Bug 1223751 (CVE-2023-47212) - VUL-0: CVE-2023-47212: stb: heap-based buffer overflow vulnerability in the comment functionality of stb _vorbis.c
Summary: VUL-0: CVE-2023-47212: stb: heap-based buffer overflow vulnerability in the c...
Status: NEW
Alias: CVE-2023-47212
Product: openSUSE Distribution
Classification: openSUSE
Component: Security (show other bugs)
Version: Leap 15.5
Hardware: Other Other
: P3 - Medium : Normal (vote)
Target Milestone: ---
Assignee: Adrian Schröter
QA Contact: E-mail List
URL: https://smash.suse.de/issue/403894/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2024-05-02 13:54 UTC by SMASH SMASH
Modified: 2024-05-02 14:15 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-05-02 13:54:05 UTC
A heap-based buffer overflow vulnerability exists in the comment functionality of stb _vorbis.c v1.22. A specially crafted .ogg file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47212
https://www.cve.org/CVERecord?id=CVE-2023-47212
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1846
https://bugzilla.redhat.com/show_bug.cgi?id=2278401
Comment 1 Andrea Mattiazzo 2024-05-02 13:55:14 UTC
Tracking as affected:
- openSUSE:Backports:SLE-15-SP5/stb  20210910
- openSUSE:Backports:SLE-15-SP6/stb  20230129
- openSUSE:Factory/stb               20230129