-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.0764
                          libsdl2 security update
                              9 February 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           libsdl2
Publisher:         Debian
Operating System:  Debian GNU/Linux
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-4743 CVE-2021-33657 CVE-2020-14410
                   CVE-2020-14409 CVE-2019-13626 CVE-2019-13616
                   CVE-2019-7638 CVE-2019-7636 CVE-2019-7635
                   CVE-2019-7578 CVE-2019-7577 CVE-2019-7576
                   CVE-2019-7575 CVE-2019-7574 CVE-2019-7573
                   CVE-2019-7572  

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2023/02/msg00008.html

Comment: CVSS (Max):  8.8 CVE-2021-33657 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
         CVSS Source: NVD
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3314-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Markus Koschany
February 09, 2023                             https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : libsdl2
Version        : 2.0.9+dfsg1-1+deb10u1
CVE ID         : CVE-2019-7572 CVE-2019-7573 CVE-2019-7574 CVE-2019-7575
                 CVE-2019-7576 CVE-2019-7577 CVE-2019-7578 CVE-2019-7635
                 CVE-2019-7636 CVE-2019-7638 CVE-2019-13616 CVE-2019-13626
                 CVE-2020-14409 CVE-2020-14410 CVE-2021-33657 CVE-2022-4743
Debian Bug     : 924610 1014577

Several security vulnerabilities have been discovered in SDL2, the Simple
DirectMedia Layer library. These vulnerabilities may allow an attacker to
cause a denial of service or result in the execution of arbitrary code if
malformed images or sound files are processed.

For Debian 10 buster, these problems have been fixed in version
2.0.9+dfsg1-1+deb10u1.

We recommend that you upgrade your libsdl2 packages.

For the detailed security status of libsdl2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libsdl2

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


- -----BEGIN PGP SIGNATURE-----
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=chut
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=8VPG
-----END PGP SIGNATURE-----