Bug 1223751 (CVE-2023-47212)

Summary: VUL-0: CVE-2023-47212: stb: heap-based buffer overflow vulnerability in the comment functionality of stb _vorbis.c
Product: [openSUSE] openSUSE Distribution Reporter: SMASH SMASH <smash_bz>
Component: SecurityAssignee: Adrian Schröter <adrian.schroeter>
Status: NEW --- QA Contact: E-mail List <qa-bugs>
Severity: Normal    
Priority: P3 - Medium CC: andrea.mattiazzo
Version: Leap 15.5   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/403894/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-05-02 13:54:05 UTC
A heap-based buffer overflow vulnerability exists in the comment functionality of stb _vorbis.c v1.22. A specially crafted .ogg file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47212
https://www.cve.org/CVERecord?id=CVE-2023-47212
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1846
https://bugzilla.redhat.com/show_bug.cgi?id=2278401
Comment 1 Andrea Mattiazzo 2024-05-02 13:55:14 UTC
Tracking as affected:
- openSUSE:Backports:SLE-15-SP5/stb  20210910
- openSUSE:Backports:SLE-15-SP6/stb  20230129
- openSUSE:Factory/stb               20230129