{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"critical"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2019-14906","title":"Title"},{"category":"description","text":"A flaw was found with the RHSA-2019:3950 erratum, where it did not fix the CVE-2019-13616 SDL vulnerability. This issue only affects Red Hat SDL packages, SDL versions through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow flaw while copying an existing surface into a new optimized one, due to a lack of validation while loading a BMP image, is possible. An application that uses SDL to parse untrusted input files may be vulnerable to this flaw, which could allow an attacker to make the application crash or execute code.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2019-14906","url":"https://www.suse.com/security/cve/CVE-2019-14906"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"}],"title":"SUSE CVE CVE-2019-14906","tracking":{"current_release_date":"2025-04-25T06:06:15Z","generator":{"date":"2023-10-31T02:33:21Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2019-14906","initial_release_date":"2023-10-31T02:33:21Z","revision_history":[{"date":"2023-10-31T02:33:21Z","number":"2","summary":"Current version"},{"date":"2025-01-01T06:20:49Z","number":"3","summary":"Current version"},{"date":"2025-01-10T03:32:22Z","number":"4","summary":"Current version"},{"date":"2025-02-15T07:00:04Z","number":"5","summary":"Current version"},{"date":"2025-02-17T07:24:55Z","number":"6","summary":"Current version"},{"date":"2025-03-15T10:36:24Z","number":"7","summary":"Current version"},{"date":"2025-04-25T06:06:15Z","number":"8","summary":"Current version"}],"status":"interim","version":"8"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Liberty Linux 7","product":{"name":"SUSE Liberty Linux 7","product_id":"SUSE Liberty Linux 7","product_identification_helper":{"cpe":"cpe:/o:suse:sll:7"}}},{"category":"product_version","name":"SDL-1.2.15-15.el7_7","product":{"name":"SDL-1.2.15-15.el7_7","product_id":"SDL-1.2.15-15.el7_7","product_identification_helper":{"cpe":"cpe:2.3:a:libsdl:simple_directmedia_layer:1.2.15:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/SDL@1.2.15-15.el7_7?upstream=SDL-1.2.15-15.el7_7.src.rpm"}}},{"category":"product_version","name":"SDL-devel-1.2.15-15.el7_7","product":{"name":"SDL-devel-1.2.15-15.el7_7","product_id":"SDL-devel-1.2.15-15.el7_7","product_identification_helper":{"cpe":"cpe:2.3:a:libsdl:simple_directmedia_layer:1.2.15:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/SDL-devel@1.2.15-15.el7_7?upstream=SDL-1.2.15-15.el7_7.src.rpm"}}},{"category":"product_version","name":"SDL-static-1.2.15-15.el7_7","product":{"name":"SDL-static-1.2.15-15.el7_7","product_id":"SDL-static-1.2.15-15.el7_7","product_identification_helper":{"purl":"pkg:rpm/suse/SDL-static@1.2.15-15.el7_7"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"SDL-1.2.15-15.el7_7 as component of SUSE Liberty Linux 7","product_id":"SUSE Liberty Linux 7:SDL-1.2.15-15.el7_7"},"product_reference":"SDL-1.2.15-15.el7_7","relates_to_product_reference":"SUSE Liberty Linux 7"},{"category":"default_component_of","full_product_name":{"name":"SDL-devel-1.2.15-15.el7_7 as component of SUSE Liberty Linux 7","product_id":"SUSE Liberty Linux 7:SDL-devel-1.2.15-15.el7_7"},"product_reference":"SDL-devel-1.2.15-15.el7_7","relates_to_product_reference":"SUSE Liberty Linux 7"},{"category":"default_component_of","full_product_name":{"name":"SDL-static-1.2.15-15.el7_7 as component of SUSE Liberty Linux 7","product_id":"SUSE Liberty Linux 7:SDL-static-1.2.15-15.el7_7"},"product_reference":"SDL-static-1.2.15-15.el7_7","relates_to_product_reference":"SUSE Liberty Linux 7"}]},"vulnerabilities":[{"cve":"CVE-2019-14906","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-14906"}],"notes":[{"category":"general","text":"A flaw was found with the RHSA-2019:3950 erratum, where it did not fix the CVE-2019-13616 SDL vulnerability. This issue only affects Red Hat SDL packages, SDL versions through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow flaw while copying an existing surface into a new optimized one, due to a lack of validation while loading a BMP image, is possible. An application that uses SDL to parse untrusted input files may be vulnerable to this flaw, which could allow an attacker to make the application crash or execute code.","title":"CVE description"}],"product_status":{"recommended":["SUSE Liberty Linux 7:SDL-1.2.15-15.el7_7","SUSE Liberty Linux 7:SDL-devel-1.2.15-15.el7_7","SUSE Liberty Linux 7:SDL-static-1.2.15-15.el7_7"]},"references":[{"category":"external","summary":"CVE-2019-14906","url":"https://www.suse.com/security/cve/CVE-2019-14906"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Liberty Linux 7:SDL-1.2.15-15.el7_7","SUSE Liberty Linux 7:SDL-devel-1.2.15-15.el7_7","SUSE Liberty Linux 7:SDL-static-1.2.15-15.el7_7"]}],"scores":[{"cvss_v3":{"baseScore":8.1,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"},"products":["SUSE Liberty Linux 7:SDL-1.2.15-15.el7_7","SUSE Liberty Linux 7:SDL-devel-1.2.15-15.el7_7","SUSE Liberty Linux 7:SDL-static-1.2.15-15.el7_7"]}],"threats":[{"category":"impact","date":"2019-11-27T15:49:40Z","details":"critical"}],"title":"CVE-2019-14906"}]}