CVE-2026-5315

| EUVD-2026-18109 MEDIUM
2026-04-02 [email protected]
5.3
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
P
Scope
X

Lifecycle Timeline

4
Patch Released
Apr 02, 2026 - 20:30 nvd
Patch available
Analysis Generated
Apr 02, 2026 - 00:25 vuln.today
EUVD ID Assigned
Apr 02, 2026 - 00:25 euvd
EUVD-2026-18109
CVE Published
Apr 02, 2026 - 00:16 nvd
MEDIUM 5.3

Description

A vulnerability was determined in Nothings stb up to 1.26. The affected element is the function stbtt__buf_get8 in the library stb_truetype.h of the component TTF File Handler. Executing a manipulation can lead to out-of-bounds read. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Analysis

Out-of-bounds read in Nothings stb library (stb_truetype.h) up to version 1.26 allows remote attackers to trigger memory access violations via malformed TTF font files, resulting in information disclosure. The vulnerability affects the stbtt__buf_get8 function in the TTF file handler and requires user interaction to exploit. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Priority Score

27
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +26
POC: 0

Vendor Status

Debian

libstb
Release Status Fixed Version Urgency
bullseye vulnerable 0.0~git20200713.b42009b+ds-1 -
bullseye (security) vulnerable 0.0~git20200713.b42009b+ds-1+deb11u1 -
bookworm vulnerable 0.0~git20220908.8b5f1f3+ds-1 -
trixie vulnerable 0.0~git20241109.5c20573+ds-1 -
forky, sid vulnerable 0.0~git20250907.fede005+ds-1 -
(unstable) fixed (unfixed) -

Share

CVE-2026-5315 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy