First published: Fri Aug 25 2023(Updated: )
giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GifLib Project GifLib | =5.2.1 | |
ubuntu/giflib | <5.1.4-2ubuntu0.1+ | 5.1.4-2ubuntu0.1+ |
ubuntu/giflib | <5.1.9-1ubuntu0.1 | 5.1.9-1ubuntu0.1 |
ubuntu/giflib | <5.1.4-0.3~16.04.1+ | 5.1.4-0.3~16.04.1+ |
debian/giflib | <=5.1.9-2<=5.2.1-2.5<=5.2.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39742 is a vulnerability in giflib v5.2.1 that causes a segmentation fault via the getarg.c component.
CVE-2023-39742 has a severity level of medium with a score of 5.5.
To fix CVE-2023-39742, it is recommended to update giflib to a version that is not affected by the vulnerability.
Yes, here are some references for CVE-2023-39742: [Reference 1](https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084), [Reference 2](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O4RLSFGPBPR3FMIUJCWPGVIYIU35YGQX/), [Reference 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPNBOB65TEA4ZEPLVENI26BY4LEX7TEF/)
The CWE of CVE-2023-39742 is 120.