A vulnerability classified as critical has been found in Nothings stb up to f056911. This affects the function stb_include_string. The manipulation of the argument path_to_includes leads to stack-based buffer overflow. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way.
The vulnerability report contains little detail. However, the function stb_include_string appears in the stb_include.h library. Significant concerns were noted with the design of this library during package review, so we have never shipped a copy of it: - It uses strcat/strcpy into a fixed-length buffer that is assumed (but not proven) to be large enough for all possible uses - It ignores I/O errors (possibly leading to undefined behavior from reading uninitialized memory), and so on. Since we don’t ship stb_include, we can’t be affected.