We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-46333

z2d OOB composition could lead to invalid memory access and corruption



Description

z2d is a pure Zig 2D graphics library. Versions of z2d after `0.5.1` and up to and including `0.6.0`, when writing from one surface to another using `z2d.compositor.StrideCompositor.run`, and higher-level operations when the anti-aliasing mode is set to `.default` (such as `Context.fill`, `Context.stroke`, `painter.fill`, and `painter.stroke`), the source surface can be completely out-of-bounds on the x-axis, but not on the y-axis, by way of a negative offset. This results in an overflow of the value controlling the length of the stride. In non-safe optimization modes (consumers compiling with `ReleaseFast` or `ReleaseSmall`), this could potentially lead to invalid memory accesses or corruption. This issue is patched in version `0.6.1`. Users on an untagged version after `v0.5.1` and before `v0.6.1` are advised to update to address the vulnerability. Those still on Zig `0.13.0` are recommended to downgrade to `v0.5.1`.

Reserved 2025-04-22 | Published 2025-04-25 | Updated 2025-04-28 | Assigner GitHub_M


HIGH: 7.3CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-122: Heap-based Buffer Overflow

CWE-190: Integer Overflow or Wraparound

Product status

> 0.5.1, <= 0.6.0
affected

References

github.com/...er/z2d/security/advisories/GHSA-mm4c-p35v-7hx3

github.com/vancluever/z2d/issues/104

github.com/vancluever/z2d/issues/105

cve.org (CVE-2025-46333)

nvd.nist.gov (CVE-2025-46333)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-46333

Support options

Helpdesk Chat, Email, Knowledgebase