![]() |
|
Message-ID: <94ed5662-d24b-40e4-b832-6228a7e473df@pipping.org> Date: Wed, 9 Apr 2025 23:11:15 +0200 From: Sebastian Pipping <sebastian@...ping.org> To: oss-security@...ts.openwall.com Subject: Re: CVE-2025-31344: giflib: The giflib open-source component has a buffer overflow vulnerability. A quick note that there is more to giflib than just CVE-2025-31344: Duplication of CVEs, officially fixed versus de-facto still vulnerable in more than one case, another CVE also upcoming (not mine)… I created a quick summary of what I know at… https://github.com/openwrt/packages/issues/26277 …if you're interested. Best, Sebastian
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.