Lucene search

K
debianDebianDEBIAN:DLA-3223-1:D31B8
HistoryDec 05, 2022 - 12:19 p.m.

[SECURITY] [DLA 3223-1] giflib security update

2022-12-0512:19:23
lists.debian.org
15
debian lts
giflib
cve-2018-11490
cve-2019-15133
buffer overflow
denial of service
decoder function

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.003

Percentile

68.5%


Debian LTS Advisory DLA-3223-1 [email protected]
https://www.debian.org/lts/security/ Helmut Grohne
December 05, 2022 https://wiki.debian.org/LTS

Package : giflib
Version : 5.1.4-3+deb10u1
CVE ID : CVE-2018-11490 CVE-2019-15133
Debian Bug : 904114

This update fixes two file format vulnerabilities in giflib.

CVE-2018-11490

The DGifDecompressLine function in dgif_lib.c, as later shipped in
cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a
certain "Private->RunningCode - 2" array index is not checked.  This
will lead to a denial of service or possibly unspecified other
impact.

CVE-2019-15133

A malformed GIF file triggers a divide-by-zero exception in the
decoder function DGifSlurp in dgif_lib.c if the height field of the
ImageSize data structure is equal to zero.

For Debian 10 buster, these problems have been fixed in version
5.1.4-3+deb10u1.

We recommend that you upgrade your giflib packages.

For the detailed security status of giflib please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/giflib

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.003

Percentile

68.5%