Description
A security flaw has been discovered in floooh sokol up to 33e2271c431bf21de001e972f72da17a984da932. This vulnerability affects the function _sg_pipeline_common_init in the library sokol_gfx.h. Performing manipulation results in heap-based buffer overflow. The attack needs to be approached locally. The exploit has been released to the public and may be exploited. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The patch is named 33e2271c431bf21de001e972f72da17a984da932. It is suggested to install a patch to address this issue.
Problem types
Product status
Timeline
| 2025-12-19: | Advisory disclosed |
| 2025-12-19: | VulDB entry created |
| 2025-12-19: | VulDB entry last update |
Credits
Oneafter (VulDB User)
References
github.com/floooh/sokol/issues/1406
vuldb.com/?id.337594 (VDB-337594 | floooh sokol sokol_gfx.h _sg_pipeline_common_init heap-based overflow)
vuldb.com/?ctiid.337594 (VDB-337594 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.717320 (Submit #717320 | floooh sokol e0832c9 Heap-based Buffer Overflow)
github.com/floooh/sokol/issues/1406
github.com/floooh/sokol/issues/1406
github.com/oneafter/1212/blob/main/hbf1
github.com/...ommit/33e2271c431bf21de001e972f72da17a984da932
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.