Debian Patches

Status for sdl-image1.2/1.2.12-13

Patch Description Author Forwarded Bugs Origin Last update
CVE-2017-2887.patch # HG changeset patch
# User Sam Lantinga <slouken@libsdl.org>
# Date 1507329619 25200
# Node ID 318484db0705d07d4d1f4c0a1d3d5ea69f6ba2b0
# Parent 7ad06019831d474380fd5a63e518d21219031519
Fixed security vulnerability in XCF image loader (thanks Yves!)

diff -r 7ad06019831d -r 318484db0705 IMG_xcf.c
no
CVE-2017-12122-1.patch lbm: use correct variable to check color planes. no upstream, https://hg.libsdl.org/SDL_image/rev/16772bbb1b09
CVE-2017-12122-2.patch lbm: Fail to load images with unsupported/bogus color depth. no upstream, https://hg.libsdl.org/SDL_image/rev/97f7f01e0665
CVE-2017-14440.patch lbm: Don't overflow static colormap buffer. no upstream, https://hg.libsdl.org/SDL_image/rev/bfa08dc02b3c
CVE-2017-14441.patch ico: reject obviously incorrect image sizes. no upstream, https://hg.libsdl.org/SDL_image/rev/a1e9b624ca10
CVE-2017-14442.patch bmp: don't overflow palette buffer with bogus biClrUsed values. no upstream, https://hg.libsdl.org/SDL_image/rev/37445f6180a8
CVE-2017-14448.patch xcf: deal with bogus data in rle tile decoding. no upstream, https://hg.libsdl.org/SDL_image/rev/7df1580f1695
CVE-2017-14450.patch gif: report error on bogus LWZ data, instead of overflowing a buffer. no upstream, https://hg.libsdl.org/SDL_image/rev/45e750f92c84
CVE-2018-3837.patch pcx: don't overflow buffer if bytes-per-line is less than image width. no upstream, https://hg.libsdl.org/SDL_image/rev/2938fc80591a
CVE-2018-3838.patch xcf: Prevent infinite loop and/or buffer overflow on bogus data. no upstream, https://hg.libsdl.org/SDL_image/rev/c5f9cbb5d2bb
CVE-2018-3839.patch xcf: check for some potential integer overflows. no upstream, https://hg.libsdl.org/SDL_image/rev/fb643e371806
CVE-2018-3977.patch CVE-2018-3977 Ryan C. Gordon <icculus@icculus.org> no upstream, https://hg.libsdl.org/SDL_image/rev/170d7d32e4a8 2018-11-04
CVE-2019-12218.patch fix heap buffer overflow issue in IMG_pcx.c Issue known as TALOS-2019-0841, CVE-2019-12218. Sam Lantinga <slouken@libsdl.org> no upstream, https://hg.libsdl.org/SDL_image/rev/7453e79c8cdb
CVE-2019-5052.patch fix invalid data read on bpl == -1 Issue known as TALOS-2019-0821, or CVE-2019-5052. Sam Lantinga <slouken@libsdl.org> no upstream, https://hg.libsdl.org/SDL_image/rev/b920be2b3fc6
IMG_pcx-out-of-bounds.patch fix multiple OOB issues in IMG_pcx.c This patches addresses following issues: CVE-2019-12222, CVE-2019-12221,
CVE-2019-12220, CVE-2019-12219 and CVE-2019-12217.
Sam Lantinga <slouken@libsdl.org>, Hugo Lefeuvre <hle@debian.org> no upstream, https://hg.libsdl.org/SDL_image/rev/e7e9786a1a34
CVE-2019-7635.patch fix Heap-Buffer Overflow in Blit1to4 (IMG_bmp.c) Sam Lantinga <slouken@libsdl.org> no upstream, https://hg.libsdl.org/SDL_image/rev/03bd33e8cb49
CVE-2019-5058.patch Fixed TALOS-2019-0842 - XCF Image Code Execution Vulnerability This patch addresses a bug in a previous security patch for CVE-2018-3977.
The initial patch failing to address this issue, the bug was "re-discovered"
later and addressed CVE-2019-5058.
Sam Lantinga <slouken@libsdl.org> no upstream, https://hg.libsdl.org/SDL_image/rev/b1a80aec2b10
CVE-2019-5059.patch Backport of upstream fix:

# HG changeset patch
# User Sam Lantinga <slouken@libsdl.org>
# Date 1560235821 25200
# Node ID 95fc7da55247a4368848144b9374a88a6494fd5c
# Parent b1a80aec2b1037704b666d716505da6ba968cba9
Fixed TALOS-2019-0843 - XPM image color code code execution vulnerability

By providing a sufficiently large ncolors and cpp value, the buffer allocation size can overflow into a size too small to hold the color code string. This causes the memcpy to cause a heap overflow, potentially resulting in code execution.
no
CVE-2019-5060.patch Backport of upstream fix:

# HG changeset patch
# User Sam Lantinga <slouken@libsdl.org>
# Date 1560237306 25200
# Node ID 26061e601c8157427ca319d943a715174dadce8c
# Parent 95fc7da55247a4368848144b9374a88a6494fd5c
Fixed TALOS-2019-0844 - XPM image colorhash parsing Code Execution Vulnerability

The table entry in the color_hash is created in the create_colorhash function based on the number of colors passed into the function. The size of the color_hash table is the first value in the powers of 2 larger than the passed in number of colors [2]. The size of the allocation is this calculated value * 8 (sizeof(struct hash_entry **)) [3]. This multiplication can cause an overflow, resulting in a very small allocation.
no
CVE-2019-13616.patch # HG changeset patch
# User Ozkan Sezer <sezeroz@gmail.com>
# Date 1564511355 -10800
# Node ID a59bfe382008d2a14fa31f33b35a3ca473e9354f
# Parent 9ccaa3a0dfb6af18252c238797e53a9a899b0662
Fixed bug 4538 - validate image size when loading BMP files
no
showimage-Add-save-and-quit-options.patch showimage: Add -save and -quit options
This allows showimage to be used as a non-interactive smoke-test to
check that the SDL_image library can be linked against successfully.
Simon McVittie <smcv@collabora.com> no 2019-09-23
bug809038.patch Fixed bug Bug 3214 - SDL_image causes "libpng warning: Interlace handling should be turned on when using png_read_image" when loading
interlaced images

Hans de Goede

When starting an app which uses SDL_image to load interlaced png-s with a recent libpng, the following message is printed to the terminal:

libpng warning: Interlace handling should be turned on when using png_read_image

Once per loaded png. The attached patch fixes this.
Sam Lantinga <slouken@libsdl.org> no backport, 2.0.3, commit:e63624fb63e063be67c788c29a3616ae02c18e99 2018-02-07

All known versions for source package 'sdl-image1.2'

Links