MGASA-2024-0186

Source
https://advisories.mageia.org/MGASA-2024-0186.html
Import Source
https://advisories.mageia.org/MGASA-2024-0186.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0186
Related
Published
2024-05-21T23:17:20Z
Modified
2024-05-21T22:50:50Z
Summary
Updated stb packages fix security vulnerabilities
Details

stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger memory write past an allocated heap buffer in start_decoder. The root cause is a potential integer overflow in sizeof(char*) * (f->comment_list_length) which may make setup_malloc allocate less memory than required. Since there is another integer overflow an attacker may overflow it too to force setup_malloc to return 0 and make the exploit more reliable. This issue may lead to code execution.

References
Credits

Affected packages

Mageia:9 / stb

Package

Name
stb
Purl
pkg:rpm/mageia/stb?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0-0.git20230129.4.1.mga9

Ecosystem specific

{
    "section": "core"
}