CVE-2017-2888 (retired)

Priority
Description
An exploitable integer overflow vulnerability exists when creating a new
RGB Surface in SDL 2.0.5. A specially crafted file can cause an integer
overflow resulting in too little memory being allocated which can lead to a
buffer overflow and potential code execution. An attacker can provide a
specially crafted image file to trigger this vulnerability.
Notes
mdeslaurupstream patch likely optimized away, see Red Hat bug
libsdl1.2 already has a check earlier in the function
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):not-affected (1.2.14-6.4ubuntu3.1)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (2.0.2+dfsg1-3ubuntu1.2)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (2.0.4+dfsg1-2ubuntu2)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2.0.6+dfsg1-2ubuntu2)
Ubuntu 19.04 (Disco Dingo):not-affected (2.0.6+dfsg1-2ubuntu2)
Ubuntu 19.10 (Eoan):not-affected (2.0.6+dfsg1-2ubuntu2)
Package
Upstream:released (2.0.6+dfsg1-4)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):released (2.0.2+dfsg1-3ubuntu1.3)
Ubuntu 16.04 LTS (Xenial Xerus):released (2.0.4+dfsg1-2ubuntu2.16.04.2)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2.0.8+dfsg1-1ubuntu1.18.04.1)
Ubuntu 19.04 (Disco Dingo):not-affected (2.0.8+dfsg1-1ubuntu1.18.04.1)
Ubuntu 19.10 (Eoan):not-affected (2.0.8+dfsg1-1ubuntu1.18.04.1)
Patches:
Upstream:https://hg.libsdl.org/SDL/rev/7e0f1498ddb5
More Information

Updated: 2019-10-09 07:59:53 UTC (commit 33aea848a182c0afcd0a3f927a01a7ecd9a061ee)