Security
Headlines
HeadlinesLatestCVEs

Headline

Gentoo Linux Security Advisory 202305-18

Gentoo Linux Security Advisory 202305-18 - Multiple vulnerabilities have been found in libsdl2, the worst of which could result in arbitrary code execution. Versions less than 2.26.0 are affected.

Packet Storm
#vulnerability#web#mac#linux

Gentoo Linux Security Advisory GLSA 202305-18


                                       https://security.gentoo.org/  

Severity: Normal
Title: libsdl2: Multiple Vulnerabilities
Date: May 03, 2023
Bugs: #836665, #890614
ID: 202305-18


Synopsis

Multiple vulnerabilities have been found in libsdl2, the worst of which
could result in arbitrary code execution.

Background

Simple DirectMedia Layer is a cross-platform development library
designed to provide low level access to audio, keyboard, mouse,
joystick, and graphics hardware via OpenGL and Direct3D.

Affected packages

-------------------------------------------------------------------  
 Package              /     Vulnerable     /            Unaffected  
-------------------------------------------------------------------  

1 media-libs/libsdl2 < 2.26.0 >= 2.26.0

Description

Multiple vulnerabilities have been discovered in libsdl2. Please review
the CVE identifiers referenced below for details.

Impact

Please review the referenced CVE identifiers for details.

Workaround

There is no known workaround at this time.

Resolution

All libsdl2 users should upgrade to the latest version:

emerge --sync

emerge --ask --oneshot --verbose “>=media-libs/libsdl2-2.26.0”

References

[ 1 ] CVE-2021-33657
https://nvd.nist.gov/vuln/detail/CVE-2021-33657
[ 2 ] CVE-2022-4743
https://nvd.nist.gov/vuln/detail/CVE-2022-4743

Availability

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/202305-18

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
[email protected] or alternatively, you may file a bug at
https://bugs.gentoo.org.

License

Copyright 2023 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5

Related news

Gentoo Linux Security Advisory 202305-17

Gentoo Linux Security Advisory 202305-17 - Multiple vulnerabilities have been found in libsdl, the worst of which could result in arbitrary code execution. Versions less than 1.2.15_p20221201>= are affected.

CVE-2022-4743: Fix memory leak in GLES_CreateTexture by xiaoxiaoafeifei · Pull Request #6269 · libsdl-org/SDL

A potential memory leak issue was discovered in SDL2 in GLES_CreateTexture() function in SDL_render_gles.c. The vulnerability allows an attacker to cause a denial of service attack. The vulnerability affects SDL2 v2.0.4 and above. SDL-1.x are not affected.

CVE-2021-33657: Always create a full 256-entry map in case color values are out of range · libsdl-org/SDL@8c91cf7

There is a heap overflow problem in video/SDL_pixels.c in SDL (Simple DirectMedia Layer) 2.x to 2.0.18 versions. By crafting a malicious .BMP file, an attacker can cause the application using this library to crash, denial of service or Code execution.

Packet Storm: Latest News

WordPress Really Simple Security Authentication Bypass