
Cloud Vulnerability DB
A community-led vulnerabilities database
A buffer overflow vulnerability was identified in the stbi_extendreceive function within stb_image.h in stb version 2.26. The vulnerability could be triggered via a specially crafted JPEG file (NVD, Debian Security).
The vulnerability exists in the stbi_extendreceive function implementation within stb_image.h. When processing JPEG files, a buffer overflow condition can occur, potentially leading to memory corruption. The issue was discovered in stb version 2.26 and affects the JPEG processing functionality (GitHub Issue).
The vulnerability could allow an attacker to cause a buffer overflow condition through a specially crafted JPEG file, potentially leading to memory corruption and program crashes. This affects applications that use the stb_image.h library for image processing (NVD).
Multiple distributions have released security updates to address this vulnerability. Debian has released version 0.0~git20180212.15.e6afb9c-1+deb10u1 for Debian 10 (buster). Fedora has also issued updates for affected packages including CuraEngine, sdrpp, and usd (Debian LTS, Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."