{"schema_version":"1.7.2","id":"OESA-2022-1645","modified":"2022-05-11T11:03:45Z","published":"2022-05-11T11:03:45Z","upstream":["CVE-2020-14409","CVE-2020-14410"],"summary":"SDL2 security update","details":"Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device.\n\r\nSecurity Fix(es):\r\n\r\nSDL (Simple DirectMedia Layer) through 2.0.12 has an Integer Overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c via a crafted .BMP file.(CVE-2020-14409)\nSDL (Simple DirectMedia Layer) through 2.0.12 has a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c via a crafted .BMP file.(CVE-2020-14410)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"SDL2","purl":"pkg:rpm/openEuler/SDL2\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.12-1.oe1"}]}],"ecosystem_specific":{"aarch64":["SDL2-2.0.12-1.oe1.aarch64.rpm","SDL2-debuginfo-2.0.12-1.oe1.aarch64.rpm","SDL2-debugsource-2.0.12-1.oe1.aarch64.rpm","SDL2-devel-2.0.12-1.oe1.aarch64.rpm"],"src":["SDL2-2.0.12-1.oe1.src.rpm"],"x86_64":["SDL2-2.0.12-1.oe1.x86_64.rpm","SDL2-debuginfo-2.0.12-1.oe1.x86_64.rpm","SDL2-debugsource-2.0.12-1.oe1.x86_64.rpm","SDL2-devel-2.0.12-1.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP3","name":"SDL2","purl":"pkg:rpm/openEuler/SDL2\u0026distro=openEuler-20.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.12-1.oe1"}]}],"ecosystem_specific":{"aarch64":["SDL2-2.0.12-1.oe1.aarch64.rpm","SDL2-debuginfo-2.0.12-1.oe1.aarch64.rpm","SDL2-debugsource-2.0.12-1.oe1.aarch64.rpm","SDL2-devel-2.0.12-1.oe1.aarch64.rpm"],"src":["SDL2-2.0.12-1.oe1.src.rpm"],"x86_64":["SDL2-2.0.12-1.oe1.x86_64.rpm","SDL2-debuginfo-2.0.12-1.oe1.x86_64.rpm","SDL2-debugsource-2.0.12-1.oe1.x86_64.rpm","SDL2-devel-2.0.12-1.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS","name":"SDL2","purl":"pkg:rpm/openEuler/SDL2\u0026distro=openEuler-22.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.12-4.oe2203"}]}],"ecosystem_specific":{"aarch64":["SDL2-2.0.12-4.oe2203.aarch64.rpm","SDL2-debuginfo-2.0.12-4.oe2203.aarch64.rpm","SDL2-debugsource-2.0.12-4.oe2203.aarch64.rpm","SDL2-devel-2.0.12-4.oe2203.aarch64.rpm","SDL2-static-2.0.12-4.oe2203.aarch64.rpm"],"src":["SDL2-2.0.12-4.oe2203.src.rpm"],"x86_64":["SDL2-2.0.12-4.oe2203.x86_64.rpm","SDL2-debuginfo-2.0.12-4.oe2203.x86_64.rpm","SDL2-debugsource-2.0.12-4.oe2203.x86_64.rpm","SDL2-devel-2.0.12-4.oe2203.x86_64.rpm","SDL2-static-2.0.12-4.oe2203.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1645"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14409"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14410"}],"database_specific":{"severity":"High"}}