Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "libgd2-xpm-dev": "2.1.0-3ubuntu0.1", "libgd-dev": "2.1.0-3ubuntu0.1", "libgd3-dbgsym": "2.1.0-3ubuntu0.1", "libgd3": "2.1.0-3ubuntu0.1", "libgd-dbg": "2.1.0-3ubuntu0.1", "libgd2-noxpm-dev": "2.1.0-3ubuntu0.1", "libgd-tools": "2.1.0-3ubuntu0.1", "libgd-tools-dbgsym": "2.1.0-3ubuntu0.1" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "libgd-dev": "2.1.1-4ubuntu0.16.04.1", "libgd3-dbgsym": "2.1.1-4ubuntu0.16.04.1", "libgd3": "2.1.1-4ubuntu0.16.04.1", "libgd-dbg": "2.1.1-4ubuntu0.16.04.1", "libgd-dev-dbgsym": "2.1.1-4ubuntu0.16.04.1", "libgd-tools": "2.1.1-4ubuntu0.16.04.1", "libgd-tools-dbgsym": "2.1.1-4ubuntu0.16.04.1" } ] }