-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.0379
                            SDL security update
                              31 January 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           SDL
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 8
                   Red Hat Enterprise Linux WS/Desktop 8
Impact/Access:     Access Privileged Data -- Remote with User Interaction
                   Modify Arbitrary Files -- Remote with User Interaction
                   Denial of Service      -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-13616  

Reference:         ESB-2020.0169
                   ESB-2019.4531
                   ESB-2019.4442

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2020:0293

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: SDL security update
Advisory ID:       RHSA-2020:0293-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:0293
Issue date:        2020-01-30
CVE Names:         CVE-2019-13616 
=====================================================================

1. Summary:

An update for SDL is now available for Red Hat Enterprise Linux 8.0 Update
Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream E4S (v. 8.0) - ppc64le, x86_64

3. Description:

Simple DirectMedia Layer (SDL) is a cross-platform multimedia library
designed to provide fast access to the graphics frame buffer and audio
device.

Security Fix(es):

* SDL: heap-based buffer overflow in SDL blit functions in
video/SDL_blit*.c (CVE-2019-13616)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1747237 - CVE-2019-13616 SDL: heap-based buffer overflow in SDL blit functions 
in video/SDL_blit*.c

6. Package List:

Red Hat Enterprise Linux AppStream E4S (v. 8.0):

Source:
SDL-1.2.15-33.el8_0.src.rpm

ppc64le:
SDL-1.2.15-33.el8_0.ppc64le.rpm
SDL-debuginfo-1.2.15-33.el8_0.ppc64le.rpm
SDL-debugsource-1.2.15-33.el8_0.ppc64le.rpm
SDL-devel-1.2.15-33.el8_0.ppc64le.rpm

x86_64:
SDL-1.2.15-33.el8_0.i686.rpm
SDL-1.2.15-33.el8_0.x86_64.rpm
SDL-debuginfo-1.2.15-33.el8_0.i686.rpm
SDL-debuginfo-1.2.15-33.el8_0.x86_64.rpm
SDL-debugsource-1.2.15-33.el8_0.i686.rpm
SDL-debugsource-1.2.15-33.el8_0.x86_64.rpm
SDL-devel-1.2.15-33.el8_0.i686.rpm
SDL-devel-1.2.15-33.el8_0.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-13616
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=KKI9
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=VeHu
-----END PGP SIGNATURE-----