Name | CVE-2022-25514 |
Description | stb_truetype.h v1.26 was discovered to contain a heap-buffer-overflow via the function ttUSHORT() at stb_truetype.h. NOTE: Third party has disputed stating that the source code has also a disclaimer that it should only be used with trusted input. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
libstb non issue, stb_truetype.h explicitly marked as unsuitable for untrusted font files
The stb_truetype API does not know the length of the input font file and therefore cannot bounds check it.
https://github.com/nothings/stb/issues/1286