First published: Fri Oct 20 2023(Updated: )
stb_image is a single file MIT licensed library for processing images. A crafted image file can trigger `stbi__load_gif_main_outofmem` attempt to double-free the out variable. This happens in `stbi__load_gif_main` because when the `layers * stride` value is zero the behavior is implementation defined, but common that realloc frees the old memory and returns null pointer. Since it attempts to double-free the memory a few lines below the first “free”, the issue can be potentially exploited only in a multi-threaded environment. In the worst case this may lead to code execution.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nothings Stb Image.h | =2.28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45664 is a vulnerability in the stb_image library that can be triggered by a crafted image file, resulting in an attempt to double-free the out variable.
CVE-2023-45664 has a severity score of 8.8, which is considered high.
The affected software is Nothings Stb Image.h version 2.28.
To fix CVE-2023-45664, update to a version of the stb_image library that is not affected by the vulnerability.
More information about CVE-2023-45664 can be found in the GitHub Security Lab advisory and the stb_image library's GitHub repository.