Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2.1.0-3ubuntu0.1",
"binary_name": "libgd-dev"
},
{
"binary_version": "2.1.0-3ubuntu0.1",
"binary_name": "libgd-tools"
},
{
"binary_version": "2.1.0-3ubuntu0.1",
"binary_name": "libgd2-noxpm-dev"
},
{
"binary_version": "2.1.0-3ubuntu0.1",
"binary_name": "libgd2-xpm-dev"
},
{
"binary_version": "2.1.0-3ubuntu0.1",
"binary_name": "libgd3"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2.1.1-4ubuntu0.16.04.1",
"binary_name": "libgd-dev"
},
{
"binary_version": "2.1.1-4ubuntu0.16.04.1",
"binary_name": "libgd-tools"
},
{
"binary_version": "2.1.1-4ubuntu0.16.04.1",
"binary_name": "libgd3"
}
]
}