CVE-2019-5052

Published: 03 July 2019

An exploitable integer overflow vulnerability exists when loading a PCX file in SDL2_image 2.0.4. A specially crafted file can cause an integer overflow, resulting in too little memory being allocated, which can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.

From the Ubuntu security team

USN-4238-1 addressed serveral vulnerabilities in SDL_image. This update provides the corresponding fixes for Ubuntu 14.04 ESM.

Priority

Medium

CVSS 3 base score: 8.8

Status

Package Release Status
libsdl2-image
Launchpad, Ubuntu, Debian
Upstream
Released (2.0.5+dfsg1-1)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(2.0.5+dfsg1-1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(2.0.5+dfsg1-1)
Ubuntu 18.04 LTS (Bionic Beaver) Needed

Ubuntu 16.04 LTS (Xenial Xerus) Needed

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Ubuntu 12.04 ESM (Precise Pangolin) Does not exist

Patches:
Upstream: https://hg.libsdl.org/SDL_image/rev/b920be2b3fc6
sdl-image1.2
Launchpad, Ubuntu, Debian
Upstream
Released (1.2.12-11)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(1.2.12-11)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(1.2.12-11)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (1.2.12-8ubuntu0.1)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (1.2.12-5+deb9u1ubuntu0.16.04.1)
Ubuntu 14.04 ESM (Trusty Tahr) Needed

Ubuntu 12.04 ESM (Precise Pangolin) Does not exist