First published: Fri Oct 20 2023(Updated: )
stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger memory allocation failure in `start_decoder`. In that case the function returns early, the `f->comment_list` is set to `NULL`, but `f->comment_list_length` is not reset. Later in `vorbis_deinit` it tries to dereference the `NULL` pointer. This issue may lead to denial of service.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nothings STB | =1.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45680 is a vulnerability in the stb_vorbis library that can lead to a null pointer dereference in the vorbis_deinit function.
The severity level of CVE-2023-45680 is medium with a CVSS score of 5.3.
CVE-2023-45680 affects software that uses the stb_vorbis library version 1.22.
To fix CVE-2023-45680, update the stb_vorbis library to a version that has addressed the vulnerability.
CWE-476 is a category of vulnerabilities that includes null pointer dereference vulnerabilities.