Mageia 2024-0186: stb Security Advisory Updates
Summary
stb_vorbis is a single file MIT licensed library for processing ogg
vorbis files. A crafted file may trigger memory write past an allocated
heap buffer in `start_decoder`. The root cause is a potential integer
overflow in `sizeof(char*) * (f->comment_list_length)` which may make
`setup_malloc` allocate less memory than required. Since there is
another integer overflow an attacker may overflow it too to force
`setup_malloc` to return 0 and make the exploit more reliable. This
issue may lead to code execution.
References
- https://bugs.mageia.org/show_bug.cgi?id=33205
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHQQXX27ACLLYUQHWSL3DVCOGUK5ZA4/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45681
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47212
Resolution
MGASA-2024-0186 - Updated stb packages fix security vulnerabilities
SRPMS
- 9/core/stb-0-0.git20230129.4.1.mga9