Bug 2358175 - CVE-2025-3406 stb: Nothings stb Header Array out-of-bounds read [fedora-40]
Summary: CVE-2025-3406 stb: Nothings stb Header Array out-of-bounds read [fedora-40]
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Fedora
Classification: Fedora
Component: stb
Version: 40
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: ---
Assignee: Ben Beasley
QA Contact:
URL:
Whiteboard: {"flaws": ["96050952-a272-4f37-86e9-f...
Depends On:
Blocks: CVE-2025-3406
TreeView+ depends on / blocked
 
Reported: 2025-04-08 06:11 UTC by Michal Findra
Modified: 2025-04-08 10:05 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2025-04-08 10:05:40 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Michal Findra 2025-04-08 06:11:34 UTC
More information about this security flaw is available in the following bug:

http://bugzilla.redhat.com/show_bug.cgi?id=2358118

Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 Ben Beasley 2025-04-08 10:05:40 UTC
http://nvd.nist.gov/vuln/detail/CVE-2025-3406

The CVE contains little detail and no suggested mitigation.

It is easy to see how an incorrect image-width argument w to the function stbhw_build_tileset_from_image could result in an out-of-bounds read in the data buffer, but an API user only supplies the buffer size indirectly via the w and h arguments, so it’s incumbent on the API user to make sure they are sane – there is nothing that can be done within stbhw_build_tileset_from_image to further validate them.

I am inclined to suggest that this CVE is invalid: the API user must provide a consistent width, height, and data buffer. We don’t say that memcpy() is vulnerable because an API user could pass it the wrong size argument n.


Note You need to log in before you can comment on or make changes to this bug.