MGASA-2017-0397

Source
https://advisories.mageia.org/MGASA-2017-0397.html
Import Source
https://advisories.mageia.org/MGASA-2017-0397.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0397
Related
Published
2017-11-02T21:47:07Z
Modified
2017-11-02T21:09:29Z
Summary
Updated sdl2_image & mingw packages fix security vulnerability
Details

An exploitable buffer overflow vulnerability exists in the XCF property handling functionality of SDL_image 2.0.1. A specially crafted xcf file can cause a stack-based buffer overflow resulting in potential code execution. An attacker can provide a specially crafted XCF file to trigger this vulnerability (CVE-2017-2887).

References
Credits

Affected packages

Mageia:5 / sdl2_image

Package

Name
sdl2_image
Purl
pkg:rpm/mageia/sdl2_image?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.0-4.1.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:6 / sdl2_image

Package

Name
sdl2_image
Purl
pkg:rpm/mageia/sdl2_image?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.1-1.1.mga6

Ecosystem specific

{
    "section": "core"
}

Mageia:6 / mingw-SDL2_image

Package

Name
mingw-SDL2_image
Purl
pkg:rpm/mageia/mingw-SDL2_image?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.1-2.1.mga6

Ecosystem specific

{
    "section": "core"
}