More information about this security flaw is available in the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=2358138 Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.
The vulnerability report contains little detail. However, the function stb_include_string appears in the stb_include.h library. Significant concerns were noted with the design of this library during package review, so we have never shipped a copy of it: - It uses strcat/strcpy into a fixed-length buffer that is assumed (but not proven) to be large enough for all possible uses - It ignores I/O errors (possibly leading to undefined behavior from reading uninitialized memory), and so on. Since we don’t ship stb_include, we can’t be affected.