SDL_ttf v2.0.18 and below was discovered to contain an arbitrary memory write via the function TTF_RenderText_Solid(). This vulnerability is triggered via a crafted TTF file.
References
Link | Resource |
---|---|
https://github.com/libsdl-org/SDL_ttf/commit/db1b41ab8bde6723c24b866e466cad78c2fa0448 | Patch Third Party Advisory |
https://github.com/libsdl-org/SDL_ttf/issues/187 | Exploit Issue Tracking Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EAGMQMRQDTZFQW64JEW3O6HY3JYLAAHT/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPYTEBBNHCDGPVFACC5RC5K2FZUCYTPZ/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RXI3MDPR24W5557G34YHWOP2MOK6BTGB/ | Mailing List Third Party Advisory |
Information
Published : 2022-05-03 20:15
Updated : 2022-05-12 12:43
NVD link : CVE-2022-27470
Mitre link : CVE-2022-27470
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
libsdl
- sdl_ttf
fedoraproject
- fedora