When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.
lists.opensuse.org/opensuse-security-announce/2020-03/msg00020.html
access.redhat.com/errata/RHSA-2019:2519
access.redhat.com/errata/RHSA-2019:3299
bugs.debian.org/cgi-bin/bugreport.cgi?bug=929821
bugs.php.net/bug.php?id=77973
bugzilla.redhat.com/show_bug.cgi?id=1724149
bugzilla.redhat.com/show_bug.cgi?id=1724432
bugzilla.suse.com/show_bug.cgi?id=1140118
bugzilla.suse.com/show_bug.cgi?id=1140120
github.com/libgd/libgd/issues/501
lists.debian.org/debian-lts-announce/2019/06/msg00003.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKSSWFR2WPMUOIB5EN5ZM252NNEPYUTG/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WAZBVK6XNYEIN7RDQXESSD63QHXPLKWL/
seclists.org/bugtraq/2019/Sep/38
usn.ubuntu.com/4316-1/
usn.ubuntu.com/4316-2/
www.debian.org/security/2019/dsa-4529