{"id":"MGASA-2016-0399","summary":"Updated giflib packages fix security vulnerability","details":"A heap buffer overflow vulnerability was found in giflib. A maliciously\ncrafted gif file could cause the gif2rgb tool to crash (CVE-2016-3977).\n","modified":"2026-04-16T06:23:45.557699332Z","published":"2016-11-26T10:41:56Z","upstream":["CVE-2016-3977"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0399.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=18233"},{"type":"WEB","url":"https://lists.opensuse.org/opensuse-updates/2016-04/msg00079.html"}],"affected":[{"package":{"name":"giflib","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/giflib?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.2.3-4.3.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0399.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}