PHP is vulnerable to Information disclosure. When an attacker supplies malicious data, it causes the funciton gdImageCreateFromXbm()
to use the value of uninitialized variable.
CPE | Name | Operator | Version |
---|---|---|---|
rh-php71-php | eq | 7.1.8__1.el7 | |
rh-php72-php | eq | 7.2.10__3.el7 | |
gd:edge | eq | 2.2.5-r2 |
lists.opensuse.org/opensuse-security-announce/2020-03/msg00020.html
access.redhat.com/errata/RHSA-2019:2519
access.redhat.com/errata/RHSA-2019:3299
access.redhat.com/security/updates/classification/#moderate
bugs.debian.org/cgi-bin/bugreport.cgi?bug=929821
bugs.php.net/bug.php?id=77973
bugzilla.redhat.com/show_bug.cgi?id=1724149
bugzilla.redhat.com/show_bug.cgi?id=1724432
bugzilla.suse.com/show_bug.cgi?id=1140118
bugzilla.suse.com/show_bug.cgi?id=1140120
github.com/libgd/libgd/issues/501
lists.debian.org/debian-lts-announce/2019/06/msg00003.html
lists.fedoraproject.org/archives/list/[email protected]/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/
lists.fedoraproject.org/archives/list/[email protected]/message/PKSSWFR2WPMUOIB5EN5ZM252NNEPYUTG/
lists.fedoraproject.org/archives/list/[email protected]/message/WAZBVK6XNYEIN7RDQXESSD63QHXPLKWL/
seclists.org/bugtraq/2019/Sep/38
usn.ubuntu.com/4316-1/
usn.ubuntu.com/4316-2/
www.debian.org/security/2019/dsa-4529