blob: 9ddf1b008c41cfd1c25ed88f822e2a31ea9176e4 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200511-03">
<title>giflib: Multiple vulnerabilities</title>
giflib may dereference NULL or write out of bounds when processing
malformed images, potentially resulting in Denial of Service or arbitrary
code execution.
<product type="ebuild">giflib</product>
<announced>November 04, 2005</announced>
<revised>November 04, 2005: 01</revised>
<package name="media-libs/giflib" auto="yes" arch="*">
<unaffected range="ge">4.1.4</unaffected>
<vulnerable range="lt">4.1.4</vulnerable>
giflib is a library for reading and writing GIF images.
Chris Evans and Daniel Eisenbud independently discovered two
out-of-bounds memory write operations and a NULL pointer dereference in
<impact type="normal">
An attacker could craft a malicious GIF image and entice users to
load it using an application making use of the giflib library,
resulting in an application crash or potentially the execution of
arbitrary code.
There is no known workaround at this time.
All giflib users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-libs/giflib-4.1.4&quot;</code>
<uri link="">CVE-2005-2974</uri>
<uri link="">CVE-2005-3350</uri>
<metadata tag="requester" timestamp="Sat, 29 Oct 2005 09:30:14 +0000">
<metadata tag="submitter" timestamp="Wed, 02 Nov 2005 12:50:36 +0000">
<metadata tag="bugReady" timestamp="Fri, 04 Nov 2005 08:45:23 +0000">