Описание
stb_image.h (aka the stb image loader) 2.23 has a heap-based buffer over-read in stbi__tga_load, leading to Information Disclosure or Denial of Service.
Отчет
The versions of stbi embedded in Red Hat products do not contain the vulnerable code and therefore they are not affected by this flaw.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 6 | clutter | Out of support scope | ||
| Red Hat Enterprise Linux 7 | cogl | Not affected | ||
| Red Hat Enterprise Linux 7 | compat-cogl114 | Not affected | ||
| Red Hat Enterprise Linux 8 | cogl | Not affected | ||
| Red Hat Enterprise Linux 8 | SFML | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
9.1 Critical
CVSS3
Связанные уязвимости
stb_image.h (aka the stb image loader) 2.23 has a heap-based buffer over-read in stbi__tga_load, leading to Information Disclosure or Denial of Service.
stb_image.h (aka the stb image loader) 2.23 has a heap-based buffer over-read in stbi__tga_load, leading to Information Disclosure or Denial of Service.
stb_image.h (aka the stb image loader) 2.23 has a heap-based buffer ov ...
stb_image.h (aka the stb image loader) 2.23 has a heap-based buffer over-read in stbi__tga_load, leading to Information Disclosure or Denial of Service.
Уязвимость компонента stb_image.h библиотек для C/C++ Libstb, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
EPSS
9.1 Critical
CVSS3