Bug 1953004 (CVE-2020-23922)

Summary: CVE-2020-23922 giflib: out-of-bounds read in DumpScreen2RGB() in gif2rgb.c in gif2rgb tool
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: jaromir.capik, kaycoth, manisandro, nforro, vgaikwad
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in giflib. A missing check in function DumpScreen2RGB in gif2rgb.c leads to an out-of-bounds read, allowing an attacker to crash the gif2rgb tool. The issue is not in the giflib library, but in the gif2rgb utility program.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-28 12:23:28 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1955576    
Bug Blocks: 1953005    

Description Guilherme de Almeida Suckevicz 2021-04-23 17:42:26 UTC
An issue was discovered in giflib through 5.1.4. DumpScreen2RGB in gif2rgb.c has a heap-based buffer over-read.

Reference:
https://sourceforge.net/p/giflib/bugs/151/

Comment 1 Riccardo Schirone 2021-04-30 12:17:50 UTC
Statement:

This issue did not affect the versions of giflib as shipped with Red Hat Enterprise Linux 8 as they did not include the gif2rgb tool.