Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow.
{
"binaries": [
{
"binary_name": "libgd-dev",
"binary_version": "2.1.0-3ubuntu0.1"
},
{
"binary_name": "libgd-tools",
"binary_version": "2.1.0-3ubuntu0.1"
},
{
"binary_name": "libgd2-noxpm-dev",
"binary_version": "2.1.0-3ubuntu0.1"
},
{
"binary_name": "libgd2-xpm-dev",
"binary_version": "2.1.0-3ubuntu0.1"
},
{
"binary_name": "libgd3",
"binary_version": "2.1.0-3ubuntu0.1"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "libgd-dev",
"binary_version": "2.1.1-4ubuntu0.16.04.1"
},
{
"binary_name": "libgd-tools",
"binary_version": "2.1.1-4ubuntu0.16.04.1"
},
{
"binary_name": "libgd3",
"binary_version": "2.1.1-4ubuntu0.16.04.1"
}
],
"availability": "No subscription required"
}