Debian Bug report logs -
#940934
libsdl2-image: CVE-2019-13616
Package:
src:libsdl2-image;
Maintainer for src:libsdl2-image is Debian SDL packages maintainers <pkg-sdl-maintainers@listsaliothdebianorg>;
Reported by: Salvatore Bonaccorso <carnil@debianorg>
Date: Sun, 22 Sep 2019 08:15:02 UTC
Severity: important
Ta ...
Synopsis
Important: SDL security update
Type/Severity
Security Advisory: Important
Topic
An update for SDL is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, which g ...
Synopsis
Important: SDL security update
Type/Severity
Security Advisory: Important
Topic
An update for SDL is now available for Red Hat Enterprise Linux 80 Update Services for SAP SolutionsRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scori ...
Synopsis
Important: SDL security update
Type/Severity
Security Advisory: Important
Topic
An update for SDL is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, which g ...
Synopsis
Important: SDL security update
Type/Severity
Security Advisory: Important
Topic
An update for SDL is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, which g ...
Several security issues were fixed in SDL ...
Several security issues were fixed in SDL ...
Several security issues were fixed in SDL_image ...
An issue was discovered in libSDL2a in Simple DirectMedia Layer (SDL) 209 There is an out-of-bounds read in the function SDL_InvalidateMap at video/SDL_pixelsc(CVE-2019-12222)
A heap-based buffer overflow was discovered in SDL in the SDL_BlitCopy() function, that was called while copying an existing surface into a new optimized one, due to la ...
A heap-based buffer overflow flaw, in SDL while copying an existing surface into a new optimized one, due to a lack of validation while loading a BMP image, is possible An application that uses SDL to parse untrusted input files may be vulnerable to this flaw, which could allow an attacker to make the application crash or execute code(CVE-2019-14 ...
A heap-based buffer overflow was discovered in SDL in the SDL_BlitCopy() function, that was called while copying an existing surface into a new optimized one, due to lack of validation while loading a BMP image in the SDL_LoadBMP_RW() function An application that uses SDL to parse untrusted input files may be vulnerable to this flaw, which could a ...