CVE-2017-2887

NameCVE-2017-2887
DescriptionAn exploitable buffer overflow vulnerability exists in the XCF property handling functionality of SDL_image 2.0.1. A specially crafted xcf file can cause a stack-based buffer overflow resulting in potential code execution. An attacker can provide a specially crafted XCF file to trigger this vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1134-1, DSA-4177-1, DSA-4184-1
Debian Bugs878266, 878267

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libsdl2-image (PTS)bullseye2.0.5+dfsg1-2fixed
bookworm2.6.3+dfsg-1fixed
sid, trixie2.8.2+dfsg-1fixed
sdl-image1.2 (PTS)bullseye1.2.12-12fixed
bookworm1.2.12-13fixed
sid, trixie1.2.12-14fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libsdl2-imagesourcejessie2.0.0+dfsg-3+deb8u1DSA-4177-1
libsdl2-imagesourcestretch2.0.1+dfsg-2+deb9u1DSA-4177-1
libsdl2-imagesource(unstable)2.0.1+dfsg-4878266
sdl-image1.2sourcewheezy1.2.12-2+deb7u1DLA-1134-1
sdl-image1.2sourcejessie1.2.12-5+deb8u1DSA-4184-1
sdl-image1.2sourcestretch1.2.12-5+deb9u1DSA-4184-1
sdl-image1.2source(unstable)1.2.12-7878267

Notes

https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0394
https://hg.libsdl.org/SDL_image/rev/318484db0705

Search for package or bug name: Reporting problems