Skip to navigation

Bug Fix Advisory SDL bug fix update

Advisory: RHBA-2011:1233-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-02-20
Last updated on: 2012-02-20
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

An updated SDL package that fixes two bugs is now available for Red Hat
Enterprise Linux 5.

Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed
to provide fast access to the graphics frame buffer and audio device.

This update fixes the following bugs:

* Prior to this update, the "dist" macro in the "Release" tag was not expanded
conditionally. As a result, building the SDL package in environments without the
defined "dist" macro could have caused building failures, or undesired warnings
could have been displayed. With this update, the "dist" macro is now expanded
conditionally by using the conditional expansion. The macro is expanded to an
empty string if not defined in the build environment. (BZ#440629)

* Prior to this update, if the SDL_WM_GrabInput() function was called when the
SDL window was not viewable (for example when the window was displayed on an
inactive workspace or out of the root window), the SDL library and thus the
current application thread blocked until the window became viewable and input
could have been grabbed. With this update, SDL_WM_GrabInput() will now return
immediately with the proper error code signaling that the grab failed.
(BZ#664771)

All users of SDL should upgrade to this updated package, which fixes these bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
SDL-1.2.10-9.el5.src.rpm     MD5: 671889a0ee16ac20ecbf81546e3c720f
SHA-256: a5d427dfd4c1e24efc5edb95ee7d8670d396c1a0b94b07f5326a96b301c1d751
 
IA-32:
SDL-devel-1.2.10-9.el5.i386.rpm     MD5: 706c721ca304e9c0f84e5347c57aebfc
SHA-256: 0c2b915808ff91110ae6648a4d076ae155b577d1a198f33955e246e86ed86ab6
 
x86_64:
SDL-devel-1.2.10-9.el5.i386.rpm     MD5: 706c721ca304e9c0f84e5347c57aebfc
SHA-256: 0c2b915808ff91110ae6648a4d076ae155b577d1a198f33955e246e86ed86ab6
SDL-devel-1.2.10-9.el5.x86_64.rpm     MD5: e27ca1cb43b6555f693301e5dd8b7513
SHA-256: f0bf37981a730a1a0694034cdd122c577d54c609a312c625a5aeba89fdcfe2a4
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
SDL-1.2.10-9.el5.src.rpm     MD5: 671889a0ee16ac20ecbf81546e3c720f
SHA-256: a5d427dfd4c1e24efc5edb95ee7d8670d396c1a0b94b07f5326a96b301c1d751
 
IA-32:
SDL-1.2.10-9.el5.i386.rpm     MD5: 6ba88a11068907525cbf8bbe20eaeb95
SHA-256: bb70ab271028d8e8eb5b70c00bab6462ef7660c6934af3ae58ec5d5541925599
SDL-devel-1.2.10-9.el5.i386.rpm     MD5: 706c721ca304e9c0f84e5347c57aebfc
SHA-256: 0c2b915808ff91110ae6648a4d076ae155b577d1a198f33955e246e86ed86ab6
 
IA-64:
SDL-1.2.10-9.el5.ia64.rpm     MD5: 22b01533fb1d095e99fe42be8f15dabe
SHA-256: 043c7b4a31bfe5da9dd8e3e515fe0680360d2dff221a2c4716998cec77bb24bb
SDL-devel-1.2.10-9.el5.ia64.rpm     MD5: a02088e792e3f2c3fc5c50b597cf3323
SHA-256: 915c18732e5f05b796a1fa9caa53453c4875211003c190e5593bc6fa6ee74817
 
PPC:
SDL-1.2.10-9.el5.ppc.rpm     MD5: ecd2c4004c37e8914fc9518b5754d184
SHA-256: 2eb43af15d04016accb0ab5457f805b28b6677bd7bb7680ddf46ee72b5566fd1
SDL-1.2.10-9.el5.ppc64.rpm     MD5: 3208feea16b00082d44192d5adafd69b
SHA-256: 79033cc350d7dc49f97d854f5a06a08f73957f35f1a1cca03456853dd42feb71
SDL-devel-1.2.10-9.el5.ppc.rpm     MD5: 81d46c58ff2238af3c10ca07b2ead47d
SHA-256: 9670d935a22ca8773e9b30232d82a3deb3a2816b82544b7a2fecfe52c27a7ef1
SDL-devel-1.2.10-9.el5.ppc64.rpm     MD5: e4619d3eadeb681ec69dc0e9a86c0b30
SHA-256: 79c67c279b551f6805055933310acfda88028b89afe621a20b878369aa1e06b3
 
s390x:
SDL-1.2.10-9.el5.s390.rpm     MD5: ac36cd89a623b58274190d16a90b06cf
SHA-256: 67539585fcfffe120b971499695d3925e445708f63aa0601520376a87f2e46b4
SDL-1.2.10-9.el5.s390x.rpm     MD5: b4744747d53718d7cd27cf5a2071e54a
SHA-256: 9a568d356babecf2c86d62d54ebca2a47cccc6edb97f8597f2338ada42c1b88b
SDL-devel-1.2.10-9.el5.s390.rpm     MD5: 8141eff0ff2a3ebe2af0129593b4bfc4
SHA-256: 8225543c4513bd3e4998cfef61102317292bda3bdb74b41cac8d0edf6c7e06ef
SDL-devel-1.2.10-9.el5.s390x.rpm     MD5: 6a69821eed697b2f3485471b93816d8a
SHA-256: 0742162aa4b45bac4c960e46695ce945cc05168ba77ad8eaff4e73d01860fb67
 
x86_64:
SDL-1.2.10-9.el5.i386.rpm     MD5: 6ba88a11068907525cbf8bbe20eaeb95
SHA-256: bb70ab271028d8e8eb5b70c00bab6462ef7660c6934af3ae58ec5d5541925599
SDL-1.2.10-9.el5.x86_64.rpm     MD5: 61112c6482979e8f960c019a723e83aa
SHA-256: cd549b33883d20cccce3d22dd14687711b5520cbf16c1cd8c38ccfcf57612da9
SDL-devel-1.2.10-9.el5.i386.rpm     MD5: 706c721ca304e9c0f84e5347c57aebfc
SHA-256: 0c2b915808ff91110ae6648a4d076ae155b577d1a198f33955e246e86ed86ab6
SDL-devel-1.2.10-9.el5.x86_64.rpm     MD5: e27ca1cb43b6555f693301e5dd8b7513
SHA-256: f0bf37981a730a1a0694034cdd122c577d54c609a312c625a5aeba89fdcfe2a4
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
SDL-1.2.10-9.el5.src.rpm     MD5: 671889a0ee16ac20ecbf81546e3c720f
SHA-256: a5d427dfd4c1e24efc5edb95ee7d8670d396c1a0b94b07f5326a96b301c1d751
 
IA-32:
SDL-1.2.10-9.el5.i386.rpm     MD5: 6ba88a11068907525cbf8bbe20eaeb95
SHA-256: bb70ab271028d8e8eb5b70c00bab6462ef7660c6934af3ae58ec5d5541925599
 
x86_64:
SDL-1.2.10-9.el5.i386.rpm     MD5: 6ba88a11068907525cbf8bbe20eaeb95
SHA-256: bb70ab271028d8e8eb5b70c00bab6462ef7660c6934af3ae58ec5d5541925599
SDL-1.2.10-9.el5.x86_64.rpm     MD5: 61112c6482979e8f960c019a723e83aa
SHA-256: cd549b33883d20cccce3d22dd14687711b5520cbf16c1cd8c38ccfcf57612da9
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

440629 - there should be %{?dist} instead of %{dist} in the *.spec on the Release: line
664771 - changing workspace during SDL_WM_GrabInput leaves SDL client stuck



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/