File _patchinfo of Package patchinfo.18770
<patchinfo incident="18770">
<issue tracker="cve" id="2019-13217"/>
<issue tracker="cve" id="2019-13220"/>
<issue tracker="cve" id="2019-13223"/>
<issue tracker="cve" id="2019-13221"/>
<issue tracker="cve" id="2019-13219"/>
<issue tracker="cve" id="2019-13222"/>
<issue tracker="cve" id="2019-13218"/>
<issue tracker="bnc" id="1216478">VUL-0: TRACKERBUG: stb: Several memory access violations in stb_image and stb_vorbis</issue>
<packager>adrianSuSE</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for stb</summary>
<description>This update for stb fixes the following issues:
Addressing the follow security issues (boo#1216478):
* CVE-2019-13217: heap buffer overflow in start_decoder()
* CVE-2019-13218: stack buffer overflow in compute_codewords()
* CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest()
* CVE-2019-13220: out-of-range read in draw_line()
* CVE-2019-13221: issue with large 1D codebooks in lookup1_values()
* CVE-2019-13222: unchecked NULL returned by get_window()
* CVE-2019-13223: division by zero in predict_point()
</description>
</patchinfo>