CVE-2017-2888

Priority
Description
An exploitable integer overflow vulnerability exists when creating a new
RGB Surface in SDL 2.0.5. A specially crafted file can cause an integer
overflow resulting in too little memory being allocated which can lead to a
buffer overflow and potential code execution. An attacker can provide a
specially crafted image file to trigger this vulnerability.
Ubuntu-Description
USN-4143-1 addressed serveral vulnerabilities in SDL 2.0. This update
provides the corresponding fixes for Ubuntu 14.04 ESM.
Notes
mdeslaurupstream patch likely optimized away, see Red Hat bug
libsdl1.2 already has a check earlier in the function
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):not-affected (1.2.14-6.4ubuntu3.1)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (2.0.2+dfsg1-3ubuntu1.2)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (2.0.4+dfsg1-2ubuntu2)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2.0.6+dfsg1-2ubuntu2)
Package
Upstream:released (2.0.6+dfsg1-4)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):released (2.0.2+dfsg1-3ubuntu1.3)
Ubuntu 16.04 LTS (Xenial Xerus):released (2.0.4+dfsg1-2ubuntu2.16.04.2)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2.0.8+dfsg1-1ubuntu1.18.04.1)
Patches:
Upstream:https://hg.libsdl.org/SDL/rev/7e0f1498ddb5
More Information

Updated: 2020-08-03 17:15:08 UTC (commit 43352de714775fda7ab5d12a90955f1633442b8a)