Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2019:2071-1

Опубликовано: 05 сент. 2019
Источник: suse-cvrf

Описание

Security update for SDL_image

This update for SDL_image fixes the following issues:

Update SDL_Image to new snapshot 1.2.12+hg695.

Security issues fixed:

  • TALOS-2019-0821 CVE-2019-5052: exploitable integer overflow vulnerability when loading a PCX file (boo#1140421)
  • TALOS-2019-0841 CVE-2019-5057: code execution vulnerability in the PCX image-rendering functionality of SDL2_image (boo#1143763)
  • TALOS-2019-0842 CVE-2019-5058: heap overflow in XCF image rendering can lead to code execution (boo#1143764)
  • TALOS-2019-0843 CVE-2019-5059: heap overflow in XPM image handling (boo#1143766)
  • TALOS-2019-0844 CVE-2019-5060: integer overflow in the XPM image (boo#1143768)
  • CVE-2019-7635: heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c (boo#1124827)
  • CVE-2019-13616: fix heap buffer overflow when reading a crafted bmp file (boo#1141844).

Список пакетов

openSUSE Leap 15.0
libSDL_image-1_2-0-1.2.12+hg695-lp151.3.3.1
libSDL_image-1_2-0-32bit-1.2.12+hg695-lp151.3.3.1
libSDL_image-devel-1.2.12+hg695-lp151.3.3.1
libSDL_image-devel-32bit-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.1
libSDL_image-1_2-0-1.2.12+hg695-lp151.3.3.1
libSDL_image-1_2-0-32bit-1.2.12+hg695-lp151.3.3.1
libSDL_image-devel-1.2.12+hg695-lp151.3.3.1
libSDL_image-devel-32bit-1.2.12+hg695-lp151.3.3.1

Описание

SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in BlitNtoN in video/SDL_blit_N.c when called from SDL_SoftBlit in video/SDL_blit.c.


Затронутые продукты
openSUSE Leap 15.0:libSDL_image-1_2-0-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.0:libSDL_image-1_2-0-32bit-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.0:libSDL_image-devel-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.0:libSDL_image-devel-32bit-1.2.12+hg695-lp151.3.3.1

Ссылки

Описание

An exploitable integer overflow vulnerability exists when loading a PCX file in SDL2_image 2.0.4. A specially crafted file can cause an integer overflow, resulting in too little memory being allocated, which can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.


Затронутые продукты
openSUSE Leap 15.0:libSDL_image-1_2-0-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.0:libSDL_image-1_2-0-32bit-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.0:libSDL_image-devel-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.0:libSDL_image-devel-32bit-1.2.12+hg695-lp151.3.3.1

Ссылки

Описание

An exploitable code execution vulnerability exists in the PCX image-rendering functionality of SDL2_image 2.0.4. A specially crafted PCX image can cause a heap overflow, resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability.


Затронутые продукты
openSUSE Leap 15.0:libSDL_image-1_2-0-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.0:libSDL_image-1_2-0-32bit-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.0:libSDL_image-devel-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.0:libSDL_image-devel-32bit-1.2.12+hg695-lp151.3.3.1

Ссылки

Описание

An exploitable code execution vulnerability exists in the XCF image rendering functionality of SDL2_image 2.0.4. A specially crafted XCF image can cause a heap overflow, resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability.


Затронутые продукты
openSUSE Leap 15.0:libSDL_image-1_2-0-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.0:libSDL_image-1_2-0-32bit-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.0:libSDL_image-devel-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.0:libSDL_image-devel-32bit-1.2.12+hg695-lp151.3.3.1

Ссылки

Описание

An exploitable code execution vulnerability exists in the XPM image rendering functionality of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow, allocating too small of a buffer. This buffer can then be written out of bounds resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability.


Затронутые продукты
openSUSE Leap 15.0:libSDL_image-1_2-0-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.0:libSDL_image-1_2-0-32bit-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.0:libSDL_image-devel-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.0:libSDL_image-devel-32bit-1.2.12+hg695-lp151.3.3.1

Ссылки

Описание

An exploitable code execution vulnerability exists in the XPM image rendering function of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow in the colorhash function, allocating too small of a buffer. This buffer can then be written out of bounds, resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability.


Затронутые продукты
openSUSE Leap 15.0:libSDL_image-1_2-0-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.0:libSDL_image-1_2-0-32bit-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.0:libSDL_image-devel-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.0:libSDL_image-devel-32bit-1.2.12+hg695-lp151.3.3.1

Ссылки

Описание

SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c.


Затронутые продукты
openSUSE Leap 15.0:libSDL_image-1_2-0-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.0:libSDL_image-1_2-0-32bit-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.0:libSDL_image-devel-1.2.12+hg695-lp151.3.3.1
openSUSE Leap 15.0:libSDL_image-devel-32bit-1.2.12+hg695-lp151.3.3.1

Ссылки