Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2019-12216

Published: 20 May 2019

An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9 when used in conjunction with libSDL2_image.a in SDL2_image 2.0.4. There is a heap-based buffer overflow in the SDL2_image function IMG_LoadPCX_RW at IMG_pcx.c.

From the Ubuntu Security Team

USN-4238-1 addressed serveral vulnerabilities in SDL_image. This update provides the corresponding fixes for Ubuntu 14.04 ESM.

Priority

Medium

Cvss 3 Severity Score

6.5

Score breakdown

Status

Package Release Status
libsdl2-image
Launchpad, Ubuntu, Debian
bionic Needed

cosmic Ignored
(reached end-of-life)
disco Ignored
(reached end-of-life)
eoan Not vulnerable
(2.0.5+dfsg1-1)
focal Not vulnerable
(2.0.5+dfsg1-1)
groovy Not vulnerable
(2.0.5+dfsg1-1)
hirsute Not vulnerable
(2.0.5+dfsg1-1)
impish Not vulnerable
(2.0.5+dfsg1-1)
jammy Not vulnerable
(2.0.5+dfsg1-1)
kinetic Not vulnerable
(2.0.5+dfsg1-1)
lunar Not vulnerable
(2.0.5+dfsg1-1)
trusty
Released (2.0.0+dfsg-3+deb8u2build0.14.04.1~esm1)
upstream
Released (2.0.5+dfsg1-1)
xenial Needed

sdl-image1.2
Launchpad, Ubuntu, Debian
bionic
Released (1.2.12-8ubuntu0.1)
cosmic Ignored
(reached end-of-life)
disco Ignored
(reached end-of-life)
eoan Not vulnerable
(1.2.12-11)
focal Not vulnerable
(1.2.12-11)
groovy Not vulnerable
(1.2.12-11)
hirsute Not vulnerable
(1.2.12-11)
impish Not vulnerable
(1.2.12-11)
jammy Not vulnerable
(1.2.12-11)
kinetic Not vulnerable
(1.2.12-11)
lunar Not vulnerable
(1.2.12-11)
trusty
Released (1.2.12-5+deb9u1ubuntu0.14.04.1~esm1)
upstream
Released (1.2.12-11)
xenial
Released (1.2.12-5+deb9u1ubuntu0.16.04.1)

Severity score breakdown

Parameter Value
Base score 6.5
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H