CVE-2018-3977 (https://nvd.nist.gov/vuln/detail/CVE-2018-3977): An exploitable code execution vulnerability exists in the XCF image rendering functionality of SDL2_image-2.0.3. A specially crafted XCF image can cause a heap overflow, resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
Added to an existing GLSA. @ Arches, please test and mark stable: =media-libs/sdl2-image-2.0.4
x86 stable
amd64 stable
oggh, sorry, autoclose
@games, please clean.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=6338bd985b7f559eaff8fab0de624ee4e777b943 commit 6338bd985b7f559eaff8fab0de624ee4e777b943 Author: James Le Cuirot <chewi@gentoo.org> AuthorDate: 2019-03-10 10:22:02 +0000 Commit: James Le Cuirot <chewi@gentoo.org> CommitDate: 2019-03-10 10:22:02 +0000 media-libs/sdl2-image: Drop old and vulnerable 2.0.3 Bug: https://bugs.gentoo.org/674132 Package-Manager: Portage-2.3.62, Repoman-2.3.12 Signed-off-by: James Le Cuirot <chewi@gentoo.org> media-libs/sdl2-image/Manifest | 1 - media-libs/sdl2-image/sdl2-image-2.0.3.ebuild | 61 --------------------------- 2 files changed, 62 deletions(-)
This issue was resolved and addressed in GLSA 201903-17 at https://security.gentoo.org/glsa/201903-17 by GLSA coordinator Aaron Bauman (b-man).