Debian Package Tracker
Register | Log in
Subscribe

giflib

Choose email to subscribe with

general
  • source: giflib (main)
  • version: 5.1.9-1
  • maintainer: David Suárez (DMD)
  • arch: any
  • std-ver: 4.4.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 4.1.6-11+deb8u1
  • oldstable: 5.1.4-0.4
  • stable: 5.1.4-3
  • testing: 5.1.9-1
  • unstable: 5.1.9-1
  • exp: 5.2.1-2
versioned links
  • 4.1.6-11+deb8u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.1.4-0.4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.1.4-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.1.9-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.2.1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • giflib-tools (2 bugs: 0, 1, 1, 0)
  • libgif-dev
  • libgif7 (1 bugs: 1, 0, 0, 0)
action needed
A new upstream version is available: 5.2.1 high
A new upstream version 5.2.1 is available, you should consider packaging it.
Created: 2020-06-29 Last update: 2021-01-22 08:04
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits and/or your tags, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2018-10-01 Last update: 2021-01-18 11:41
1 security issue in sid high
There is 1 open security issue in sid.
1 important issue:
  • CVE-2018-11489: The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain CrntCode array index is not checked. This will lead to a denial of service or possibly unspecified other impact.
Please fix it.
Created: 2018-05-29 Last update: 2020-12-27 21:57
Multiarch hinter reports 1 issue(s) normal
There are issues with the multiarch metadata for this package.
  • libgif-dev could be marked Multi-Arch: same
Created: 2020-02-11 Last update: 2021-01-22 07:02
O: This package has been orphaned and needs a maintainer. normal
This package has been orphaned. This means that it does not have a real maintainer at the moment. Please consider adopting this package if you are interested in it. Please see bug number #980412 for more information.
Created: 2021-01-18 Last update: 2021-01-18 22:06
4 ignored security issues in stretch low
There are 4 open security issues in stretch.
4 issues skipped by the security teams:
  • CVE-2016-3977: Heap-based buffer overflow in util/gif2rgb.c in gif2rgb in giflib 5.1.2 allows remote attackers to cause a denial of service (application crash) via the background color index in a GIF file.
  • CVE-2018-11489: The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain CrntCode array index is not checked. This will lead to a denial of service or possibly unspecified other impact.
  • CVE-2018-11490: The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain "Private->RunningCode - 2" array index is not checked. This will lead to a denial of service or possibly unspecified other impact.
  • CVE-2019-15133: In GIFLIB before 2019-02-16, a malformed GIF file triggers a divide-by-zero exception in the decoder function DGifSlurp in dgif_lib.c if the height field of the ImageSize data structure is equal to zero.
Please fix them.
Created: 2018-05-29 Last update: 2020-12-27 21:57
3 ignored security issues in buster low
There are 3 open security issues in buster.
3 issues skipped by the security teams:
  • CVE-2018-11489: The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain CrntCode array index is not checked. This will lead to a denial of service or possibly unspecified other impact.
  • CVE-2018-11490: The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain "Private->RunningCode - 2" array index is not checked. This will lead to a denial of service or possibly unspecified other impact.
  • CVE-2019-15133: In GIFLIB before 2019-02-16, a malformed GIF file triggers a divide-by-zero exception in the decoder function DGifSlurp in dgif_lib.c if the height field of the ImageSize data structure is equal to zero.
Please fix them.
Created: 2018-05-29 Last update: 2020-12-27 21:57
1 ignored security issue in bullseye low
There is 1 open security issue in bullseye.
1 issue skipped by the security teams:
  • CVE-2018-11489: The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain CrntCode array index is not checked. This will lead to a denial of service or possibly unspecified other impact.
Please fix it.
Created: 2019-07-07 Last update: 2020-12-27 21:57
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.5.1 instead of 4.4.1).
Created: 2020-01-21 Last update: 2020-11-17 05:41
news
[rss feed]
  • [2019-12-18] giflib 5.1.9-1 MIGRATED to testing (Debian testing watch)
  • [2019-12-13] Accepted giflib 5.1.9-1 (source) into unstable (David Suárez) (signed by: Adam Borowski)
  • [2019-08-25] Accepted giflib 5.2.1-2 (source) into experimental (Andreas Metzler)
  • [2019-08-19] Accepted giflib 5.2.1-1 (source) into experimental (Andreas Metzler)
  • [2019-03-17] Accepted giflib 5.1.8-1 (source) into experimental (Andreas Metzler)
  • [2019-03-17] Accepted giflib 5.1.7-1 (source) into experimental (Andreas Metzler)
  • [2018-06-11] giflib 5.1.4-3 MIGRATED to testing (Debian testing watch)
  • [2018-06-05] Accepted giflib 5.1.4-3 (source) into unstable (Salvatore Bonaccorso)
  • [2018-02-22] giflib 5.1.4-2 MIGRATED to testing (Debian testing watch)
  • [2018-02-11] Accepted giflib 5.1.4-2 (source) into unstable (Andreas Metzler)
  • [2017-08-12] giflib 5.1.4-1 MIGRATED to testing (Debian testing watch)
  • [2017-08-01] Accepted giflib 5.1.4-1 (source) into unstable (Andreas Metzler)
  • [2016-10-31] giflib 5.1.4-0.4 MIGRATED to testing (Debian testing watch)
  • [2016-10-25] Accepted giflib 5.1.4-0.4 (source amd64) into unstable (Paolo Greppi) (signed by: Yaroslav Halchenko)
  • [2016-06-16] giflib 5.1.4-0.3 MIGRATED to testing (Debian testing watch)
  • [2016-06-10] Accepted giflib 5.1.4-0.3 (source amd64) into unstable (Matthias Klose)
  • [2016-05-14] giflib 5.1.4-0.2 MIGRATED to testing (Debian testing watch)
  • [2016-05-08] Accepted giflib 5.1.4-0.2 (source amd64) into unstable (Matthias Klose)
  • [2016-05-01] giflib 5.1.4-0.1 MIGRATED to testing (Debian testing watch)
  • [2016-04-25] Accepted giflib 5.1.4-0.1 (source amd64) into unstable (Matthias Klose)
  • [2016-04-21] giflib 5.1.2-0.3 MIGRATED to testing (Debian testing watch)
  • [2016-04-15] Accepted giflib 5.1.2-0.3 (source) into unstable (Gianfranco Costamagna)
  • [2016-02-01] giflib 5.1.2-0.2 MIGRATED to testing (Debian testing watch)
  • [2016-01-27] Accepted giflib 5.1.2-0.2 (source amd64) into unstable (Matthias Klose)
  • [2016-01-26] Accepted giflib 4.1.6-10+deb7u1 (source amd64) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Guido Günther)
  • [2016-01-26] Accepted giflib 4.1.6-11+deb8u1 (source) into proposed-updates->stable-new, proposed-updates (Guido Günther)
  • [2016-01-19] giflib 5.1.2-0.1 MIGRATED to testing (Debian testing watch)
  • [2016-01-16] Accepted giflib 5.1.2-0.1 (source amd64) into unstable (Matthias Klose)
  • [2016-01-15] Accepted giflib 4.1.6-9+deb6u1 (source amd64) into squeeze-lts (Guido Günther)
  • [2015-12-18] giflib 5.1.1-0.2 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 7
  • RC: 1
  • I&N: 5
  • M&W: 1
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, exp, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 5.1.9-1
  • 4 bugs

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing