CVE-2016-3977

NameCVE-2016-3977
DescriptionHeap-based buffer overflow in util/gif2rgb.c in gif2rgb in giflib 5.1.2 allows remote attackers to cause a denial of service (application crash) via the background color index in a GIF file.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesELA-751-1
Debian Bugs820526

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
giflib (PTS)jessie, jessie (lts)4.1.6-11+deb8u2fixed
stretch (lts), stretch5.1.4-0.4+deb9u1fixed
buster (security), buster, buster (lts)5.1.4-3+deb10u1fixed
bullseye5.1.9-2fixed
bookworm5.2.1-2.5fixed
sid, trixie5.2.2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
giflibsourcejessie4.1.6-11+deb8u2ELA-751-1
giflibsourcestretch5.1.4-0.4+deb9u1ELA-751-1
giflibsource(unstable)5.1.4-3820526

Notes

[wheezy] - giflib <no-dsa> (minor issue)
https://sourceforge.net/p/giflib/bugs/87/
https://sourceforge.net/p/giflib/code/ci/ea8dbc5786862a3e16a5acfa3d24e2c2f608cd88/
The issue was originally fixed in 5.1.4-0.3 but then the NMU upload
5.1.4-0.4 just dropped the patch claiming the patch was already present
which is untrue and reopening the issue.

Search for package or bug name: Reporting problems