[Git][security-tracker-team/security-tracker][master] CVE-2025-31344/giflib: use the upstream commit reference that fixes the issue

Santiago R.R. (@santiago) santiago at debian.org
Sun Feb 22 10:48:43 GMT 2026



Santiago R.R. pushed to branch master at Debian Security Tracker / security-tracker


Commits:
f1af24ba by Santiago Ruano Rincón at 2026-02-22T07:48:34-03:00
CVE-2025-31344/giflib: use the upstream commit reference that fixes the issue

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -112855,7 +112855,7 @@ CVE-2025-31344 (Heap-based Buffer Overflow vulnerability in openEuler giflib on
 	[bullseye] - giflib <postponed> (Minor issue, revisit when fixed upstream)
 	NOTE: https://www.openwall.com/lists/oss-security/2025/04/07/3
 	NOTE: https://sourceforge.net/p/giflib/bugs/176/
-	NOTE: Patch by Mandriva: https://github.com/OpenMandrivaAssociation/giflib/blob/master/giflib-5.2.2-cve-2025-31344.patch
+	NOTE: Fixed by: https://sourceforge.net/p/giflib/code/ci/7bbe8ea1a595bb7509ffa0a86b076e9b720e85af/ (6.1.1)
 CVE-2025-22017 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.12.21-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f1af24ba26aa64069f746c83b97f07ec872ca71b

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f1af24ba26aa64069f746c83b97f07ec872ca71b
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260222/2dc8ad74/attachment.htm>


More information about the debian-security-tracker-commits mailing list