SDL security update for heap-based buffer overflow in blit functions
Reporter | Title | Published | Views | Family All 132 |
---|---|---|---|---|
![]() | CentOS 8 : SDL (CESA-2019:3951) | 29 Jan 202100:00 | – | nessus |
![]() | EulerOS 2.0 SP8 : SDL (EulerOS-SA-2019-2117) | 12 Nov 201900:00 | – | nessus |
![]() | Fedora 31 : SDL (2019-f5558abfef) | 7 Oct 201900:00 | – | nessus |
![]() | SUSE SLED15 / SLES15 Security Update : SDL (SUSE-SU-2020:3261-1) | 9 Dec 202000:00 | – | nessus |
![]() | Fedora 29 : SDL (2019-e08f78d4a6) | 9 Sep 201900:00 | – | nessus |
![]() | EulerOS 2.0 SP8 : SDL2 (EulerOS-SA-2019-2118) | 12 Nov 201900:00 | – | nessus |
![]() | EulerOS 2.0 SP5 : SDL (EulerOS-SA-2019-2187) | 8 Nov 201900:00 | – | nessus |
![]() | Oracle Linux 8 : SDL (ELSA-2019-3951) | 27 Nov 201900:00 | – | nessus |
![]() | RHEL 7 : SDL (RHSA-2019:3950) | 26 Nov 201900:00 | – | nessus |
![]() | openSUSE Security Update : SDL (openSUSE-2020-1916) | 17 Nov 202000:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 7 | s390x | sdl-devel | 1.2.15-14.el7_7 | SDL-devel-1.2.15-14.el7_7.s390x.rpm |
RedHat | 7 | ppc64 | sdl-debuginfo | 1.2.15-14.el7_7 | SDL-debuginfo-1.2.15-14.el7_7.ppc64.rpm |
RedHat | 7 | s390 | sdl-static | 1.2.15-14.el7_7 | SDL-static-1.2.15-14.el7_7.s390.rpm |
RedHat | 7 | x86_64 | sdl-debuginfo | 1.2.15-14.el7_7 | SDL-debuginfo-1.2.15-14.el7_7.x86_64.rpm |
RedHat | 7 | i686 | sdl | 1.2.15-14.el7_7 | SDL-1.2.15-14.el7_7.i686.rpm |
RedHat | 7 | ppc64 | sdl | 1.2.15-14.el7_7 | SDL-1.2.15-14.el7_7.ppc64.rpm |
RedHat | 7 | i686 | sdl-debuginfo | 1.2.15-14.el7_7 | SDL-debuginfo-1.2.15-14.el7_7.i686.rpm |
RedHat | 7 | s390 | sdl | 1.2.15-14.el7_7 | SDL-1.2.15-14.el7_7.s390.rpm |
RedHat | 7 | x86_64 | sdl-devel | 1.2.15-14.el7_7 | SDL-devel-1.2.15-14.el7_7.x86_64.rpm |
RedHat | 7 | x86_64 | sdl-static | 1.2.15-14.el7_7 | SDL-static-1.2.15-14.el7_7.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo