Hide Forgot
An exploitable code execution vulnerability exists in the XPM image rendering functionality of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow, allocating too small of a buffer. This buffer can then be written out of bounds resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability. External References: https://talosintelligence.com/vulnerability_reports/TALOS-2019-0843
Created SDL2_image tracking bugs for this issue: Affects: epel-7 [bug 1739394] Affects: fedora-all [bug 1739396] Created mingw-SDL2_image tracking bugs for this issue: Affects: epel-all [bug 1739395] Affects: fedora-all [bug 1739397]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.