Debian Package Tracker
Register | Log in
Subscribe

giflib

Choose email to subscribe with

general
  • source: giflib (main)
  • version: 5.1.4-3
  • maintainer: Debian QA Group (DMD)
  • arch: any
  • std-ver: 4.1.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 4.1.6-11+deb8u1
  • oldstable: 5.1.4-0.4
  • stable: 5.1.4-3
  • testing: 5.1.4-3
  • unstable: 5.1.4-3
  • exp: 5.2.1-2
versioned links
  • 4.1.6-11+deb8u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.1.4-0.4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.1.4-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.2.1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • giflib-tools (3 bugs: 0, 1, 2, 0)
  • libgif-dev
  • libgif7 (1 bugs: 1, 0, 0, 0)
action needed
A new upstream version is available: 5.2.1 high
A new upstream version 5.2.1 is available, you should consider packaging it.
Created: 2019-10-31 Last update: 2019-12-10 13:48
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2018-10-01 Last update: 2019-12-08 19:26
3 security issues in bullseye high
There are 3 open security issues in bullseye.
3 important issues:
  • CVE-2018-11490: The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain "Private->RunningCode - 2" array index is not checked. This will lead to a denial of service or possibly unspecified other impact.
  • CVE-2018-11489: The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain CrntCode array index is not checked. This will lead to a denial of service or possibly unspecified other impact.
  • CVE-2019-15133: In GIFLIB before 2019-02-16, a malformed GIF file triggers a divide-by-zero exception in the decoder function DGifSlurp in dgif_lib.c if the height field of the ImageSize data structure is equal to zero.
Please fix them.
Created: 2019-07-07 Last update: 2019-10-21 00:30
3 security issues in sid high
There are 3 open security issues in sid.
3 important issues:
  • CVE-2018-11490: The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain "Private->RunningCode - 2" array index is not checked. This will lead to a denial of service or possibly unspecified other impact.
  • CVE-2018-11489: The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain CrntCode array index is not checked. This will lead to a denial of service or possibly unspecified other impact.
  • CVE-2019-15133: In GIFLIB before 2019-02-16, a malformed GIF file triggers a divide-by-zero exception in the decoder function DGifSlurp in dgif_lib.c if the height field of the ImageSize data structure is equal to zero.
Please fix them.
Created: 2018-05-29 Last update: 2019-10-21 00:30
Multiarch hinter reports 1 issue(s) normal
There are issues with the multiarch metadata for this package.
  • libgif-dev could be marked Multi-Arch: same
Created: 2016-09-14 Last update: 2019-12-10 13:52
ITA: Someone intends to adopt this package. normal
This package has been orphaned, but someone intends to maintain it. Please see bug number #834410 for more information.
Created: 2017-12-02 Last update: 2019-11-24 22:08
3 ignored security issues in buster low
There are 3 open security issues in buster.
3 issues skipped by the security teams:
  • CVE-2018-11490: The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain "Private->RunningCode - 2" array index is not checked. This will lead to a denial of service or possibly unspecified other impact.
  • CVE-2018-11489: The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain CrntCode array index is not checked. This will lead to a denial of service or possibly unspecified other impact.
  • CVE-2019-15133: In GIFLIB before 2019-02-16, a malformed GIF file triggers a divide-by-zero exception in the decoder function DGifSlurp in dgif_lib.c if the height field of the ImageSize data structure is equal to zero.
Please fix them.
Created: 2018-05-29 Last update: 2019-10-21 00:30
5 ignored security issues in jessie low
There are 5 open security issues in jessie.
5 issues skipped by the security teams:
  • CVE-2018-11490: The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain "Private->RunningCode - 2" array index is not checked. This will lead to a denial of service or possibly unspecified other impact.
  • TEMP-0820594-BC6826:
  • CVE-2016-3977: Heap-based buffer overflow in util/gif2rgb.c in gif2rgb in giflib 5.1.2 allows remote attackers to cause a denial of service (application crash) via the background color index in a GIF file.
  • CVE-2018-11489: The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain CrntCode array index is not checked. This will lead to a denial of service or possibly unspecified other impact.
  • CVE-2019-15133: In GIFLIB before 2019-02-16, a malformed GIF file triggers a divide-by-zero exception in the decoder function DGifSlurp in dgif_lib.c if the height field of the ImageSize data structure is equal to zero.
Please fix them.
Created: 2015-12-21 Last update: 2019-10-21 00:30
4 ignored security issues in stretch low
There are 4 open security issues in stretch.
4 issues skipped by the security teams:
  • CVE-2018-11490: The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain "Private->RunningCode - 2" array index is not checked. This will lead to a denial of service or possibly unspecified other impact.
  • CVE-2016-3977: Heap-based buffer overflow in util/gif2rgb.c in gif2rgb in giflib 5.1.2 allows remote attackers to cause a denial of service (application crash) via the background color index in a GIF file.
  • CVE-2018-11489: The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain CrntCode array index is not checked. This will lead to a denial of service or possibly unspecified other impact.
  • CVE-2019-15133: In GIFLIB before 2019-02-16, a malformed GIF file triggers a divide-by-zero exception in the decoder function DGifSlurp in dgif_lib.c if the height field of the ImageSize data structure is equal to zero.
Please fix them.
Created: 2018-05-29 Last update: 2019-10-21 00:30
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.4.1 instead of 4.1.3).
Created: 2018-04-16 Last update: 2019-09-29 23:40
news
[rss feed]
  • [2019-08-25] Accepted giflib 5.2.1-2 (source) into experimental (Andreas Metzler)
  • [2019-08-19] Accepted giflib 5.2.1-1 (source) into experimental (Andreas Metzler)
  • [2019-03-17] Accepted giflib 5.1.8-1 (source) into experimental (Andreas Metzler)
  • [2019-03-17] Accepted giflib 5.1.7-1 (source) into experimental (Andreas Metzler)
  • [2018-06-11] giflib 5.1.4-3 MIGRATED to testing (Debian testing watch)
  • [2018-06-05] Accepted giflib 5.1.4-3 (source) into unstable (Salvatore Bonaccorso)
  • [2018-02-22] giflib 5.1.4-2 MIGRATED to testing (Debian testing watch)
  • [2018-02-22] giflib 5.1.4-2 MIGRATED to testing (Debian testing watch)
  • [2018-02-11] Accepted giflib 5.1.4-2 (source) into unstable (Andreas Metzler)
  • [2017-08-12] giflib 5.1.4-1 MIGRATED to testing (Debian testing watch)
  • [2017-08-01] Accepted giflib 5.1.4-1 (source) into unstable (Andreas Metzler)
  • [2016-10-31] giflib 5.1.4-0.4 MIGRATED to testing (Debian testing watch)
  • [2016-10-25] Accepted giflib 5.1.4-0.4 (source amd64) into unstable (Paolo Greppi) (signed by: Yaroslav Halchenko)
  • [2016-06-16] giflib 5.1.4-0.3 MIGRATED to testing (Debian testing watch)
  • [2016-06-10] Accepted giflib 5.1.4-0.3 (source amd64) into unstable (Matthias Klose)
  • [2016-05-14] giflib 5.1.4-0.2 MIGRATED to testing (Debian testing watch)
  • [2016-05-08] Accepted giflib 5.1.4-0.2 (source amd64) into unstable (Matthias Klose)
  • [2016-05-01] giflib 5.1.4-0.1 MIGRATED to testing (Debian testing watch)
  • [2016-04-25] Accepted giflib 5.1.4-0.1 (source amd64) into unstable (Matthias Klose)
  • [2016-04-21] giflib 5.1.2-0.3 MIGRATED to testing (Debian testing watch)
  • [2016-04-15] Accepted giflib 5.1.2-0.3 (source) into unstable (Gianfranco Costamagna)
  • [2016-02-01] giflib 5.1.2-0.2 MIGRATED to testing (Debian testing watch)
  • [2016-01-27] Accepted giflib 5.1.2-0.2 (source amd64) into unstable (Matthias Klose)
  • [2016-01-26] Accepted giflib 4.1.6-10+deb7u1 (source amd64) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Guido Günther)
  • [2016-01-26] Accepted giflib 4.1.6-11+deb8u1 (source) into proposed-updates->stable-new, proposed-updates (Guido Günther)
  • [2016-01-19] giflib 5.1.2-0.1 MIGRATED to testing (Debian testing watch)
  • [2016-01-16] Accepted giflib 5.1.2-0.1 (source amd64) into unstable (Matthias Klose)
  • [2016-01-15] Accepted giflib 4.1.6-9+deb6u1 (source amd64) into squeeze-lts (Guido Günther)
  • [2015-12-18] giflib 5.1.1-0.2 MIGRATED to testing (Debian testing watch)
  • [2015-12-12] Accepted giflib 5.1.1-0.2 (source amd64) into unstable (Matthias Klose)
  • 1
  • 2
bugs [bug history graph]
  • all: 10
  • RC: 1
  • I&N: 7
  • M&W: 2
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, exp, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • security tracker
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 5.1.4-3ubuntu1
  • 5 bugs
  • patches for 5.1.4-3ubuntu1

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing