{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-5316","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-04-01T12:40:09.662Z","datePublished":"2026-04-02T00:00:18.137Z","dateUpdated":"2026-04-02T18:24:28.334Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-02T00:00:18.137Z"},"title":"Nothings stb stb_vorbis.c setup_free allocation of resources","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-770","lang":"en","description":"Allocation of Resources"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-400","lang":"en","description":"Resource Consumption"}]}],"affected":[{"vendor":"Nothings","product":"stb","versions":[{"version":"1.0","status":"affected"},{"version":"1.1","status":"affected"},{"version":"1.2","status":"affected"},{"version":"1.3","status":"affected"},{"version":"1.4","status":"affected"},{"version":"1.5","status":"affected"},{"version":"1.6","status":"affected"},{"version":"1.7","status":"affected"},{"version":"1.8","status":"affected"},{"version":"1.9","status":"affected"},{"version":"1.10","status":"affected"},{"version":"1.11","status":"affected"},{"version":"1.12","status":"affected"},{"version":"1.13","status":"affected"},{"version":"1.14","status":"affected"},{"version":"1.15","status":"affected"},{"version":"1.16","status":"affected"},{"version":"1.17","status":"affected"},{"version":"1.18","status":"affected"},{"version":"1.19","status":"affected"},{"version":"1.20","status":"affected"},{"version":"1.21","status":"affected"},{"version":"1.22","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in Nothings stb up to 1.22. The impacted element is the function setup_free of the file stb_vorbis.c. The manipulation leads to allocation of resources. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-04-01T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-01T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-04-01T14:45:26.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"d0razi (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB","type":"coordinator"}],"references":[{"url":"https://vuldb.com/vuln/354648","name":"VDB-354648 | Nothings stb stb_vorbis.c setup_free allocation of resources","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/354648/cti","name":"VDB-354648 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/780560","name":"Submit #780560 | nothings stb (stb_vorbis.c) ≤ 1.22 Free of Pointer not at Start of Buffer","tags":["third-party-advisory"]},{"url":"https://gist.github.com/d0razi/cc7f70bba08c1a455d9933e97b8b57c1","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-02T18:23:58.665574Z","id":"CVE-2026-5316","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-02T18:24:28.334Z"}}]}}