{"schema_version":"1.7.2","id":"OESA-2024-1757","modified":"2024-06-28T11:08:20Z","published":"2024-06-28T11:08:20Z","upstream":["CVE-2020-23922","CVE-2023-48161"],"summary":"giflib security update","details":"giflib is a library of gif images and provides utilities for processing images.\r\n\r\n\r\n\r\nSecurity Fix(es):\r\n\r\nAn issue was discovered in giflib through 5.1.4. DumpScreen2RGB in gif2rgb.c has a heap-based buffer over-read.(CVE-2020-23922)\r\n\r\nBuffer Overflow vulnerability in GifLib Project GifLib v.5.2.1 allows a local attacker to obtain sensitive information via the DumpSCreen2RGB function in gif2rgb.c(CVE-2023-48161)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP4","name":"giflib","purl":"pkg:rpm/openEuler/giflib\u0026distro=openEuler-20.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.2.2-1.oe2003sp4"}]}],"ecosystem_specific":{"aarch64":["giflib-debuginfo-5.2.2-1.oe2003sp4.aarch64.rpm","giflib-devel-5.2.2-1.oe2003sp4.aarch64.rpm","giflib-5.2.2-1.oe2003sp4.aarch64.rpm","giflib-debugsource-5.2.2-1.oe2003sp4.aarch64.rpm","giflib-utils-5.2.2-1.oe2003sp4.aarch64.rpm"],"noarch":["giflib-help-5.2.2-1.oe2003sp4.noarch.rpm"],"src":["giflib-5.2.2-1.oe2003sp4.src.rpm"],"x86_64":["giflib-utils-5.2.2-1.oe2003sp4.x86_64.rpm","giflib-debuginfo-5.2.2-1.oe2003sp4.x86_64.rpm","giflib-devel-5.2.2-1.oe2003sp4.x86_64.rpm","giflib-5.2.2-1.oe2003sp4.x86_64.rpm","giflib-debugsource-5.2.2-1.oe2003sp4.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS-SP1","name":"giflib","purl":"pkg:rpm/openEuler/giflib\u0026distro=openEuler-22.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.2.2-1.oe2203sp1"}]}],"ecosystem_specific":{"aarch64":["giflib-5.2.2-1.oe2203sp1.aarch64.rpm","giflib-devel-5.2.2-1.oe2203sp1.aarch64.rpm","giflib-utils-5.2.2-1.oe2203sp1.aarch64.rpm"],"noarch":["giflib-help-5.2.2-1.oe2203sp1.noarch.rpm"],"src":["giflib-5.2.2-1.oe2203sp1.src.rpm"],"x86_64":["giflib-5.2.2-1.oe2203sp1.x86_64.rpm","giflib-devel-5.2.2-1.oe2203sp1.x86_64.rpm","giflib-utils-5.2.2-1.oe2203sp1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS-SP3","name":"giflib","purl":"pkg:rpm/openEuler/giflib\u0026distro=openEuler-22.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.2.2-1.oe2203sp3"}]}],"ecosystem_specific":{"aarch64":["giflib-devel-5.2.2-1.oe2203sp3.aarch64.rpm","giflib-utils-5.2.2-1.oe2203sp3.aarch64.rpm","giflib-5.2.2-1.oe2203sp3.aarch64.rpm"],"noarch":["giflib-help-5.2.2-1.oe2203sp3.noarch.rpm"],"src":["giflib-5.2.2-1.oe2203sp3.src.rpm"],"x86_64":["giflib-utils-5.2.2-1.oe2203sp3.x86_64.rpm","giflib-devel-5.2.2-1.oe2203sp3.x86_64.rpm","giflib-5.2.2-1.oe2203sp3.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:24.03-LTS","name":"giflib","purl":"pkg:rpm/openEuler/giflib\u0026distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.2.2-1.oe2403"}]}],"ecosystem_specific":{"aarch64":["giflib-devel-5.2.2-1.oe2403.aarch64.rpm","giflib-utils-5.2.2-1.oe2403.aarch64.rpm","giflib-5.2.2-1.oe2403.aarch64.rpm"],"noarch":["giflib-help-5.2.2-1.oe2403.noarch.rpm"],"src":["giflib-5.2.2-1.oe2403.src.rpm"],"x86_64":["giflib-utils-5.2.2-1.oe2403.x86_64.rpm","giflib-devel-5.2.2-1.oe2403.x86_64.rpm","giflib-5.2.2-1.oe2403.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1757"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-23922"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-48161"}],"database_specific":{"severity":"High"}}