Bug 2359418 (CVE-2025-31344)

Summary: CVE-2025-31344 giflib: The giflib open-source component has a buffer overflow vulnerability
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: ahughes, khosford, mbalaoal, neugens, pjindal, sraghupu
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in the gif2rgb utility of giflib. This vulnerability allows an attacker to cause a heap-based buffer overflow via crafted GIF files. The issue arises due to improper handling of certain GIF image data, leading to memory corruption.​
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2359427, 2359428, 2359429, 2359430, 2359443, 2359444, 2359445, 2359446, 2359447, 2359448, 2359449, 2359450, 2359451, 2359452, 2359431, 2359432, 2359433, 2359434, 2359435, 2359436, 2359437, 2359438, 2359439, 2359440, 2359441, 2359442    
Bug Blocks:    

Description OSIDB Bzimport 2025-04-14 08:01:15 UTC
Heap-based Buffer Overflow vulnerability in openEuler giflib on Linux. This vulnerability is associated with program files gif2rgb.C.

This issue affects giflib: through 5.2.2.