First published: Wed Aug 14 2019(Updated: )
stb_image.h (aka the stb image loader) 2.23 has a heap-based buffer over-read in stbi__tga_load, leading to Information Disclosure or Denial of Service.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Stb Project Stb | =2.23 | |
debian/libstb | <=0.0~git20200713.b42009b+ds-1 | 0.0~git20220908.8b5f1f3+ds-1 0.0~git20240715.f7f20f39fe4f+ds-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15058 refers to a heap-based buffer over-read vulnerability in stb_image.h version 2.23, potentially leading to Information Disclosure or Denial of Service.
CVE-2019-15058 has a severity rating of 9.1 (Critical).
To mitigate CVE-2019-15058, update to a non-vulnerable version of the stb image loader software.