Soumettre #778278: dloebl CGIF v0.4.0 to v0.5.2 Integer Overflowinformation

Titredloebl CGIF v0.4.0 to v0.5.2 Integer Overflow
DescriptionCGIF is a fast and lightweight GIF encoder that can create GIF animations and images. This code is vulnerable to CWE-190: Integer Overflow due to improper type handling in the pixel count calculation within the cgif_addframe function at line 521 of src/cgif.c. The function calculates the total number of pixels using direct multiplication (width * height) when comparing adjacent frames. When processing an oversized GIF, the multiplication of operands of type uint16_t is implicitly promoted to a signed int type and overflows, resulting in a negative value. This negative value acts as a loop condition, causing the frame comparison loop to not execute at all. As a result, frames with completely different content are incorrectly judged to be identical and discarded through optimization, potentially leading to missing frames or data corruption in the generated GIF animation.
La source⚠️ https://github.com/dloebl/cgif/issues/110
Utilisateur
 zzxzzb (UID 95450)
Soumission12/03/2026 03:21 (il y a 22 jours)
Modérer27/03/2026 13:47 (15 days later)
StatutAccepté
Entrée VulDB353874 [dloebl CGIF jusqu’à 0.5.2 GIF Image src/cgif.c cgif_addframe width/height buffer overflow]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!