CVE-2023-45666

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-45666
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-45666.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-45666
Downstream
Published
2023-10-20T23:26:42Z
Modified
2025-10-21T02:34:58Z
Severity
  • 7.3 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
Possible double-free or memory leak in stbi__load_gif_main in stb_image
Details

stb_image is a single file MIT licensed library for processing images. It may look like stbi__load_gif_main doesn’t give guarantees about the content of output value *delays upon failure. Although it sets *delays to zero at the beginning, it doesn’t do it in case the image is not recognized as GIF and a call to stbi__load_gif_main_outofmem only frees possibly allocated memory in *delays without resetting it to zero. Thus it would be fair to say the caller of stbi__load_gif_main is responsible to free the allocated memory in *delays only if stbi__load_gif_main returns a non null value. However at the same time the function may return null value, but fail to free the memory in *delays if internally stbi__convert_format is called and fails. Thus the issue may lead to a memory leak if the caller chooses to free delays only when stbi__load_gif_main didn’t fail or to a double-free if the delays is always freed

References

Affected packages

Git /

Affected ranges

Database specific

unresolved_versions

[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "2.28"
            }
        ],
        "type": ""
    }
]