Your submission was sent successfully! Close

CVE-2019-5052

Published: 3 July 2019

An exploitable integer overflow vulnerability exists when loading a PCX file in SDL2_image 2.0.4. A specially crafted file can cause an integer overflow, resulting in too little memory being allocated, which can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.

From the Ubuntu security team

USN-4238-1 addressed serveral vulnerabilities in SDL_image. This update provides the corresponding fixes for Ubuntu 14.04 ESM.

Priority

Medium

CVSS 3 base score: 8.8

Status

Package Release Status
libsdl2-image
Launchpad, Ubuntu, Debian
bionic Needed

cosmic Ignored
(reached end-of-life)
disco Ignored
(reached end-of-life)
eoan Not vulnerable
(2.0.5+dfsg1-1)
focal Not vulnerable
(2.0.5+dfsg1-1)
groovy Not vulnerable
(2.0.5+dfsg1-1)
hirsute Not vulnerable
(2.0.5+dfsg1-1)
impish Not vulnerable
(2.0.5+dfsg1-1)
jammy Not vulnerable
(2.0.5+dfsg1-1)
precise Does not exist

trusty Does not exist

upstream
Released (2.0.5+dfsg1-1)
xenial Ignored
(end of standard support, was needed)
sdl-image1.2
Launchpad, Ubuntu, Debian
bionic
Released (1.2.12-8ubuntu0.1)
cosmic Ignored
(reached end-of-life)
disco Ignored
(reached end-of-life)
eoan Not vulnerable
(1.2.12-11)
focal Not vulnerable
(1.2.12-11)
groovy Not vulnerable
(1.2.12-11)
hirsute Not vulnerable
(1.2.12-11)
impish Not vulnerable
(1.2.12-11)
jammy Not vulnerable
(1.2.12-11)
precise Does not exist

trusty Needed

upstream
Released (1.2.12-11)
xenial
Released (1.2.12-5+deb9u1ubuntu0.16.04.1)