Search for packages
| purl | pkg:deb/debian/libgd2@2.3.0-2 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-g3zj-r8ag-a7ej
Aliases: CVE-2021-38115 |
read_header_tga in gd_tga.c in the GD Graphics Library (aka LibGD) through 2.3.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file. |
Affected by 0 other vulnerabilities. |
|
VCID-qqe4-4aja-j7dz
Aliases: CVE-2021-40145 |
gdImageGd2Ptr in gd_gd2.c in the GD Graphics Library (aka LibGD) through 2.3.2 has a double free. NOTE: the vendor's position is "The GD2 image format is a proprietary image format of libgd. It has to be regarded as being obsolete, and should only be used for development and testing purposes. |
Affected by 0 other vulnerabilities. |
|
VCID-s83u-wk4f-wkfd
Aliases: CVE-2021-40812 |
The GD Graphics Library (aka LibGD) through 2.3.2 has an out-of-bounds read because of the lack of certain gdGetBuf and gdPutBuf return value checks. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-jun7-q9ts-ebfe | In the GD Graphics Library (aka LibGD) through 2.2.5, there is a heap-based buffer over-read in tiffWriter in gd_tiff.c. NOTE: the vendor says "In my opinion this issue should not have a CVE, since the GD and GD2 formats are documented to be 'obsolete, and should only be used for development and testing purposes.' |
CVE-2017-6363
|
| VCID-zp5r-wjhe-u7b3 | gd: NULL pointer dereference in gdImageClone |
CVE-2018-14553
|