Your submission was sent successfully! Close

CVE-2019-7577

Published: 7 February 2019

SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c.

From the Ubuntu Security Team

It was discovered that SDL (Simple DirectMedia Layer) did not properly handle certain crafted input, resulting in a heap-based buffer over-read. An attacker could use this to cause SDL to crash or leak sensitive information.

Priority

Low

CVSS 3 base score: 8.8

Status

Package Release Status
libsdl1.2
Launchpad, Ubuntu, Debian
bionic
Released (1.2.15+dfsg2-0.1ubuntu0.1)
cosmic Ignored
(reached end-of-life)
disco Ignored
(reached end-of-life)
eoan Not vulnerable
(1.2.15+dfsg2-5)
focal Not vulnerable
(1.2.15+dfsg2-5)
groovy Not vulnerable
(1.2.15+dfsg2-5)
hirsute Not vulnerable
(1.2.15+dfsg2-5)
impish Not vulnerable
(1.2.15+dfsg2-5)
jammy Not vulnerable
(1.2.15+dfsg2-5)
kinetic Not vulnerable
(1.2.15+dfsg2-5)
precise
Released (1.2.14-6.4ubuntu3.2)
trusty
Released (1.2.15-8ubuntu1.1+esm1)
upstream Needs triage

xenial
Released (1.2.15+dfsg1-3ubuntu0.1)
Patches:
upstream: https://hg.libsdl.org/SDL/rev/faf9abbcfb5f
upstream: https://hg.libsdl.org/SDL/rev/416136310b88
libsdl2
Launchpad, Ubuntu, Debian
bionic Needed

cosmic Ignored
(reached end-of-life)
disco Ignored
(reached end-of-life)
eoan Not vulnerable
(2.0.10+dfsg1-1ubuntu1)
focal Not vulnerable
(2.0.10+dfsg1-1ubuntu1)
groovy Not vulnerable
(2.0.10+dfsg1-1ubuntu1)
hirsute Not vulnerable
(2.0.10+dfsg1-1ubuntu1)
impish Not vulnerable
(2.0.10+dfsg1-1ubuntu1)
jammy Not vulnerable
(2.0.10+dfsg1-1ubuntu1)
kinetic Not vulnerable
(2.0.10+dfsg1-1ubuntu1)
precise Does not exist

trusty Needed

upstream Needs triage

xenial Ignored
(end of standard support, was needed)