Use of Uninitialized Resource Affecting libstb package, versions *


Severity

Recommended
low

Based on Debian security rating

    Threat Intelligence

    EPSS
    0.06% (25th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-DEBIAN12-LIBSTB-6023893
  • published 22 Oct 2023
  • disclosed 21 Oct 2023

How to fix?

There is no fixed version for Debian:12 libstb.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libstb package and not the libstb package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

stb_image is a single file MIT licensed library for processing images. The stbi__getn function reads a specified number of bytes from context (typically a file) into the specified buffer. In case the file stream points to the end, it returns zero. There are two places where its return value is not checked: In the stbi__hdr_load function and in the stbi__tga_load function. The latter of the two is likely more exploitable as an attacker may also control the size of an uninitialized buffer.

CVSS Scores

version 3.1
Expand this section

NVD

5.5 medium
  • Attack Vector (AV)
    Local
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    Required
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    None
  • Availability (A)
    None