CVE-2019-5052
Published: 3 July 2019
An exploitable integer overflow vulnerability exists when loading a PCX file in SDL2_image 2.0.4. A specially crafted file can cause an integer overflow, resulting in too little memory being allocated, which can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.
From the Ubuntu security team
USN-4238-1 addressed serveral vulnerabilities in SDL_image. This update provides the corresponding fixes for Ubuntu 14.04 ESM.
Priority
CVSS 3 base score: 8.8
Status
Package | Release | Status |
---|---|---|
libsdl2-image Launchpad, Ubuntu, Debian |
bionic |
Needed
|
cosmic |
Ignored
(reached end-of-life)
|
|
disco |
Ignored
(reached end-of-life)
|
|
eoan |
Not vulnerable
(2.0.5+dfsg1-1)
|
|
focal |
Not vulnerable
(2.0.5+dfsg1-1)
|
|
groovy |
Not vulnerable
(2.0.5+dfsg1-1)
|
|
hirsute |
Not vulnerable
(2.0.5+dfsg1-1)
|
|
impish |
Not vulnerable
(2.0.5+dfsg1-1)
|
|
jammy |
Not vulnerable
(2.0.5+dfsg1-1)
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(2.0.5+dfsg1-1)
|
|
xenial |
Ignored
(end of standard support, was needed)
|
|
sdl-image1.2 Launchpad, Ubuntu, Debian |
bionic |
Released
(1.2.12-8ubuntu0.1)
|
cosmic |
Ignored
(reached end-of-life)
|
|
disco |
Ignored
(reached end-of-life)
|
|
eoan |
Not vulnerable
(1.2.12-11)
|
|
focal |
Not vulnerable
(1.2.12-11)
|
|
groovy |
Not vulnerable
(1.2.12-11)
|
|
hirsute |
Not vulnerable
(1.2.12-11)
|
|
impish |
Not vulnerable
(1.2.12-11)
|
|
jammy |
Not vulnerable
(1.2.12-11)
|
|
precise |
Does not exist
|
|
trusty |
Needed
|
|
upstream |
Released
(1.2.12-11)
|
|
xenial |
Released
(1.2.12-5+deb9u1ubuntu0.16.04.1)
|