Bug 2358165
Summary: | CVE-2025-3409 stb: Nothings stb stack-based overflow [epel-8] | ||
---|---|---|---|
Product: | [Fedora] Fedora EPEL | Reporter: | Michal Findra <mfindra> |
Component: | stb | Assignee: | Ben Beasley <code> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | epel8 | CC: | code, mhroncok |
Target Milestone: | --- | Keywords: | Security, SecurityTracking |
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | {"flaws": ["c90a9321-8927-4dab-bc7b-28fec33f91ce"]} | ||
Fixed In Version: | Doc Type: | --- | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2025-04-08 11:01:42 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 2358138 |
Description
Michal Findra
2025-04-08 06:03:56 UTC
The vulnerability report contains little detail. However, the function stb_include_string appears in the stb_include.h library. Significant concerns were noted with the design of this library during package review, so we have never shipped a copy of it: - It uses strcat/strcpy into a fixed-length buffer that is assumed (but not proven) to be large enough for all possible uses - It ignores I/O errors (possibly leading to undefined behavior from reading uninitialized memory), and so on. Since we don’t ship stb_include, we can’t be affected. |