stb_image is a single file MIT licensed library for processing images. A crafted image file can trigger `stbi__load_gif_main_outofmem` attempt to double-free the out variable. This happens in `stbi__load_gif_main` because when the `layers * stride` value is zero the behavior is implementation defined, but common that realloc frees the old memory and returns null pointer. Since it attempts to double-free the memory a few lines below the first “free”, the issue can be potentially exploited only in a multi-threaded environment. In the worst case this may lead to code execution.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Nothings stb Image
|
|
CPEs | cpe:2.3:a:nothings:stb_image:*:*:*:*:*:*:*:* | |
Vendors & Products |
Nothings stb Image
|
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T17:14:05.941Z
Reserved: 2023-10-10T14:36:40.860Z
Link: CVE-2023-45664

Updated: 2024-08-02T20:21:16.925Z

Status : Modified
Published: 2023-10-21T00:15:09.003
Modified: 2024-11-21T08:27:10.223
Link: CVE-2023-45664

No data.