gdk-pixbuf2-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the gdk-pixbuf2-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-bounds Write

<0:2.36.12-6.el8_10
  • L
Incomplete Cleanup

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Cross-site Scripting (XSS)

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Use After Free

<0:2.36.12-5.el8
  • L
Use After Free

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Read

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Use After Free

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Use After Free

<0:2.36.12-5.el8
  • L
Out-of-bounds Read

<0:2.36.12-5.el8
  • L
Integer Overflow or Wraparound

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Improper Validation of Array Index

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Use After Free

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Cross-site Scripting (XSS)

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.36.12-5.el8
  • L
CVE-2019-6251

<0:2.36.12-5.el8
  • L
Out-of-bounds Write

<0:2.36.12-5.el8
  • L
Improper Authentication

<0:2.36.12-5.el8
  • L
Incorrect Default Permissions

<0:2.36.12-5.el8
  • L
Improper Check for Unusual or Exceptional Conditions

<0:2.36.12-5.el8
  • L
Improper Data Handling

<0:2.36.12-5.el8