[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 2804-1] libsdl1.2 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2804-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                          Adrian Bunk
October 31, 2021                              https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : libsdl1.2
Version        : 1.2.15+dfsg1-4+deb9u1
CVE ID         : CVE-2019-7572 CVE-2019-7573 CVE-2019-7574 CVE-2019-7575 
                 CVE-2019-7576 CVE-2019-7577 CVE-2019-7578 CVE-2019-7635 
                 CVE-2019-7636 CVE-2019-7637 CVE-2019-7638 CVE-2019-13616
Debian Bug     : 924609 

Several vulnerability have been fixed in libsdl2, the older version of 
the Simple DirectMedia Layer library that provides low level access to 
audio, keyboard, mouse, joystick, and graphics hardware.

CVE-2019-7572

    Buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c

CVE-2019-7573

    Heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c

CVE-2019-7574

    Heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c

CVE-2019-7575

    Heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c

CVE-2019-7576

    Heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c

CVE-2019-7577

    Buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c

CVE-2019-7578

    Heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c

CVE-2019-7635

    Heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c

CVE-2019-7636

    Heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c

CVE-2019-7637

    Heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c

CVE-2019-7638

    Heap-based buffer over-read in Map1toN in video/SDL_pixels.c

CVE-2019-13616

    Heap-based buffer over-read in BlitNtoN in video/SDL_blit_N.c

For Debian 9 stretch, these problems have been fixed in version
1.2.15+dfsg1-4+deb9u1.

We recommend that you upgrade your libsdl1.2 packages.

For the detailed security status of libsdl1.2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libsdl1.2

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=tZLf
-----END PGP SIGNATURE-----


Reply to: