CVE-2021-38115: read_header_tga in gd_tga.c in the GD Graphics Library (aka LibGD) through 2.3.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file. Unreleased patch: https://github.com/libgd/libgd/commit/edaf39fe6fb0d1867b9b5992efb9fe4102138553
Fixed in commit https://github.com/libgd/libgd/commit/edaf39fe6fb0d1867b9b5992efb9fe4102138553 (as linked before), commit went into release 2.3.3 (https://github.com/libgd/libgd/releases/tag/gd-2.3.3)). There is still version 2.3.2 left in tree and marked as stable while 2.3.3 is unstable. I'd recommend cleanup and security stabilisation of 2.3.3 once someone from the codec project confirms this.
OOB read is low impact, no GLSA. Please cleanup.