Source: libstb X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security
Hi, The following vulnerabilities were published for libstb. CVE-2022-28041[0]: | stb_image.h v2.27 was discovered to contain an integer overflow via | the function stbi__jpeg_decode_block_prog_dc. This vulnerability | allows attackers to cause a Denial of Service (DoS) via unspecified | vectors. https://github.com/nothings/stb/issues/1292 https://github.com/nothings/stb/pull/1297 CVE-2022-28042[1]: | stb_image.h v2.27 was discovered to contain an heap-based use-after- | free via the function stbi__jpeg_huff_decode. https://github.com/nothings/stb/issues/1289 https://github.com/nothings/stb/pull/1297 If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2022-28041 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28041 [1] https://security-tracker.debian.org/tracker/CVE-2022-28042 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28042 Please adjust the affected versions in the BTS as needed.