Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-39742 (GCVE-0-2023-39742)
Vulnerability from cvelistv5 – Published: 2023-08-25 00:00 – Updated: 2024-10-02 16:35
VLAI?
EPSS
Summary
giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |
|---|---|---|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:18:09.768Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://sourceforge.net/p/giflib/bugs/166/"
},
{
"tags": [
"x_transferred"
],
"url": "https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084"
},
{
"name": "FEDORA-2023-1b5f6f4eb2",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O4RLSFGPBPR3FMIUJCWPGVIYIU35YGQX/"
},
{
"name": "FEDORA-2023-6ce92a5bdc",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5WO6WL2TCGO6T4VKGACDIVSZI74WJAU/"
},
{
"name": "FEDORA-2023-88f7d670fe",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPNBOB65TEA4ZEPLVENI26BY4LEX7TEF/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-39742",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-02T16:35:20.862076Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-02T16:35:30.415Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-09-30T04:06:21.087Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://sourceforge.net/p/giflib/bugs/166/"
},
{
"url": "https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084"
},
{
"name": "FEDORA-2023-1b5f6f4eb2",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O4RLSFGPBPR3FMIUJCWPGVIYIU35YGQX/"
},
{
"name": "FEDORA-2023-6ce92a5bdc",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5WO6WL2TCGO6T4VKGACDIVSZI74WJAU/"
},
{
"name": "FEDORA-2023-88f7d670fe",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPNBOB65TEA4ZEPLVENI26BY4LEX7TEF/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-39742",
"datePublished": "2023-08-25T00:00:00.000Z",
"dateReserved": "2023-08-07T00:00:00.000Z",
"dateUpdated": "2024-10-02T16:35:30.415Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-39742\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2023-08-25T14:15:09.763\",\"lastModified\":\"2024-11-21T08:15:54.413\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto que giflib v5.2.1 contiene un fallo de segmentaci\u00f3n a trav\u00e9s del componente getarg.c.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:giflib_project:giflib:5.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56EF3DF1-6D2B-45E4-A2BF-C27C34DA08C7\"}]}]}],\"references\":[{\"url\":\"https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O4RLSFGPBPR3FMIUJCWPGVIYIU35YGQX/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPNBOB65TEA4ZEPLVENI26BY4LEX7TEF/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5WO6WL2TCGO6T4VKGACDIVSZI74WJAU/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://sourceforge.net/p/giflib/bugs/166/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O4RLSFGPBPR3FMIUJCWPGVIYIU35YGQX/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPNBOB65TEA4ZEPLVENI26BY4LEX7TEF/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5WO6WL2TCGO6T4VKGACDIVSZI74WJAU/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://sourceforge.net/p/giflib/bugs/166/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://sourceforge.net/p/giflib/bugs/166/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O4RLSFGPBPR3FMIUJCWPGVIYIU35YGQX/\", \"name\": \"FEDORA-2023-1b5f6f4eb2\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5WO6WL2TCGO6T4VKGACDIVSZI74WJAU/\", \"name\": \"FEDORA-2023-6ce92a5bdc\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPNBOB65TEA4ZEPLVENI26BY4LEX7TEF/\", \"name\": \"FEDORA-2023-88f7d670fe\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T18:18:09.768Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-39742\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-02T16:35:20.862076Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-02T16:35:25.825Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://sourceforge.net/p/giflib/bugs/166/\"}, {\"url\": \"https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O4RLSFGPBPR3FMIUJCWPGVIYIU35YGQX/\", \"name\": \"FEDORA-2023-1b5f6f4eb2\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5WO6WL2TCGO6T4VKGACDIVSZI74WJAU/\", \"name\": \"FEDORA-2023-6ce92a5bdc\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPNBOB65TEA4ZEPLVENI26BY4LEX7TEF/\", \"name\": \"FEDORA-2023-88f7d670fe\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2023-09-30T04:06:21.087388\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-39742\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-02T16:35:30.415Z\", \"dateReserved\": \"2023-08-07T00:00:00\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2023-08-25T00:00:00\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
GHSA-29C8-646J-HVW9
Vulnerability from github – Published: 2023-08-25 15:32 – Updated: 2024-04-04 07:12
VLAI?
Details
giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c.
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2023-39742"
],
"database_specific": {
"cwe_ids": [
"CWE-120"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-08-25T14:15:09Z",
"severity": "MODERATE"
},
"details": "giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c.",
"id": "GHSA-29c8-646j-hvw9",
"modified": "2024-04-04T07:12:54Z",
"published": "2023-08-25T15:32:39Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39742"
},
{
"type": "WEB",
"url": "https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O4RLSFGPBPR3FMIUJCWPGVIYIU35YGQX"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPNBOB65TEA4ZEPLVENI26BY4LEX7TEF"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5WO6WL2TCGO6T4VKGACDIVSZI74WJAU"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O4RLSFGPBPR3FMIUJCWPGVIYIU35YGQX"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPNBOB65TEA4ZEPLVENI26BY4LEX7TEF"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T5WO6WL2TCGO6T4VKGACDIVSZI74WJAU"
},
{
"type": "WEB",
"url": "https://sourceforge.net/p/giflib/bugs/166"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2023-39742
Vulnerability from gsd - Updated: 2023-12-13 01:20Details
giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2023-39742",
"id": "GSD-2023-39742"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-39742"
],
"details": "giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c.",
"id": "GSD-2023-39742",
"modified": "2023-12-13T01:20:33.407392Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2023-39742",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://sourceforge.net/p/giflib/bugs/166/",
"refsource": "MISC",
"url": "https://sourceforge.net/p/giflib/bugs/166/"
},
{
"name": "https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084",
"refsource": "MISC",
"url": "https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084"
},
{
"name": "FEDORA-2023-1b5f6f4eb2",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O4RLSFGPBPR3FMIUJCWPGVIYIU35YGQX/"
},
{
"name": "FEDORA-2023-6ce92a5bdc",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T5WO6WL2TCGO6T4VKGACDIVSZI74WJAU/"
},
{
"name": "FEDORA-2023-88f7d670fe",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPNBOB65TEA4ZEPLVENI26BY4LEX7TEF/"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:giflib_project:giflib:5.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2023-39742"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084"
},
{
"name": "https://sourceforge.net/p/giflib/bugs/166/",
"refsource": "MISC",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://sourceforge.net/p/giflib/bugs/166/"
},
{
"name": "FEDORA-2023-1b5f6f4eb2",
"refsource": "FEDORA",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O4RLSFGPBPR3FMIUJCWPGVIYIU35YGQX/"
},
{
"name": "FEDORA-2023-6ce92a5bdc",
"refsource": "FEDORA",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T5WO6WL2TCGO6T4VKGACDIVSZI74WJAU/"
},
{
"name": "FEDORA-2023-88f7d670fe",
"refsource": "FEDORA",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPNBOB65TEA4ZEPLVENI26BY4LEX7TEF/"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-09-30T05:15Z",
"publishedDate": "2023-08-25T14:15Z"
}
}
}
MSRC_CVE-2023-39742
Vulnerability from csaf_microsoft - Published: 2023-08-01 00:00 - Updated: 2026-02-18 03:08Summary
giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c.
Notes
Additional Resources: To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer: The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
5.5 (Medium)
Vendor Fix
5.2.1-8:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
https://learn.microsoft.com/en-us/azure/azure-lin…
References
| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2023-39742 giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2023-39742.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c.",
"tracking": {
"current_release_date": "2026-02-18T03:08:57.000Z",
"generator": {
"date": "2026-02-18T08:24:42.036Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2023-39742",
"initial_release_date": "2023-08-01T00:00:00.000Z",
"revision_history": [
{
"date": "2025-02-17T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2025-02-20T00:00:00.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2026-02-18T03:08:57.000Z",
"legacy_version": "2.1",
"number": "3",
"summary": "Information published."
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 giflib 5.2.1-10",
"product": {
"name": "\u003cazl3 giflib 5.2.1-10",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 giflib 5.2.1-10",
"product": {
"name": "azl3 giflib 5.2.1-10",
"product_id": "19085"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 giflib 5.2.1-8",
"product": {
"name": "\u003ccbl2 giflib 5.2.1-8",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "cbl2 giflib 5.2.1-8",
"product": {
"name": "cbl2 giflib 5.2.1-8",
"product_id": "18325"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 giflib 5.2.1-8",
"product": {
"name": "\u003cazl3 giflib 5.2.1-8",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "azl3 giflib 5.2.1-8",
"product": {
"name": "azl3 giflib 5.2.1-8",
"product_id": "18326"
}
}
],
"category": "product_name",
"name": "giflib"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 giflib 5.2.1-10 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 giflib 5.2.1-10 as a component of Azure Linux 3.0",
"product_id": "19085-17084"
},
"product_reference": "19085",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 giflib 5.2.1-8 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 giflib 5.2.1-8 as a component of CBL Mariner 2.0",
"product_id": "18325-17086"
},
"product_reference": "18325",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 giflib 5.2.1-8 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 giflib 5.2.1-8 as a component of Azure Linux 3.0",
"product_id": "18326-17084"
},
"product_reference": "18326",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39742",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0026#39;Classic Buffer Overflow\u0026#39;)"
},
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19085-17084",
"18325-17086",
"18326-17084"
],
"known_affected": [
"17084-1",
"17086-3",
"17084-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-39742 giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2023-39742.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-17T00:00:00.000Z",
"details": "5.2.1-8:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1",
"17086-3",
"17084-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"17084-1",
"17086-3",
"17084-2"
]
}
],
"title": "giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c."
}
]
}
BDU:2023-05863
Vulnerability from fstec - Published: 25.08.2023
VLAI Severity ?
Title
Уязвимость компонента getarg.c библиотеки для работы с GIF файлами GIFLIB, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость компонента getarg.c библиотеки для работы с GIF файлами GIFLIB связана с ошибкой сегментации. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании
Severity ?
Vendor
Red Hat Inc., ООО «Ред Софт», АО «НТЦ ИТ РОСА», The GIFLIB project
Software Name
Red Hat Enterprise Linux, РЕД ОС (запись в едином реестре российских программ №3751), РОСА ХРОМ (запись в едином реестре российских программ №1607), GIFLIB
Software Version
8 (Red Hat Enterprise Linux), 7.3 (РЕД ОС), 9 (Red Hat Enterprise Linux), 12.4 (РОСА ХРОМ), до 5.2.1 (GIFLIB)
Possible Mitigations
Для РедОС: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
Для GIFLIB:
https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084
https://sourceforge.net/p/giflib/bugs/166/
Для программных продуктов Red Hat Inc.:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2023-39742
Для операционной системы РОСА ХРОМ: https://abf.rosa.ru/advisories/ROSA-SA-2024-2434
Reference
https://redos.red-soft.ru/support/secure/
https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084
https://sourceforge.net/p/giflib/bugs/166/
https://abf.rosa.ru/advisories/ROSA-SA-2024-2434
CWE
CWE-120
{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, \u0410\u041e \u00ab\u041d\u0422\u0426 \u0418\u0422 \u0420\u041e\u0421\u0410\u00bb, The GIFLIB project",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "8 (Red Hat Enterprise Linux), 7.3 (\u0420\u0415\u0414 \u041e\u0421), 9 (Red Hat Enterprise Linux), 12.4 (\u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c), \u0434\u043e 5.2.1 (GIFLIB)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f GIFLIB:\nhttps://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084\nhttps://sourceforge.net/p/giflib/bugs/166/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2023-39742\n\n\u0414\u043b\u044f \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c: https://abf.rosa.ru/advisories/ROSA-SA-2024-2434",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "25.08.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "05.03.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "20.09.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-05863",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-39742",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161607), GIFLIB",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 8 , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Red Hat Inc. Red Hat Enterprise Linux 9 , \u0410\u041e \u00ab\u041d\u0422\u0426 \u0418\u0422 \u0420\u041e\u0421\u0410\u00bb \u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c 12.4 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161607)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 getarg.c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u0434\u043b\u044f \u0440\u0430\u0431\u043e\u0442\u044b \u0441 GIF \u0444\u0430\u0439\u043b\u0430\u043c\u0438 GIFLIB, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u0431\u0435\u0437 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0440\u0430\u0437\u043c\u0435\u0440\u0430 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (\u043a\u043b\u0430\u0441\u0441\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430) (CWE-120)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 getarg.c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u0434\u043b\u044f \u0440\u0430\u0431\u043e\u0442\u044b \u0441 GIF \u0444\u0430\u0439\u043b\u0430\u043c\u0438 GIFLIB \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u043e\u0439 \u0441\u0435\u0433\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://redos.red-soft.ru/support/secure/\nhttps://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084\nhttps://sourceforge.net/p/giflib/bugs/166/\nhttps://abf.rosa.ru/advisories/ROSA-SA-2024-2434",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-120",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,5)"
}
FKIE_CVE-2023-39742
Vulnerability from fkie_nvd - Published: 2023-08-25 14:15 - Updated: 2024-11-21 08:15
Severity ?
Summary
giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| giflib_project | giflib | 5.2.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:giflib_project:giflib:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "56EF3DF1-6D2B-45E4-A2BF-C27C34DA08C7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c."
},
{
"lang": "es",
"value": "Se ha descubierto que giflib v5.2.1 contiene un fallo de segmentaci\u00f3n a trav\u00e9s del componente getarg.c."
}
],
"id": "CVE-2023-39742",
"lastModified": "2024-11-21T08:15:54.413",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-08-25T14:15:09.763",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O4RLSFGPBPR3FMIUJCWPGVIYIU35YGQX/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPNBOB65TEA4ZEPLVENI26BY4LEX7TEF/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5WO6WL2TCGO6T4VKGACDIVSZI74WJAU/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://sourceforge.net/p/giflib/bugs/166/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O4RLSFGPBPR3FMIUJCWPGVIYIU35YGQX/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPNBOB65TEA4ZEPLVENI26BY4LEX7TEF/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5WO6WL2TCGO6T4VKGACDIVSZI74WJAU/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://sourceforge.net/p/giflib/bugs/166/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
SUSE-SU-2024:2607-1
Vulnerability from csaf_suse - Published: 2024-07-25 21:52 - Updated: 2024-07-25 21:52Summary
Security update for giflib
Severity
Important
Notes
Title of the patch: Security update for giflib
Description of the patch: This update for giflib fixes the following issues:
- CVE-2022-28506: Fixed heap buffer overflow in function DumpScreen2RGB() (bsc#1198880)
- CVE-2023-39742: Fixed segmentation fault via the component getarg.c (bsc#1214678)
Patchnames: SUSE-2024-2607,SUSE-SLE-SDK-12-SP5-2024-2607,SUSE-SLE-SERVER-12-SP5-2024-2607
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for giflib",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for giflib fixes the following issues:\n\n- CVE-2022-28506: Fixed heap buffer overflow in function DumpScreen2RGB() (bsc#1198880)\n- CVE-2023-39742: Fixed segmentation fault via the component getarg.c (bsc#1214678)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2607,SUSE-SLE-SDK-12-SP5-2024-2607,SUSE-SLE-SERVER-12-SP5-2024-2607",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2607-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2607-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242607-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2607-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-July/036120.html"
},
{
"category": "self",
"summary": "SUSE Bug 1198880",
"url": "https://bugzilla.suse.com/1198880"
},
{
"category": "self",
"summary": "SUSE Bug 1214678",
"url": "https://bugzilla.suse.com/1214678"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28506 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28506/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39742 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39742/"
}
],
"title": "Security update for giflib",
"tracking": {
"current_release_date": "2024-07-25T21:52:04Z",
"generator": {
"date": "2024-07-25T21:52:04Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2607-1",
"initial_release_date": "2024-07-25T21:52:04Z",
"revision_history": [
{
"date": "2024-07-25T21:52:04Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "giflib-devel-5.0.5-13.6.1.aarch64",
"product": {
"name": "giflib-devel-5.0.5-13.6.1.aarch64",
"product_id": "giflib-devel-5.0.5-13.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "giflib-progs-5.0.5-13.6.1.aarch64",
"product": {
"name": "giflib-progs-5.0.5-13.6.1.aarch64",
"product_id": "giflib-progs-5.0.5-13.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgif6-5.0.5-13.6.1.aarch64",
"product": {
"name": "libgif6-5.0.5-13.6.1.aarch64",
"product_id": "libgif6-5.0.5-13.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "giflib-devel-64bit-5.0.5-13.6.1.aarch64_ilp32",
"product": {
"name": "giflib-devel-64bit-5.0.5-13.6.1.aarch64_ilp32",
"product_id": "giflib-devel-64bit-5.0.5-13.6.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgif6-64bit-5.0.5-13.6.1.aarch64_ilp32",
"product": {
"name": "libgif6-64bit-5.0.5-13.6.1.aarch64_ilp32",
"product_id": "libgif6-64bit-5.0.5-13.6.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "giflib-devel-5.0.5-13.6.1.i586",
"product": {
"name": "giflib-devel-5.0.5-13.6.1.i586",
"product_id": "giflib-devel-5.0.5-13.6.1.i586"
}
},
{
"category": "product_version",
"name": "giflib-progs-5.0.5-13.6.1.i586",
"product": {
"name": "giflib-progs-5.0.5-13.6.1.i586",
"product_id": "giflib-progs-5.0.5-13.6.1.i586"
}
},
{
"category": "product_version",
"name": "libgif6-5.0.5-13.6.1.i586",
"product": {
"name": "libgif6-5.0.5-13.6.1.i586",
"product_id": "libgif6-5.0.5-13.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "giflib-devel-5.0.5-13.6.1.ppc64le",
"product": {
"name": "giflib-devel-5.0.5-13.6.1.ppc64le",
"product_id": "giflib-devel-5.0.5-13.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "giflib-progs-5.0.5-13.6.1.ppc64le",
"product": {
"name": "giflib-progs-5.0.5-13.6.1.ppc64le",
"product_id": "giflib-progs-5.0.5-13.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgif6-5.0.5-13.6.1.ppc64le",
"product": {
"name": "libgif6-5.0.5-13.6.1.ppc64le",
"product_id": "libgif6-5.0.5-13.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "giflib-devel-5.0.5-13.6.1.s390",
"product": {
"name": "giflib-devel-5.0.5-13.6.1.s390",
"product_id": "giflib-devel-5.0.5-13.6.1.s390"
}
},
{
"category": "product_version",
"name": "giflib-progs-5.0.5-13.6.1.s390",
"product": {
"name": "giflib-progs-5.0.5-13.6.1.s390",
"product_id": "giflib-progs-5.0.5-13.6.1.s390"
}
},
{
"category": "product_version",
"name": "libgif6-5.0.5-13.6.1.s390",
"product": {
"name": "libgif6-5.0.5-13.6.1.s390",
"product_id": "libgif6-5.0.5-13.6.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "giflib-devel-5.0.5-13.6.1.s390x",
"product": {
"name": "giflib-devel-5.0.5-13.6.1.s390x",
"product_id": "giflib-devel-5.0.5-13.6.1.s390x"
}
},
{
"category": "product_version",
"name": "giflib-devel-32bit-5.0.5-13.6.1.s390x",
"product": {
"name": "giflib-devel-32bit-5.0.5-13.6.1.s390x",
"product_id": "giflib-devel-32bit-5.0.5-13.6.1.s390x"
}
},
{
"category": "product_version",
"name": "giflib-progs-5.0.5-13.6.1.s390x",
"product": {
"name": "giflib-progs-5.0.5-13.6.1.s390x",
"product_id": "giflib-progs-5.0.5-13.6.1.s390x"
}
},
{
"category": "product_version",
"name": "libgif6-5.0.5-13.6.1.s390x",
"product": {
"name": "libgif6-5.0.5-13.6.1.s390x",
"product_id": "libgif6-5.0.5-13.6.1.s390x"
}
},
{
"category": "product_version",
"name": "libgif6-32bit-5.0.5-13.6.1.s390x",
"product": {
"name": "libgif6-32bit-5.0.5-13.6.1.s390x",
"product_id": "libgif6-32bit-5.0.5-13.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "giflib-devel-5.0.5-13.6.1.x86_64",
"product": {
"name": "giflib-devel-5.0.5-13.6.1.x86_64",
"product_id": "giflib-devel-5.0.5-13.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "giflib-devel-32bit-5.0.5-13.6.1.x86_64",
"product": {
"name": "giflib-devel-32bit-5.0.5-13.6.1.x86_64",
"product_id": "giflib-devel-32bit-5.0.5-13.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "giflib-progs-5.0.5-13.6.1.x86_64",
"product": {
"name": "giflib-progs-5.0.5-13.6.1.x86_64",
"product_id": "giflib-progs-5.0.5-13.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgif6-5.0.5-13.6.1.x86_64",
"product": {
"name": "libgif6-5.0.5-13.6.1.x86_64",
"product_id": "libgif6-5.0.5-13.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgif6-32bit-5.0.5-13.6.1.x86_64",
"product": {
"name": "libgif6-32bit-5.0.5-13.6.1.x86_64",
"product_id": "libgif6-32bit-5.0.5-13.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "giflib-devel-5.0.5-13.6.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.aarch64"
},
"product_reference": "giflib-devel-5.0.5-13.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "giflib-devel-5.0.5-13.6.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.ppc64le"
},
"product_reference": "giflib-devel-5.0.5-13.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "giflib-devel-5.0.5-13.6.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.s390x"
},
"product_reference": "giflib-devel-5.0.5-13.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "giflib-devel-5.0.5-13.6.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.x86_64"
},
"product_reference": "giflib-devel-5.0.5-13.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "giflib-progs-5.0.5-13.6.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.aarch64"
},
"product_reference": "giflib-progs-5.0.5-13.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "giflib-progs-5.0.5-13.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.ppc64le"
},
"product_reference": "giflib-progs-5.0.5-13.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "giflib-progs-5.0.5-13.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.s390x"
},
"product_reference": "giflib-progs-5.0.5-13.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "giflib-progs-5.0.5-13.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.x86_64"
},
"product_reference": "giflib-progs-5.0.5-13.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgif6-5.0.5-13.6.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.aarch64"
},
"product_reference": "libgif6-5.0.5-13.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgif6-5.0.5-13.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.ppc64le"
},
"product_reference": "libgif6-5.0.5-13.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgif6-5.0.5-13.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.s390x"
},
"product_reference": "libgif6-5.0.5-13.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgif6-5.0.5-13.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.x86_64"
},
"product_reference": "libgif6-5.0.5-13.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgif6-32bit-5.0.5-13.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libgif6-32bit-5.0.5-13.6.1.s390x"
},
"product_reference": "libgif6-32bit-5.0.5-13.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgif6-32bit-5.0.5-13.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libgif6-32bit-5.0.5-13.6.1.x86_64"
},
"product_reference": "libgif6-32bit-5.0.5-13.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "giflib-progs-5.0.5-13.6.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.aarch64"
},
"product_reference": "giflib-progs-5.0.5-13.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "giflib-progs-5.0.5-13.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.ppc64le"
},
"product_reference": "giflib-progs-5.0.5-13.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "giflib-progs-5.0.5-13.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.s390x"
},
"product_reference": "giflib-progs-5.0.5-13.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "giflib-progs-5.0.5-13.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.x86_64"
},
"product_reference": "giflib-progs-5.0.5-13.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgif6-5.0.5-13.6.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.aarch64"
},
"product_reference": "libgif6-5.0.5-13.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgif6-5.0.5-13.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.ppc64le"
},
"product_reference": "libgif6-5.0.5-13.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgif6-5.0.5-13.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.s390x"
},
"product_reference": "libgif6-5.0.5-13.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgif6-5.0.5-13.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.x86_64"
},
"product_reference": "libgif6-5.0.5-13.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgif6-32bit-5.0.5-13.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-32bit-5.0.5-13.6.1.s390x"
},
"product_reference": "libgif6-32bit-5.0.5-13.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgif6-32bit-5.0.5-13.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-32bit-5.0.5-13.6.1.x86_64"
},
"product_reference": "libgif6-32bit-5.0.5-13.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-28506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28506"
}
],
"notes": [
{
"category": "general",
"text": "There is a heap-buffer-overflow in GIFLIB 5.2.1 function DumpScreen2RGB() in gif2rgb.c:298:45.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libgif6-32bit-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libgif6-32bit-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-32bit-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-32bit-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28506",
"url": "https://www.suse.com/security/cve/CVE-2022-28506"
},
{
"category": "external",
"summary": "SUSE Bug 1198880 for CVE-2022-28506",
"url": "https://bugzilla.suse.com/1198880"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libgif6-32bit-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libgif6-32bit-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-32bit-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-32bit-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libgif6-32bit-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libgif6-32bit-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-32bit-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-32bit-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-25T21:52:04Z",
"details": "moderate"
}
],
"title": "CVE-2022-28506"
},
{
"cve": "CVE-2023-39742",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39742"
}
],
"notes": [
{
"category": "general",
"text": "giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libgif6-32bit-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libgif6-32bit-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-32bit-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-32bit-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39742",
"url": "https://www.suse.com/security/cve/CVE-2023-39742"
},
{
"category": "external",
"summary": "SUSE Bug 1214678 for CVE-2023-39742",
"url": "https://bugzilla.suse.com/1214678"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libgif6-32bit-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libgif6-32bit-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-32bit-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-32bit-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:giflib-progs-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libgif6-32bit-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libgif6-32bit-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libgif6-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:giflib-progs-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-32bit-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-32bit-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libgif6-5.0.5-13.6.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:giflib-devel-5.0.5-13.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-25T21:52:04Z",
"details": "low"
}
],
"title": "CVE-2023-39742"
}
]
}
SUSE-SU-2026:1005-1
Vulnerability from csaf_suse - Published: 2026-03-25 09:32 - Updated: 2026-03-25 09:32Summary
Security update for giflib
Severity
Moderate
Notes
Title of the patch: Security update for giflib
Description of the patch: This update for giflib fixes the following issues:
- CVE-2026-23868: double-free result of a shallow copy can lead to memory corruption (bsc#1259502).
Patchnames: SUSE-2026-1005,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-1005
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.8 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for giflib",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for giflib fixes the following issues:\n\n- CVE-2026-23868: double-free result of a shallow copy can lead to memory corruption (bsc#1259502).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1005,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-1005",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1005-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1005-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261005-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1005-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024923.html"
},
{
"category": "self",
"summary": "SUSE Bug 1259502",
"url": "https://bugzilla.suse.com/1259502"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39742 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39742/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23868 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23868/"
}
],
"title": "Security update for giflib",
"tracking": {
"current_release_date": "2026-03-25T09:32:48Z",
"generator": {
"date": "2026-03-25T09:32:48Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1005-1",
"initial_release_date": "2026-03-25T09:32:48Z",
"revision_history": [
{
"date": "2026-03-25T09:32:48Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "giflib-devel-5.0.6-13.12.1.aarch64",
"product": {
"name": "giflib-devel-5.0.6-13.12.1.aarch64",
"product_id": "giflib-devel-5.0.6-13.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "giflib-progs-5.0.6-13.12.1.aarch64",
"product": {
"name": "giflib-progs-5.0.6-13.12.1.aarch64",
"product_id": "giflib-progs-5.0.6-13.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgif6-5.0.6-13.12.1.aarch64",
"product": {
"name": "libgif6-5.0.6-13.12.1.aarch64",
"product_id": "libgif6-5.0.6-13.12.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "giflib-devel-64bit-5.0.6-13.12.1.aarch64_ilp32",
"product": {
"name": "giflib-devel-64bit-5.0.6-13.12.1.aarch64_ilp32",
"product_id": "giflib-devel-64bit-5.0.6-13.12.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgif6-64bit-5.0.6-13.12.1.aarch64_ilp32",
"product": {
"name": "libgif6-64bit-5.0.6-13.12.1.aarch64_ilp32",
"product_id": "libgif6-64bit-5.0.6-13.12.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "giflib-devel-5.0.6-13.12.1.i586",
"product": {
"name": "giflib-devel-5.0.6-13.12.1.i586",
"product_id": "giflib-devel-5.0.6-13.12.1.i586"
}
},
{
"category": "product_version",
"name": "giflib-progs-5.0.6-13.12.1.i586",
"product": {
"name": "giflib-progs-5.0.6-13.12.1.i586",
"product_id": "giflib-progs-5.0.6-13.12.1.i586"
}
},
{
"category": "product_version",
"name": "libgif6-5.0.6-13.12.1.i586",
"product": {
"name": "libgif6-5.0.6-13.12.1.i586",
"product_id": "libgif6-5.0.6-13.12.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "giflib-devel-5.0.6-13.12.1.ppc64le",
"product": {
"name": "giflib-devel-5.0.6-13.12.1.ppc64le",
"product_id": "giflib-devel-5.0.6-13.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "giflib-progs-5.0.6-13.12.1.ppc64le",
"product": {
"name": "giflib-progs-5.0.6-13.12.1.ppc64le",
"product_id": "giflib-progs-5.0.6-13.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgif6-5.0.6-13.12.1.ppc64le",
"product": {
"name": "libgif6-5.0.6-13.12.1.ppc64le",
"product_id": "libgif6-5.0.6-13.12.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "giflib-devel-5.0.6-13.12.1.s390",
"product": {
"name": "giflib-devel-5.0.6-13.12.1.s390",
"product_id": "giflib-devel-5.0.6-13.12.1.s390"
}
},
{
"category": "product_version",
"name": "giflib-progs-5.0.6-13.12.1.s390",
"product": {
"name": "giflib-progs-5.0.6-13.12.1.s390",
"product_id": "giflib-progs-5.0.6-13.12.1.s390"
}
},
{
"category": "product_version",
"name": "libgif6-5.0.6-13.12.1.s390",
"product": {
"name": "libgif6-5.0.6-13.12.1.s390",
"product_id": "libgif6-5.0.6-13.12.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "giflib-devel-5.0.6-13.12.1.s390x",
"product": {
"name": "giflib-devel-5.0.6-13.12.1.s390x",
"product_id": "giflib-devel-5.0.6-13.12.1.s390x"
}
},
{
"category": "product_version",
"name": "giflib-devel-32bit-5.0.6-13.12.1.s390x",
"product": {
"name": "giflib-devel-32bit-5.0.6-13.12.1.s390x",
"product_id": "giflib-devel-32bit-5.0.6-13.12.1.s390x"
}
},
{
"category": "product_version",
"name": "giflib-progs-5.0.6-13.12.1.s390x",
"product": {
"name": "giflib-progs-5.0.6-13.12.1.s390x",
"product_id": "giflib-progs-5.0.6-13.12.1.s390x"
}
},
{
"category": "product_version",
"name": "libgif6-5.0.6-13.12.1.s390x",
"product": {
"name": "libgif6-5.0.6-13.12.1.s390x",
"product_id": "libgif6-5.0.6-13.12.1.s390x"
}
},
{
"category": "product_version",
"name": "libgif6-32bit-5.0.6-13.12.1.s390x",
"product": {
"name": "libgif6-32bit-5.0.6-13.12.1.s390x",
"product_id": "libgif6-32bit-5.0.6-13.12.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "giflib-devel-5.0.6-13.12.1.x86_64",
"product": {
"name": "giflib-devel-5.0.6-13.12.1.x86_64",
"product_id": "giflib-devel-5.0.6-13.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "giflib-devel-32bit-5.0.6-13.12.1.x86_64",
"product": {
"name": "giflib-devel-32bit-5.0.6-13.12.1.x86_64",
"product_id": "giflib-devel-32bit-5.0.6-13.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "giflib-progs-5.0.6-13.12.1.x86_64",
"product": {
"name": "giflib-progs-5.0.6-13.12.1.x86_64",
"product_id": "giflib-progs-5.0.6-13.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgif6-5.0.6-13.12.1.x86_64",
"product": {
"name": "libgif6-5.0.6-13.12.1.x86_64",
"product_id": "libgif6-5.0.6-13.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgif6-32bit-5.0.6-13.12.1.x86_64",
"product": {
"name": "libgif6-32bit-5.0.6-13.12.1.x86_64",
"product_id": "libgif6-32bit-5.0.6-13.12.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "giflib-devel-5.0.6-13.12.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:giflib-devel-5.0.6-13.12.1.x86_64"
},
"product_reference": "giflib-devel-5.0.6-13.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "giflib-progs-5.0.6-13.12.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:giflib-progs-5.0.6-13.12.1.x86_64"
},
"product_reference": "giflib-progs-5.0.6-13.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgif6-5.0.6-13.12.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgif6-5.0.6-13.12.1.x86_64"
},
"product_reference": "libgif6-5.0.6-13.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgif6-32bit-5.0.6-13.12.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgif6-32bit-5.0.6-13.12.1.x86_64"
},
"product_reference": "libgif6-32bit-5.0.6-13.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39742",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39742"
}
],
"notes": [
{
"category": "general",
"text": "giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:giflib-devel-5.0.6-13.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:giflib-progs-5.0.6-13.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgif6-32bit-5.0.6-13.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgif6-5.0.6-13.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39742",
"url": "https://www.suse.com/security/cve/CVE-2023-39742"
},
{
"category": "external",
"summary": "SUSE Bug 1214678 for CVE-2023-39742",
"url": "https://bugzilla.suse.com/1214678"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:giflib-devel-5.0.6-13.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:giflib-progs-5.0.6-13.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgif6-32bit-5.0.6-13.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgif6-5.0.6-13.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:giflib-devel-5.0.6-13.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:giflib-progs-5.0.6-13.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgif6-32bit-5.0.6-13.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgif6-5.0.6-13.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T09:32:48Z",
"details": "moderate"
}
],
"title": "CVE-2023-39742"
},
{
"cve": "CVE-2026-23868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23868"
}
],
"notes": [
{
"category": "general",
"text": "Giflib contains a double-free vulnerability that is the result of a shallow copy in GifMakeSavedImage and incorrect error handling. The conditions needed to trigger this vulnerability are difficult but may be possible.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:giflib-devel-5.0.6-13.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:giflib-progs-5.0.6-13.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgif6-32bit-5.0.6-13.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgif6-5.0.6-13.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23868",
"url": "https://www.suse.com/security/cve/CVE-2026-23868"
},
{
"category": "external",
"summary": "SUSE Bug 1259502 for CVE-2026-23868",
"url": "https://bugzilla.suse.com/1259502"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:giflib-devel-5.0.6-13.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:giflib-progs-5.0.6-13.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgif6-32bit-5.0.6-13.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgif6-5.0.6-13.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:giflib-devel-5.0.6-13.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:giflib-progs-5.0.6-13.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgif6-32bit-5.0.6-13.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libgif6-5.0.6-13.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T09:32:48Z",
"details": "moderate"
}
],
"title": "CVE-2026-23868"
}
]
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…