Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2025-46333
April 25, 2025
z2d is a pure Zig 2D graphics library. Versions of z2d after "0.5.1" and up to and including "0.6.0", when writing from one surface to another using "z2d.compositor.StrideCompositor.run", and higher-level operations when the anti-aliasing mode is set to ".default" (such as "Context.fill", "Context.stroke", "painter.fill", and "painter.stroke"), the source surface can be completely out-of-bounds on the x-axis, but not on the y-axis, by way of a negative offset. This results in an overflow of the value controlling the length of the stride. In non-safe optimization modes (consumers compiling with "ReleaseFast" or "ReleaseSmall"), this could potentially lead to invalid memory accesses or corruption. This issue is patched in version "0.6.1". Users on an untagged version after "v0.5.1" and before "v0.6.1" are advised to update to address the vulnerability. Those still on Zig "0.13.0" are recommended to downgrade to "v0.5.1".
Affected Packages
https://github.com/vancluever/z2d.git (GITHUB):
Affected version(s) >=v0.5.1 <v0.6.1
Fix Suggestion:
Update to version v0.6.1
Do you need more information?
Contact Us
CVSS v4
Base Score:
7.3
Attack Vector
LOCAL
Attack Complexity
HIGH
Attack Requirements
PRESENT
Privileges Required
LOW
User Interaction
PASSIVE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
HIGH
Subsequent System Integrity
HIGH
Subsequent System Availability
HIGH
CVSS v3
Base Score:
7
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
Weakness Type (CWE)
Improper Restriction of Operations within the Bounds of a Memory Buffer
Integer Overflow or Wraparound
Heap-based Buffer Overflow
EPSS
Base Score:
0.04