[go: up one dir, main page]

Activity for GIFLIB

  • Giuseppe Massaro Giuseppe Massaro posted a comment on discussion Help

    I would like to discuss a possible security issue with giflib latest release. Is this still maintained? What is the process to report? thanks, Giuseppe

  • milahu milahu posted a comment on ticket #132

    possible solution: include a copy of the GifQuantizeBuffer function in downstream packages: https://github.com/coin3d/simage/pull/33 https://github.com/mono/libgdiplus/pull/575

  • milahu milahu posted a comment on ticket #142

    possible solution: include a copy of the GifQuantizeBuffer function in downstream packages: https://github.com/coin3d/simage/pull/33 https://github.com/mono/libgdiplus/pull/575

  • Ritesh Raj Sarraf Ritesh Raj Sarraf created ticket #34

    Patch buffer overrun revealed by FORTIFY_SOURCE

  • Luke Griffioen Luke Griffioen created ticket #188

    CVE-2024-45993

  • Luke Griffioen Luke Griffioen created ticket #187

    CVE-2025-31344

  • DARKNAVY DARKNAVY created ticket #186

    integer overflow in Icon2Gif

  • DARKNAVY DARKNAVY created ticket #185

    integer overflow in gifbg.c

  • DARKNAVY DARKNAVY created ticket #184

    uninitialized buffer in DumpScreen2RGB

  • DARKNAVY DARKNAVY created ticket #183

    out-of-bounds access in ModifyColorMap

  • DARKNAVY DARKNAVY created ticket #182

    out‐of‐bounds writes in Icon2Gif

  • DARKNAVY DARKNAVY created ticket #181

    out-of-bounds access in Gif2Icon

  • Tomasz Kłoczko Tomasz Kłoczko created ticket #12

    Create live github mirror or move git repo to github

  • Sandeep Wawdane Sandeep Wawdane posted a comment on ticket #179

    @hartwork Thanks for asking! CVE Number Update: I’ve already submitted a request for a CVE ID for this issue. Got a confirmation email with a request ID, so it’s in process with the CVE Assignment Team. Patch Details: Patch Details: 1. Filename Check: Can be used basename() to strip out any directory paths from the input filename and blocks anything with .. or / to prevent path traversal tricks. 2. Safe File Creation: Temporary files are made in a secure way (like TempInto.XXXXXX) without using user...

  • Sebastian Pipping Sebastian Pipping posted a comment on ticket #179

    @thecybersandeep greetings, any updates on the topics of CVE number and/or availability of a patch? Thanks!

  • Sebastian Pipping Sebastian Pipping posted a comment on ticket #167

    @bcodres thanks! At https://nvd.nist.gov/vuln/detail/CVE-2022-28506 I found… giflib_poc asan_report_giflib.png …now and I confirm your results. I think that means that we have four CVEs all being about the same thing… CVE-2022-28506 CVE-2023-48161 CVE-2024-45993 CVE-2025-31344 …, that the previous fix was incomplete, and that giflib-5.2.2-cve-2025-31344.patch completes it. Thanks for your help! Best, Sebastian

  • Codres Bogdan Codres Bogdan posted a comment on ticket #167

    Hello @hartwork. I can confirm that with the POC for CVE-2022-28506 I have the issue in the same spot from DumpScreen2RGB as in CVE-2023-48161. gif2rgb -o out giflib_poc_CVE-2022-28506 ================================================================= ==402==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000001e0 at pc 0x55c692693314 bp 0x7ffdc4eb6300 sp 0x7ffdc4eb62f0 READ of size 1 at 0x6020000001e0 thread T0 #0 0x55c692693313 in DumpScreen2RGB ../../giflib-5.1.4/util/gif2rgb.c:323...

  • Sebastian Pipping Sebastian Pipping posted a comment on ticket #166

    I checked Git masteragainst the two cases just now. The first case — command ./gif2rgb -s — I confirm as fixed (by commit 38e39296dea689c0ca972f6abb2e6cc180dfbd8f that is attributed to issue 153). The second case — command yes '' | ./gif2rgb -s 1 2 — fails with the exact same LeakSanitizer output on master of today (at 8bed392c280ad2c237e8bf1beca6f8f68f893e87).

  • Sebastian Pipping Sebastian Pipping posted a comment on ticket #167

    @bcodres @mmuzila since related commit 368f28c0034ecfb6dd4b3412af4cc589a56e0611 says CVE-2022-28506 rather than CVE-2024-45993 I assume that CVE-2022-28506 is the same also?

  • Sebastian Pipping Sebastian Pipping posted a comment on ticket #167

    @bcodres I agree — CVE-2024-45993 is the same! I just confirmed with a debugger that @mmuzila's file crashes/sample hits the same code path. What only now I realize is that the issue (likely) appeared fixed to some (or some of the time), because whether the user passes argument -1 or not — for single-file mode, in contrast to three-file mode — decides whether they run vulnerable code or not: they either run (a) the code with the fix from 368f28c0034ecfb6dd4b3412af4cc589a56e0611 for single-file mode...

  • Sebastian Pipping Sebastian Pipping modified a comment on ticket #157

    The attached out-of-memory-expection-or-memory-leak.gif is 32 bytes in size and has a screen size of 65503x65503 in its header. While processing that file, gif2rgb allocates 65503x65503 (circa 4 GiB) rather early (in a nested loop) and then runs into error handling code due to the file's use of an invalid extension. Allocating later — delaying the allocation — may help this very case but it would not fix the core issue. If I am not mistaken GIF (https://www.w3.org/Graphics/GIF/spec-gif89a.txt) allows...

  • Sebastian Pipping Sebastian Pipping modified a comment on ticket #157

    The attached out-of-memory-expection-or-memory-leak.gif is 32 bytes in size and has a screen size of 65503x65503 in its header. While processing that file, gif2rgb allocates 65503x65503 (circa 4 GiB) rather early (in a nested loop) and then runs into error handling code due to the file's use of an invalid extension. Allocating later — delaying the allocation — may help this very case but it would not fix the core issue. If I am not mistaken GIF (https://www.w3.org/Graphics/GIF/spec-gif89a.txt) allows...

  • Sebastian Pipping Sebastian Pipping modified a comment on ticket #157

    The attached out-of-memory-expection-or-memory-leak.gif is 32 bytes in size and has a screen size of 65503x65503 in its header. While processing that file, gif2rgb allocates 65503x65503 (circa 4 GiB) rather early (in a nested loop) and then runs into error handling code due to the file's use of an invalid extension. Allocating later — delaying the allocation — may help this very case but it would not fix the core issue. If I am not mistaken GIF (https://www.w3.org/Graphics/GIF/spec-gif89a.txt) allows...

  • Sebastian Pipping Sebastian Pipping modified a comment on ticket #157

    The attached out-of-memory-expection-or-memory-leak.gif is 32 bytes in size and has a screen size of 65503x65503 in its header. While processing that file, gif2rgb allocates 65503x65503 (circa 4 GiB) rather early (in a nested loop) and then runs into error handling code due to the file's use of an invalid extension. Allocating later — delaying the allocation — may help this very case but it would not fix the core issue. If I am not mistaken GIF (https://www.w3.org/Graphics/GIF/spec-gif89a.txt) allows...

  • Sebastian Pipping Sebastian Pipping modified a comment on ticket #157

    The attached out-of-memory-expection-or-memory-leak.gif is 32 bytes in size and has a screen size of 65503x65503 in its header. While processing that file, gif2rgb allocates 65503x65503 (circa 4 GiB) rather early (in a nested loop) and then runs into error handling code due to the file's use of an invalid extension. Allocating later — delaying the allocation — may help this very case but it would not fix the core issue. If I am not mistaken GIF (https://www.w3.org/Graphics/GIF/spec-gif89a.txt) allows...

  • Sebastian Pipping Sebastian Pipping posted a comment on ticket #157

    The attached out-of-memory-expection-or-memory-leak.gif is 32 bytes in size and has a screen size of 65503x65503 in its header. While processing that file, gif2rgb allocates 65503x65503 (circa 4 GiB) rather early (in a nested loop) and then runs into error handling code due to the file's use of an invalid extension. Allocating later — delaying the allocation — may help this very case but it would not fix the core issue. If I am not mistaken GIF (https://www.w3.org/Graphics/GIF/spec-gif89a.txt) allows...

  • Codres Bogdan Codres Bogdan posted a comment on ticket #167

    @hartwork @esr I've found another duplicate of this bug. Is CVE-2024-45993 https://gitlab.com/mthandazo/project-pov I've tested without the patch with the sample from the link above and the error is the same. With the patch the issue is not reproducible anymore. gif2rgb -o out poc_CVE-2024-45993 gif2rgb: Image is defective, decoding aborted Bogdan

  • Sebastian Pipping Sebastian Pipping posted a comment on ticket #179

    @thecybersandeep maybe I overlooked something — did you create a patch? Are you aware of a patch for this by anyone else?

  • Codres Bogdan Codres Bogdan posted a comment on ticket #167

    Hello ! Yes, I can confirm that those 2 CVE's are the same. CVE-2025-31344 seems to be a duplicate of CVE-2023-48161.

  • Sebastian Pipping Sebastian Pipping posted a comment on ticket #167

    @bcodres I confirm that the patch fixes the crash for the attached POC_crash file. As a consequence, this seems to mean that CVE-2023-48161 and CVE-2025-31344 are the very same thing, see https://github.com/OpenMandrivaAssociation/giflib/blob/master/giflib-5.2.2-cve-2025-31344.patch and https://seclists.org/oss-sec/2025/q2/25 . Can you confirm? CC @ctulhu

  • Codres Bogdan Codres Bogdan posted a comment on ticket #167

    Hello @esr @hartwork Yes, I've doubled check the issue and indeed my initial patch solve some memory leaks. I've attached a new patch that should solve the issue. It's actually a similar patch as CVE-2022-28506 After applying the patch I do not have the issue anymore: gif2rgb -o out POC_crash_CVE-2023-48161 gif2rgb: Image is defective, decoding aborted Can you provide me feedback ? Bogdan.

  • bale.cen bale.cen posted a comment on ticket #176

    Yes, it's the same issue

  • Sebastian Pipping Sebastian Pipping modified a comment on ticket #167

    @esr I just tried with vanilla giflib 5.2.2 (plus ASan plus UBSan a la make {O,LD}FLAGS='-fsanitize=address,undefined' CC=clang) and the POC_crash file attached by @tihanyin makes command ./gif2rgb -o out POC_crash crash with the same output as reported. This is not fixed, please fix. Thank you! CC @ctulhu

  • Sebastian Pipping Sebastian Pipping posted a comment on ticket #176

    Hello @bale, FYI if I am not mistaken then this is the same thing that is being discussed as CVE-2025-31344 on https://seclists.org/oss-sec/2025/q2/21 at this very moment.

  • Sebastian Pipping Sebastian Pipping created ticket #180

    -Wformat-truncation likely pointing out an actual bug

  • Sebastian Pipping Sebastian Pipping posted a comment on ticket #179

    @thecybersandeep perfect, thank you!

  • Sebastian Pipping Sebastian Pipping posted a comment on ticket #79

    I used git bisect now and found that releases <5.1.5 are affected. Commit https://sourceforge.net/p/giflib/code/ci/ea8dbc5786862a3e16a5acfa3d24e2c2f608cd88/ has an apparent fix, issue #87 is related. CC @ctulhu

  • Sandeep Wawdane Sandeep Wawdane posted a comment on ticket #179

    H @hartwork , I have already requested a CVE for this vulnerability. Once the CVE ID is assigned, I will update you and add it here.

  • Sebastian Pipping Sebastian Pipping posted a comment on ticket #179

    @thecybersandeep are you aware of any CVE assigned to or requested for this?

  • Sebastian Pipping Sebastian Pipping posted a comment on ticket #157

    Even with patch https://sourceforge.net/p/giflib/code/ci/ccbc956432650734c91acb3fc88837f7b81267ff/ applied, master seems to still use 5 GB of RAM/RSS to process that 32 bytes file before aborting with error GIF-LIB error: Wrong record type detected. So the issue seems unfixed to me. CC @ctulhu

  • Sebastian Pipping Sebastian Pipping modified a comment on ticket #167

    @esr I just tried with vanilla giflib 5.2.2 (plus ASan plus UBSan a la make {O,LD}FLAGS='-fsanitize=address,undefined' CC=clang) and the POC_crash file attached by @tihanyin makes command gif2rgb -o out POC_crash crash with the same output as reported. This is not fixed, please fix. Thank you! CC @ctulhu

  • Sebastian Pipping Sebastian Pipping posted a comment on ticket #167

    @bcodres the patched you attached — both the initial and the rebased one — only add three calls to free which I would expect to be able to fix a memory leak but not a buffer overflow. Am I missing something? Could you verify the patch files contains what you intended to share for a fix? Thank you! CC @ctulhu

  • Sebastian Pipping Sebastian Pipping posted a comment on ticket #167

    @esr I just tried with vanilla giflib 5.2.2 (plus ASan plus UBSan a la make {O,LD}FLAGS='-fsanitize=address,undefined' CC=clang) and the POC_crash file attached by @bcodres makes command gif2rgb -o out POC_crash crash with the same output as reported. This is not fixed, please fix. Thank you! CC @ctulhu

  • Sandeep Wawdane Sandeep Wawdane created ticket #179

    Path Traversal vulnerability in giflib's gifinto utility allows creation of files in arbitrary directories due to insufficient validation of user-supplied filenames.

  • Benson Muite Benson Muite created merge request #18 on Code

    Install libutils

  • Benson Muite Benson Muite created ticket #11

    Enable installation of libutils

  • sanyuefeiyu sanyuefeiyu created ticket #178

    long time no new version and can release a new version?

  • Michal Hlavinka Michal Hlavinka created ticket #177

    wrong pointer used in giftool getbool

  • Ashish Patil Ashish Patil posted a comment on ticket #157

    Hi I was wondering if there are any patch releases of giflib planned in the near future. V5.2.2 still has the bug reported in CVE-2021-40633 (https://nvd.nist.gov/vuln/detail/CVE-2021-40633) . I see that the fix for the same has been submitted and accepted into the main branch through this Merge Request (https://sourceforge.net/p/giflib/code/merge-requests/12/). The overall score of this CVE is 8.8 (High) and impacts Availability, Confidentiality, and Integrity. A patch release for this would be...

  • bale.cen bale.cen created ticket #176

    Incomplete fix for issue 159

  • J G Miller J G Miller created ticket #173

    installation of manual pages and html documentation

  • Daniel Macks Daniel Macks posted a comment on ticket #172

    That's solely based on the lack of sync between the two platforms and also between the linker and the dependencies list. But that fix causes FTBFS due to unresolved symbols when linking libutil.dylib: "_GifErrorString", referenced from: _PrintGifError in qprintf.o because qprintf.o is now only in libgif not libutil. If libutil is (as name suggests) utility functions and (as the Makefile behaves on all platforms) not actually install libutil publicly, should it be static-only on all platforms?

  • Daniel Macks Daniel Macks created ticket #172

    Incorrect object files in shared libutil on darwin

  • Martin Jansa Martin Jansa created merge request #17 on Code

    Makefile: fix typo in soname argument

  • Sebastian Koerner Sebastian Koerner posted a comment on ticket #33

    Prio is not 1 but very low. I failed to set it correctly.

  • Sebastian Koerner Sebastian Koerner created ticket #33

    Race-Condition on Install

  • Anonymous updated merge request #16

    Fix #171 - Require ImageMagick Only for Building Giflib Website

  • Bobby Villaluz Bobby Villaluz posted a comment on merge request #16

    Please reject this merge request as the issue was already addressed by Avoid having an install-time dependency on convert(1)

  • Bobby Villaluz Bobby Villaluz posted a comment on ticket #171

    Please disregard and close this issue as it was already addressed by Avoid having an install-time dependency on convert(1).

  • Anonymous created merge request #16 on Code

    Fix #171 - Require ImageMagick Only for Building Giflib Website

  • Bobby Villaluz Bobby Villaluz created ticket #171

    ImageMagick required to build giflib on non-Darwin Platforms

  • Adam Sampson Adam Sampson posted a comment on ticket #170

    I ran into this as well, building with -D_FORTIFY_SOURCE=3 - it's because the snprintf calls in giftext.c that write into AsciiForm have the length set as 3 rather than 2. Here's a patch.

  • Uilian Ries Uilian Ries created merge request #15 on Code

    Add support for CMake

  • seb1282 seb1282 created ticket #170

    Tests failing on Ubuntu Noble, giftext buffer overflow

  • Codres Bogdan Codres Bogdan posted a comment on ticket #167

    THis patch is created based on the latest version ...

  • Codres Bogdan Codres Bogdan posted a comment on ticket #167

    Hello Eric ! Unfortunately, I still have this error even after I've applied this patch and some others. The fix for me was to free "Buffers". Please find attached the patch.

  • Eric S. Raymond Eric S. Raymond committed [8bed39] on Code

    Emphasize lossnessless.

  • Eric S. Raymond Eric S. Raymond committed [daa008] on Code

    Enable gif2rgb-regress.

  • Eric S. Raymond Eric S. Raymond committed [eb2026] on Code

    More build recipe simplification.

  • Anonymous created merge request #14 on Code

    Fix minor documentation errors

  • Eric S. Raymond Eric S. Raymond committed [b86fca] on Code

    Simplify the test machinery.

  • Eric S. Raymond Eric S. Raymond committed [606443] on Code

    Robustify against overly verbose gmake.

  • Eric S. Raymond Eric S. Raymond committed [4b58cc] on Code

    Shortenm some long lines.

  • Eric S. Raymond Eric S. Raymond committed [2072ca] on Code

    Shorten a name in order to avoid problems when we reflow.

  • Eric S. Raymond Eric S. Raymond committed [1caa59] on Code

    Correct typos, shoe=rten and fix version strings.

  • Eric S. Raymond Eric S. Raymond committed [6908a3] on Code

    Move Gershon Elber's copyrights from strings to SPDX headers...

  • Eric S. Raymond Eric S. Raymond committed [4a425b] on Code

    More through SPDXification.

  • Eric S. Raymond Eric S. Raymond committed [0a702c] on Code

    NEWS update.

  • Eric S. Raymond Eric S. Raymond committed [647330] on Code

    Improve cleanup of doc/

  • Eric S. Raymond Eric S. Raymond committed [958e4e] on Code

    Tests are now fully TAPified.

  • Eric S. Raymond Eric S. Raymond committed [d24acc] on Code

    More TAPification.

  • Eric S. Raymond Eric S. Raymond committed [137ef1] on Code

    Integrate and TAPify gifinto test.

  • Eric S. Raymond Eric S. Raymond committed [638310] on Code

    More TAPification.

  • Eric S. Raymond Eric S. Raymond committed [125551] on Code

    Add a FIXME to testing.

  • Eric S. Raymond Eric S. Raymond committed [9a3322] on Code

    Begin TAPification.

  • Andreas Metzler Andreas Metzler posted a comment on merge request #8

    Updated by force-push.

  • Eric S. Raymond Eric S. Raymond modified ticket #169

    GifQuantizeBuffer function prototype mismatch

  • Eric S. Raymond Eric S. Raymond posted a comment on ticket #169

    Fix applied, thanks.

  • Eric S. Raymond Eric S. Raymond committed [c8e94f] on Code

    Address issue #169: GifQuantizeBuffer function prototype mismatch

  • Eric S. Raymond Eric S. Raymond committed [bd2804] on Code

    NEW file correction.

  • Andreas Metzler Andreas Metzler created ticket #169

    GifQuantizeBuffer function prototype mismatch

  • Fabrice Fontaine Fabrice Fontaine posted a comment on merge request #7

    Merge Request updated

  • Eric S. Raymond Eric S. Raymond updated merge request #9

    A initial CMakeLists.txt for portable builds

  • Eric S. Raymond Eric S. Raymond posted a comment on merge request #9

    I dislike CMake, and it is overcomplicated for this build.

  • Eric S. Raymond Eric S. Raymond updated merge request #12

    fix for #157 An OutofMemory-Exception or Memory Leak in gif2rgb CVE-2021-40633

  • Eric S. Raymond Eric S. Raymond committed [ccbc95] on Code

    Clean up memory better at end of run (CVE-2021-40633)

  • Eric S. Raymond Eric S. Raymond committed [603bd7] on Code

    Make it easier to control the build with environment variables.

1 >