An issue was discovered in gif2apng 1.9. There is a stack-based buffer overflow involving a while loop. An attacker has little influence over the data written to the stack, making it unlikely that the flow of control can be subverted.
{ "binaries": [ { "binary_name": "gif2apng", "binary_version": "1.7-3ubuntu0.1~esm1" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-45908.json"
{ "binaries": [ { "binary_name": "gif2apng", "binary_version": "1.9+srconly-2ubuntu0.1" } ] }
{ "binaries": [ { "binary_name": "gif2apng", "binary_version": "1.9+srconly-3ubuntu0.1" } ] }