gd_xbm.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in certain custom PHP 5.5.x configurations, allows context-dependent attackers to obtain sensitive information from process memory or cause a denial of service (stack-based buffer under-read and application crash) via a long name.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libgd-dev",
"binary_version": "2.1.0-3ubuntu0.2"
},
{
"binary_name": "libgd-tools",
"binary_version": "2.1.0-3ubuntu0.2"
},
{
"binary_name": "libgd2-noxpm-dev",
"binary_version": "2.1.0-3ubuntu0.2"
},
{
"binary_name": "libgd2-xpm-dev",
"binary_version": "2.1.0-3ubuntu0.2"
},
{
"binary_name": "libgd3",
"binary_version": "2.1.0-3ubuntu0.2"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libgd-dev",
"binary_version": "2.1.1-4ubuntu0.16.04.2"
},
{
"binary_name": "libgd-tools",
"binary_version": "2.1.1-4ubuntu0.16.04.2"
},
{
"binary_name": "libgd3",
"binary_version": "2.1.1-4ubuntu0.16.04.2"
}
]
}