gd_xbm.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in certain custom PHP 5.5.x configurations, allows context-dependent attackers to obtain sensitive information from process memory or cause a denial of service (stack-based buffer under-read and application crash) via a long name.
{ "binaries": [ { "binary_name": "libgd-dbg", "binary_version": "2.1.0-3ubuntu0.2" }, { "binary_name": "libgd-dev", "binary_version": "2.1.0-3ubuntu0.2" }, { "binary_name": "libgd-tools", "binary_version": "2.1.0-3ubuntu0.2" }, { "binary_name": "libgd-tools-dbgsym", "binary_version": "2.1.0-3ubuntu0.2" }, { "binary_name": "libgd2-noxpm-dev", "binary_version": "2.1.0-3ubuntu0.2" }, { "binary_name": "libgd2-xpm-dev", "binary_version": "2.1.0-3ubuntu0.2" }, { "binary_name": "libgd3", "binary_version": "2.1.0-3ubuntu0.2" }, { "binary_name": "libgd3-dbgsym", "binary_version": "2.1.0-3ubuntu0.2" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "libgd-dbg", "binary_version": "2.1.1-4ubuntu0.16.04.2" }, { "binary_name": "libgd-dev", "binary_version": "2.1.1-4ubuntu0.16.04.2" }, { "binary_name": "libgd-dev-dbgsym", "binary_version": "2.1.1-4ubuntu0.16.04.2" }, { "binary_name": "libgd-tools", "binary_version": "2.1.1-4ubuntu0.16.04.2" }, { "binary_name": "libgd-tools-dbgsym", "binary_version": "2.1.1-4ubuntu0.16.04.2" }, { "binary_name": "libgd3", "binary_version": "2.1.1-4ubuntu0.16.04.2" }, { "binary_name": "libgd3-dbgsym", "binary_version": "2.1.1-4ubuntu0.16.04.2" } ], "availability": "No subscription required" }