openSUSE Security Update: Security update for stb
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2025:0039-1
Rating:             important
References:         #1216478 
Cross-References:   CVE-2019-13217 CVE-2019-13218 CVE-2019-13219
                    CVE-2019-13220 CVE-2019-13221 CVE-2019-13222
                    CVE-2019-13223
Affected Products:
                    openSUSE Backports SLE-15-SP6
______________________________________________________________________________

   An update that fixes 7 vulnerabilities is now available.

Description:

   This update for stb fixes the following issues:

   Addressing the follow security issues (boo#1216478):

   * CVE-2019-13217: heap buffer overflow in start_decoder()
   * CVE-2019-13218: stack buffer overflow in compute_codewords()
   * CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest()
   * CVE-2019-13220: out-of-range read in draw_line()
   * CVE-2019-13221: issue with large 1D codebooks in lookup1_values()
   * CVE-2019-13222: unchecked NULL returned by get_window()
   * CVE-2019-13223: division by zero in predict_point()


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Backports SLE-15-SP6:

      zypper in -t patch openSUSE-2025-39=1



Package List:

   - openSUSE Backports SLE-15-SP6 (noarch):

      stb-devel-20240910-bp156.2.3.1


References:

   https://www.suse.com/security/cve/CVE-2019-13217.html
   https://www.suse.com/security/cve/CVE-2019-13218.html
   https://www.suse.com/security/cve/CVE-2019-13219.html
   https://www.suse.com/security/cve/CVE-2019-13220.html
   https://www.suse.com/security/cve/CVE-2019-13221.html
   https://www.suse.com/security/cve/CVE-2019-13222.html
   https://www.suse.com/security/cve/CVE-2019-13223.html
   https://bugzilla.suse.com/1216478

openSUSE: 2025:0039-1 important: stb Advisory Security Update

January 31, 2025
An update that fixes 7 vulnerabilities is now available

Description

This update for stb fixes the following issues: Addressing the follow security issues (boo#1216478): * CVE-2019-13217: heap buffer overflow in start_decoder() * CVE-2019-13218: stack buffer overflow in compute_codewords() * CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest() * CVE-2019-13220: out-of-range read in draw_line() * CVE-2019-13221: issue with large 1D codebooks in lookup1_values() * CVE-2019-13222: unchecked NULL returned by get_window() * CVE-2019-13223: division by zero in predict_point()

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP6: zypper in -t patch openSUSE-2025-39=1


Package List

- openSUSE Backports SLE-15-SP6 (noarch): stb-devel-20240910-bp156.2.3.1


References

https://www.suse.com/security/cve/CVE-2019-13217.html https://www.suse.com/security/cve/CVE-2019-13218.html https://www.suse.com/security/cve/CVE-2019-13219.html https://www.suse.com/security/cve/CVE-2019-13220.html https://www.suse.com/security/cve/CVE-2019-13221.html https://www.suse.com/security/cve/CVE-2019-13222.html https://www.suse.com/security/cve/CVE-2019-13223.html https://bugzilla.suse.com/1216478


Severity
Announcement ID: openSUSE-SU-2025:0039-1
Rating: important
Affected Products: openSUSE Backports SLE-15-SP6 .

Related News