Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.893305
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DLA-3305-1)
Summary:The remote host is missing an update for the Debian 'libstb' package(s) announced via the DLA-3305-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'libstb' package(s) announced via the DLA-3305-1 advisory.

Vulnerability Insight:
Several vulnerabilities have been fixed in the libstb library.

CVE-2018-16981

Heap-based buffer overflow in stbi__out_gif_code().

CVE-2019-13217

Heap buffer overflow in the Vorbis start_decoder().

CVE-2019-13218

Division by zero in the Vorbis predict_point().

CVE-2019-13219

NULL pointer dereference in the Vorbis get_window().

CVE-2019-13220

Uninitialized stack variables in the Vorbis start_decoder().

CVE-2019-13221

Buffer overflow in the Vorbis compute_codewords().

CVE-2019-13222

Out-of-bounds read of a global buffer in the Vorbis draw_line().

CVE-2019-13223

Reachable assertion in the Vorbis lookup1_values().

CVE-2021-28021

Buffer overflow in stbi__extend_receive().

CVE-2021-37789

Heap-based buffer overflow in stbi__jpeg_load().

CVE-2021-42715

The HDR loader parsed truncated end-of-file RLE scanlines as an infinite sequence of zero-length runs.

CVE-2022-28041

Integer overflow in stbi__jpeg_decode_block_prog_dc().

CVE-2022-28042

Heap-based use-after-free in stbi__jpeg_huff_decode().

For Debian 10 buster, these problems have been fixed in version 0.0~
git20180212.15.e6afb9c-1+deb10u1.

We recommend that you upgrade your libstb packages.

For the detailed security status of libstb please refer to its security tracker page at: [link moved to references]

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: [link moved to references]

Affected Software/OS:
'libstb' package(s) on Debian 10.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-16981
https://github.com/nothings/stb/issues/656
https://lists.debian.org/debian-lts-announce/2023/01/msg00045.html
Common Vulnerability Exposure (CVE) ID: CVE-2019-13217
http://nothings.org/stb_vorbis/
https://github.com/nothings/stb/commits/master/stb_vorbis.c
Common Vulnerability Exposure (CVE) ID: CVE-2019-13218
Common Vulnerability Exposure (CVE) ID: CVE-2019-13219
Common Vulnerability Exposure (CVE) ID: CVE-2019-13220
Common Vulnerability Exposure (CVE) ID: CVE-2019-13221
Common Vulnerability Exposure (CVE) ID: CVE-2019-13222
Common Vulnerability Exposure (CVE) ID: CVE-2019-13223
Common Vulnerability Exposure (CVE) ID: CVE-2021-28021
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G2M5CRSGPRF7G3YB5CLU4FXW7ANNHAYT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AF2CNP4FVC6LDKNOO4WDCGNDYIP3MPK6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VP2YEXEAJWI76FPM7D7VXHWD3WESQEYC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TDGZFLBOP27LZKLH45WQLSNPSPP7S7Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEGXBDEMTFGINETMJENBZ6SCHVEJQJSY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXX76TJMZBPN3NU542MGN6B7C7QHRFGB/
https://github.com/nothings/stb/issues/1108
Common Vulnerability Exposure (CVE) ID: CVE-2021-37789
https://github.com/nothings/stb/issues/1178
Common Vulnerability Exposure (CVE) ID: CVE-2021-42715
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CI23LXPEV2GCDQTJSKO6CIILBDTI3R42/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FTZXHFZD36BGE5P6JF252NZZLKMGCY4T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ID6II3RIKAMVGVMC6ZAQIXXYYDMTVC4N/
https://github.com/nothings/stb/issues/1224
https://github.com/nothings/stb/pull/1223
Common Vulnerability Exposure (CVE) ID: CVE-2022-28041
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J72YJQ3R5MG23GECPUCLAWPPZ6TZPG7U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I4HXIWU5HBOADXZVMREHT4YTO5WVYXEQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIRW5D4CJIDS6FHOGHSS42SSDDKQMXPN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEQGDVH43YW7AG7TRU2CTU5TMIYP27WP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OHTD76NDEN77KCPI3XGGK2VVSA25WWEG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMBCMJGAZRQS55SNECUWZSC5URVLEZ5R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/52ZIQAFEG7A6TO526OJ7OA4GSEZQ2WEG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2G6JJJQ5JABTPF5H2L5FQGLILYLIGPW6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FXLM5XL77SNH4IPTSXOQD7XL4E2EMIN/
https://github.com/nothings/stb/issues/1292
https://github.com/nothings/stb/pull/1297
Common Vulnerability Exposure (CVE) ID: CVE-2022-28042
https://github.com/nothings/stb/issues/1289
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.