{"id":"CVE-2016-5116","details":"gd_xbm.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in certain custom PHP 5.5.x configurations, allows context-dependent attackers to obtain sensitive information from process memory or cause a denial of service (stack-based buffer under-read and application crash) via a long name.","modified":"2026-04-16T06:21:41.700266071Z","published":"2016-08-07T10:59:12.257Z","related":["SUSE-SU-2016:2303-1","openSUSE-SU-2024:10062-1"],"references":[{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3030-1"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3619"},{"type":"REPORT","url":"https://github.com/libgd/libgd/issues/211"},{"type":"FIX","url":"https://github.com/libgd/libgd/commit/4dc1a2d7931017d3625f2d7cff70a17ce58b53b4"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/05/29/5"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libgd/libgd","events":[{"introduced":"0"},{"last_affected":"a49ebbf1ed370c8d9bf0c30f35050ba2040eee5b"},{"fixed":"4dc1a2d7931017d3625f2d7cff70a17ce58b53b4"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.2.1"}]}},{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0"},{"last_affected":"5dc92c2117cafc61daaaaa240fd46c3ac33872a4"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"8.0"}]}}],"versions":["GD_1_3_0","GD_1_4_0","GD_1_5_0","GD_1_6_0","GD_1_6_1","GD_1_6_2","GD_1_6_3","GD_1_7_0","GD_1_7_1","GD_1_7_2","GD_1_7_3","GD_1_8_0","GD_1_8_1","GD_1_8_3","GD_1_8_4","GD_2_0_0","GD_2_0_1","GD_2_0_10","GD_2_0_11","GD_2_0_12","GD_2_0_13","GD_2_0_14","GD_2_0_15","GD_2_0_17","GD_2_0_18","GD_2_0_19","GD_2_0_2","GD_2_0_20","GD_2_0_21","GD_2_0_22","GD_2_0_23","GD_2_0_24","GD_2_0_25","GD_2_0_26","GD_2_0_27","GD_2_0_28","GD_2_0_29","GD_2_0_3","GD_2_0_30","GD_2_0_31","GD_2_0_32","GD_2_0_33","GD_2_0_34RC1","GD_2_0_4","GD_2_0_5","GD_2_0_6","GD_2_0_7","GD_2_0_8","GD_2_0_9","POST_64BIT_BRANCH_MERGE","POST_AST_MERGE","POST_PHP7_NSAPI_REMOVAL","POST_PHP7_REMOVALS","POST_PHPNG_MERGE","PRE_64BIT_BRANCH_MERGE","PRE_AST_MERGE","PRE_PHP7_EREG_MYSQL_REMOVALS","PRE_PHP7_NSAPI_REMOVAL","PRE_PHP7_REMOVALS","gd-2.1.0","gd-2.1.0-alpha1","gd-2.1.0-rc1","gd-2.1.1","gd-2.2.0","gd-2.2.1","php-8.0.0"],"database_specific":{"vanir_signatures":[{"signature_version":"v1","signature_type":"Function","digest":{"length":1437,"function_hash":"159732849098274341352919018137382865240"},"deprecated":false,"target":{"function":"gdImageXbmCtx","file":"src/gd_xbm.c"},"source":"https://github.com/libgd/libgd/commit/4dc1a2d7931017d3625f2d7cff70a17ce58b53b4","id":"CVE-2016-5116-2c83dd3e"},{"signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["45446309610186637121537505383792093410","265905027050232767493273108757908362247","33880144858283707541817879245031416904","218305928582978842128241372718436549115","256244119785605007248422930174615791543","253758725510508772508363173779679192748","68483349420796518696459711596542909788","74395346714304077413397129009478721316","159233106803560269695689526086168933696","122476412516029492119399838354455694923","147202700807701675432947523147302272779","165541713406580544154107895245655823908","318612835839705280670649476684004771066","16883678198067729595338841462367864144","165654997791556511415724280720000445993","146954115355138684746230718289110638235","168041509013837465422342443672834825193","202242598604278395000708774946506096569","171800542763170613578730856458574116284","52214021197683462104019989292556730579","39446760264591832102619175847381075691"]},"target":{"file":"src/gd_xbm.c"},"deprecated":false,"source":"https://github.com/libgd/libgd/commit/4dc1a2d7931017d3625f2d7cff70a17ce58b53b4","signature_type":"Line","id":"CVE-2016-5116-41870929"},{"signature_version":"v1","signature_type":"Function","digest":{"length":262,"function_hash":"38154755681792414440026108603311973871"},"deprecated":false,"target":{"function":"gdCtxPrintf","file":"src/gd_xbm.c"},"source":"https://github.com/libgd/libgd/commit/4dc1a2d7931017d3625f2d7cff70a17ce58b53b4","id":"CVE-2016-5116-8cf1ef89"}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"42.1"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-5116.json","vanir_signatures_modified":"2026-04-10T23:04:45Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}]}