds read because `bytes_per_pixel` used to calculate `bytes_per_row` doesn’t match the real image array dimensions. |

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T17:14:04.772Z
Reserved: 2023-10-10T14:36:40.860Z
Link: CVE-2023-45662

Updated: 2024-08-02T20:21:16.822Z

Status : Modified
Published: 2023-10-21T00:15:08.867
Modified: 2024-11-21T08:27:09.937
Link: CVE-2023-45662

No data.