MGASA-2017-0397

Source
https://advisories.mageia.org/MGASA-2017-0397.html
Import Source
https://advisories.mageia.org/MGASA-2017-0397.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2017-0397
Related
Published
2017-11-02T21:47:07Z
Modified
2017-11-02T21:09:29Z
Summary
Updated sdl2_image & mingw packages fix security vulnerability
Details

An exploitable buffer overflow vulnerability exists in the XCF property handling functionality of SDL_image 2.0.1. A specially crafted xcf file can cause a stack-based buffer overflow resulting in potential code execution. An attacker can provide a specially crafted XCF file to trigger this vulnerability (CVE-2017-2887).

References
Credits

Affected packages