In Plib through 1.85, there is an integer overflow vulnerability that could result in arbitrary code execution. The vulnerability is found in ssgLoadTGA() function in src/ssg/ssgLoadTGA.cxx file.
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "libplib-dev", "binary_version": "1.8.5-7ubuntu0.1~esm1" }, { "binary_name": "libplib1", "binary_version": "1.8.5-7ubuntu0.1~esm1" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-38714.json"
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "libplib-dev", "binary_version": "1.8.5-8ubuntu0.18.04.1~esm1" }, { "binary_name": "libplib1", "binary_version": "1.8.5-8ubuntu0.18.04.1~esm1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libplib-dev", "binary_version": "1.8.5-8ubuntu0.20.04.1" }, { "binary_name": "libplib1", "binary_version": "1.8.5-8ubuntu0.20.04.1" } ] }