Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-49955 | stb_image is a single file MIT licensed library for processing images. A crafted image file can trigger `stbi__load_gif_main_outofmem` attempt to double-free the out variable. This happens in `stbi__load_gif_main` because when the `layers * stride` value is zero the behavior is implementation defined, but common that realloc frees the old memory and returns null pointer. Since it attempts to double-free the memory a few lines below the first “free”, the issue can be potentially exploited only in a multi-threaded environment. In the worst case this may lead to code execution. |
Thu, 13 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nothings stb Image
|
|
| CPEs | cpe:2.3:a:nothings:stb_image:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Nothings stb Image
|
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T17:14:05.941Z
Reserved: 2023-10-10T14:36:40.860Z
Link: CVE-2023-45664
Updated: 2024-08-02T20:21:16.925Z
Status : Modified
Published: 2023-10-21T00:15:09.003
Modified: 2024-11-21T08:27:10.223
Link: CVE-2023-45664
No data.
OpenCVE Enrichment
No data.
EUVD