{"schema_version":"1.7.2","id":"OESA-2026-2375","modified":"2026-05-22T13:17:13Z","published":"2026-05-22T13:17:13Z","upstream":["CVE-2026-34253"],"summary":"vorbis-tools security update","details":"Ogg Vorbis is a fully open, non-proprietary, patent-and-royalty-free, general-purpose compressed audio format for mid to high quality (8kHz-48.0kHz, 16+ bit, polyphonic) audio and music at fixed and variable bitrates from 16 to 128 kbps/channel. This places Vorbis in the same competitive class as audio representations such as MPEG-4 (AAC), and similar to, but higher performance than MPEG-1/2 audio layer 3, MPEG-4 audio (TwinVQ), WMA and PAC.\r\n\r\nSecurity Fix(es):\n\nA buffer underflow vulnerability has been identified in the ogg123 utility from the vorbis-tools 1.4.3 package in function remotethread in remote.c. This vulnerability occurs in the remote control functionality when processing malformed input, leading to a stack buffer underflow that can cause application crashes and potentially allow code execution.(CVE-2026-34253)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP4","name":"vorbis-tools","purl":"pkg:rpm/openEuler/vorbis-tools&distro=openEuler-20.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.0-34.oe2003sp4"}]}],"ecosystem_specific":{"aarch64":["vorbis-tools-1.4.0-34.oe2003sp4.aarch64.rpm","vorbis-tools-debuginfo-1.4.0-34.oe2003sp4.aarch64.rpm","vorbis-tools-debugsource-1.4.0-34.oe2003sp4.aarch64.rpm"],"noarch":["vorbis-tools-help-1.4.0-34.oe2003sp4.noarch.rpm"],"src":["vorbis-tools-1.4.0-34.oe2003sp4.src.rpm"],"x86_64":["vorbis-tools-1.4.0-34.oe2003sp4.x86_64.rpm","vorbis-tools-debuginfo-1.4.0-34.oe2003sp4.x86_64.rpm","vorbis-tools-debugsource-1.4.0-34.oe2003sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2375"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-34253"}],"database_specific":{"severity":"High"}}
