|
|
Subscribe / Log in / New account

Mageia alert MGASA-2024-0186 (stb)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2024-0186: Updated stb packages fix security vulnerabilities
Date:  Wed, 22 May 2024 01:17:59 +0200
Message-ID:  <20240521231759.90C9B9FFD3@duvel.mageia.org>
Archive-link:  Article

MGASA-2024-0186 - Updated stb packages fix security vulnerabilities Publication date: 21 May 2024 URL: https://advisories.mageia.org/MGASA-2024-0186.html Type: security Affected Mageia releases: 9 CVE: CVE-2023-45681, CVE-2023-47212 Description: stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger memory write past an allocated heap buffer in `start_decoder`. The root cause is a potential integer overflow in `sizeof(char*) * (f->comment_list_length)` which may make `setup_malloc` allocate less memory than required. Since there is another integer overflow an attacker may overflow it too to force `setup_malloc` to return 0 and make the exploit more reliable. This issue may lead to code execution. References: - https://bugs.mageia.org/show_bug.cgi?id=33205 - https://lists.fedoraproject.org/archives/list/package-ann... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4... SRPMS: - 9/core/stb-0-0.git20230129.4.1.mga9


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds