DEBIAN-CVE-2021-45972

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2021-45972
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2021-45972.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2021-45972
Upstream
Published
2022-01-01T21:15:07Z
Modified
2025-09-18T05:19:37Z
Summary
[none]
Details

The giftrans function in giftrans 1.12.2 contains a stack-based buffer overflow because a value inside the input file determines the amount of data to write. This allows an attacker to overwrite up to 250 bytes outside of the allocated buffer with arbitrary data.

References

Affected packages

Debian:11 / giftrans

Package

Name
giftrans
Purl
pkg:deb/debian/giftrans?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / giftrans

Package

Name
giftrans
Purl
pkg:deb/debian/giftrans?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / giftrans

Package

Name
giftrans
Purl
pkg:deb/debian/giftrans?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:14 / giftrans

Package

Name
giftrans
Purl
pkg:deb/debian/giftrans?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "unimportant"
}