CVE-2021-42716

EUVD-2021-29676
An issue was discovered in stb stb_image.h 2.27. The PNM loader incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to a buffer overflow when later reinterpreting the result as a 16-bit buffer. An attacker could potentially have crashed a service using stb_image, or read up to 1024 bytes of non-consecutive heap data without control over the read location.
Classic Buffer Overflow
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.1 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 48%
Affected Products (NVD)
VendorProductVersion
nothingsstb_image.h
2.27
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libstb
bookworm
no-dsa
bullseye
0.0~git20200713.b42009b+ds-1
not-affected
buster
not-affected
sid
0.0~git20240715.f7f20f39fe4f+ds-1
fixed
trixie
0.0~git20240715.f7f20f39fe4f+ds-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libstb
focal
needs-triage
hirsute
ignored
impish
ignored
jammy
needs-triage
kinetic
ignored
lunar
ignored
mantic
ignored
noble
needs-triage
trusty
ignored
xenial
ignored
References