Bug 1146299 - (CVE-2019-15133) VUL-1: CVE-2019-15133: giflib: In GIFLIB before 2019-02-16, a malformed GIF file triggers a divide-by-zero exception in the decoder function DGifSlurp in dgif_lib.c if the height field of the ImageSize data structure is equal to zero.
(CVE-2019-15133)
VUL-1: CVE-2019-15133: giflib: In GIFLIB before 2019-02-16, a malformed GIF f...
Status: NEW
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P4 - Low : Normal
: ---
Assigned To: Fridrich Strba
Security Team bot
https://smash.suse.de/issue/240397/
CVSSv3:SUSE:CVE-2019-15133:5.5:(AV:L/...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2019-08-20 08:05 UTC by Wolfgang Frisch
Modified: 2022-05-06 19:17 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
giflib-CVE-2019-15133.patch (462 bytes, patch)
2019-08-22 11:51 UTC, Wolfgang Frisch
Details | Diff
giflib-e6a3b6b197364acbd34607c423f0d45b88e1ae4b-ineffective-bounds-check.patch (993 bytes, patch)
2019-08-22 11:58 UTC, Wolfgang Frisch
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Wolfgang Frisch 2019-08-20 08:05:38 UTC
CVE-2019-15133

In GIFLIB before 2019-02-16, a malformed GIF file triggers a divide-by-zero
exception in the decoder function DGifSlurp in dgif_lib.c if the height field of
the ImageSize data structure is equal to zero.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15133
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13008
http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-15133.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15133
http://www.cvedetails.com/cve/CVE-2019-15133/
Comment 1 Wolfgang Frisch 2019-08-22 11:51:34 UTC
Created attachment 815265 [details]
giflib-CVE-2019-15133.patch

This is the upstream patch that fixes CVE-2019-15133.

Please note that giflib git e6a3b6b197364acbd34607c423f0d45b88e1ae4b should be applied first, if it isn't already:
https://sourceforge.net/p/giflib/code/ci/e6a3b6b197364acbd34607c423f0d45b88e1ae4b/
Comment 3 Wolfgang Frisch 2019-08-22 11:58:55 UTC
Created attachment 815268 [details]
giflib-e6a3b6b197364acbd34607c423f0d45b88e1ae4b-ineffective-bounds-check.patch

Apply this first in SLE-12 and SLE-15.
Comment 5 Swamp Workflow Management 2022-05-06 19:17:28 UTC
SUSE-SU-2022:1565-1: An update that solves three vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1094832,1146299,1184123,974847
CVE References: CVE-2016-3977,CVE-2018-11490,CVE-2019-15133
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    giflib-5.2.1-150000.4.8.1
openSUSE Leap 15.3 (src):    giflib-5.2.1-150000.4.8.1
SUSE Linux Enterprise Realtime Extension 15-SP2 (src):    giflib-5.2.1-150000.4.8.1
SUSE Linux Enterprise Module for Basesystem 15-SP4 (src):    giflib-5.2.1-150000.4.8.1
SUSE Linux Enterprise Module for Basesystem 15-SP3 (src):    giflib-5.2.1-150000.4.8.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.