Out-of-bounds Write Affecting libsdl2-image package, versions <2.0.5+dfsg1-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.26% (65th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-LIBSDL2IMAGE-1550663
  • published4 Aug 2019
  • disclosed31 Jul 2019

Introduced: 31 Jul 2019

CVE-2019-5060  (opens in a new tab)
CWE-787  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade Debian:12 libsdl2-image to version 2.0.5+dfsg1-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libsdl2-image package and not the libsdl2-image package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

An exploitable code execution vulnerability exists in the XPM image rendering function of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow in the colorhash function, allocating too small of a buffer. This buffer can then be written out of bounds, resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability.

CVSS Scores

version 3.1