SDLttf v2.0.18 and below was discovered to contain an arbitrary memory write via the function TTFRenderText_Solid(). This vulnerability is triggered via a crafted TTF file.
{ "binaries": [ { "binary_version": "2.0.14+dfsg1-1", "binary_name": "libsdl2-ttf-2.0-0" }, { "binary_version": "2.0.14+dfsg1-1", "binary_name": "libsdl2-ttf-dev" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-27470.json"
{ "binaries": [ { "binary_version": "2.0.14+dfsg1-2", "binary_name": "libsdl2-ttf-2.0-0" }, { "binary_version": "2.0.14+dfsg1-2", "binary_name": "libsdl2-ttf-dev" } ] }
{ "binaries": [ { "binary_version": "2.0.15+dfsg1-1", "binary_name": "libsdl2-ttf-2.0-0" }, { "binary_version": "2.0.15+dfsg1-1", "binary_name": "libsdl2-ttf-dev" } ] }
{ "binaries": [ { "binary_version": "2.0.18+dfsg-2", "binary_name": "libsdl2-ttf-2.0-0" }, { "binary_version": "2.0.18+dfsg-2", "binary_name": "libsdl2-ttf-dev" } ] }
{ "binaries": [ { "binary_version": "2.22.0+dfsg-1", "binary_name": "libsdl2-ttf-2.0-0" }, { "binary_version": "2.22.0+dfsg-1", "binary_name": "libsdl2-ttf-dev" } ] }
{ "binaries": [ { "binary_version": "2.24.0+dfsg-2", "binary_name": "libsdl2-ttf-2.0-0" }, { "binary_version": "2.24.0+dfsg-2", "binary_name": "libsdl2-ttf-dev" } ] }