MGASA-2016-0020

Source
https://advisories.mageia.org/MGASA-2016-0020.html
Import Source
https://advisories.mageia.org/MGASA-2016-0020.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2016-0020
Related
Published
2016-01-15T01:52:38Z
Modified
2016-02-17T16:50:42Z
Summary
Updated giflib packages fix security vulnerability
Details

A heap-based buffer overflow vulnerability was found in giffix utility of giflib when processing records of the type 'IMAGEDESCRECORD_TYPE' due to the allocated size of 'LineBuffer' equaling the value of the logical screen width, 'GifFileIn->SWidth', while subsequently having 'GifFileIn->Image.Width' bytes of data written to it (CVE-2015-7555).

References
Credits

Affected packages

Mageia:5 / giflib

Package

Name
giflib
Purl
pkg:rpm/mageia/giflib?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.2.3-4.2.mga5

Ecosystem specific

{
    "section": "core"
}