A heap-based buffer overflow vulnerability exists in the comment functionality of stb _vorbis.c v1.22. A specially crafted .ogg file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.
{ "binaries": [ { "binary_version": "0.0~git20190817.1.052dce1-1", "binary_name": "libstb-dev" }, { "binary_version": "0.0~git20190817.1.052dce1-1", "binary_name": "libstb0" } ] }
{ "binaries": [ { "binary_version": "0.0~git20210910.af1a5bc+ds-1", "binary_name": "libstb-dev" }, { "binary_version": "0.0~git20210910.af1a5bc+ds-1", "binary_name": "libstb0" } ] }
{ "binaries": [ { "binary_version": "0.0~git20230129.5736b15+ds-1.2", "binary_name": "libstb-dev" }, { "binary_version": "0.0~git20230129.5736b15+ds-1.2", "binary_name": "libstb0t64" } ] }
{ "binaries": [ { "binary_version": "0.0~git20240715.f7f20f39fe4f+ds-1", "binary_name": "libstb-dev" }, { "binary_version": "0.0~git20240715.f7f20f39fe4f+ds-1", "binary_name": "libstb0t64" } ] }