{"id":"MGASA-2016-0020","summary":"Updated giflib packages fix security vulnerability","details":"A heap-based buffer overflow vulnerability was found in giffix utility of\ngiflib when processing records of the type 'IMAGE_DESC_RECORD_TYPE' due to\nthe allocated size of 'LineBuffer' equaling the value of the logical\nscreen width, 'GifFileIn-\u003eSWidth', while subsequently having\n'GifFileIn-\u003eImage.Width' bytes   of data written to it (CVE-2015-7555).\n","modified":"2026-04-16T06:24:30.646202908Z","published":"2016-01-15T01:52:38Z","upstream":["CVE-2015-7555"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0020.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=17376"},{"type":"WEB","url":"https://lists.fedoraproject.org/pipermail/package-announce/2016-January/174870.html"}],"affected":[{"package":{"name":"giflib","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/giflib?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.2.3-4.2.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0020.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}