graphicsmagick vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the graphicsmagick package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Out-of-bounds Write

<1.3.20-3+deb8u11
  • C
Integer Overflow or Wraparound

<1.3.20-3+deb8u10
  • M
Information Exposure

<1.3.20-3+deb8u9
  • C
Use After Free

<1.3.20-3+deb8u8
  • C
Out-of-bounds Write

<1.3.20-3+deb8u8
  • C
Out-of-bounds Read

<1.3.20-3+deb8u8
  • M
Missing Release of Resource after Effective Lifetime

*
  • H
Out-of-bounds Write

<1.3.20-3+deb8u7
  • H
Out-of-bounds Write

<1.3.20-3+deb8u7
  • M
Out-of-bounds Read

<1.3.20-3+deb8u7
  • M
Out-of-bounds Write

<1.3.20-3+deb8u7
  • H
Out-of-bounds Read

<1.3.20-3+deb8u6
  • H
Out-of-bounds Read

<1.3.20-3+deb8u6
  • H
Out-of-bounds Write

<1.3.20-3+deb8u6
  • M
Memory Leak

<1.3.20-3+deb8u6
  • C
Out-of-bounds Read

<1.3.20-3+deb8u6
  • H
Memory Leak

*
  • M
Improper Input Validation

<1.3.20-3+deb8u5
  • M
Out-of-bounds Write

<1.3.20-3+deb8u5
  • M
Out-of-bounds Read

<1.3.20-3+deb8u5
  • M
Missing Release of Resource after Effective Lifetime

*
  • H
Out-of-bounds Write

<1.3.20-1
  • M
Divide By Zero

<1.3.20-3+deb8u4
  • M
NULL Pointer Dereference

<1.3.20-3+deb8u4
  • M
NULL Pointer Dereference

<1.3.20-3+deb8u4
  • M
Allocation of Resources Without Limits or Throttling

<1.3.20-3+deb8u4
  • M
Allocation of Resources Without Limits or Throttling

<1.3.20-3+deb8u4
  • H
Use After Free

<1.3.20-3+deb8u4
  • H
Out-of-Bounds

<1.3.20-3+deb8u4
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.3.20-3+deb8u4
  • H
Out-of-bounds Read

<1.3.20-3+deb8u3
  • H
Out-of-bounds Read

<1.3.20-3+deb8u3
  • H
Out-of-bounds Read

<1.3.20-3+deb8u3
  • H
Out-of-bounds Read

*
  • H
Out-of-bounds Read

<1.3.20-3+deb8u3
  • H
Out-of-bounds Read

<1.3.20-3+deb8u3
  • H
Out-of-bounds Read

<1.3.20-3+deb8u3
  • H
Out-of-Bounds

<1.3.20-3+deb8u3
  • H
Out-of-bounds Read

<1.3.20-3+deb8u3
  • H
Out-of-Bounds

<1.3.20-3+deb8u3
  • H
Improper Input Validation

<1.3.20-3+deb8u4
  • H
NULL Pointer Dereference

<1.3.20-3+deb8u3
  • H
Out-of-Bounds

<1.3.20-3+deb8u4
  • M
Information Exposure

<1.3.20-3+deb8u3
  • H
NULL Pointer Dereference

<1.3.20-3+deb8u4
  • M
Information Exposure

<1.3.20-3+deb8u4
  • M
Integer Underflow

<1.3.20-3+deb8u4
  • M
NULL Pointer Dereference

<1.3.20-3+deb8u4
  • M
Out-of-bounds Read

<1.3.20-3+deb8u3
  • M
Reachable Assertion

*
  • M
NULL Pointer Dereference

<1.3.20-3+deb8u4
  • M
Out-of-bounds Read

<1.3.20-3+deb8u3
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Excessive Iteration

<1.3.20-3+deb8u4
  • M
Excessive Iteration

<1.3.20-3+deb8u4
  • M
CVE-2017-13775

<1.3.20-3+deb8u4
  • M
Use After Free

<1.3.20-3+deb8u4
  • M
Missing Release of Resource after Effective Lifetime

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • H
Improper Input Validation

*
  • M
Out-of-bounds Read

<1.3.20-3+deb8u3
  • M
Out-of-Bounds

<1.3.20-3+deb8u3
  • M
Missing Release of Resource after Effective Lifetime

*
  • M
NULL Pointer Dereference

<1.3.20-3+deb8u3
  • M
Out-of-Bounds

<1.3.20-3+deb8u3
  • H
Use After Free

<1.3.20-3+deb8u4
  • H
Out-of-bounds Read

<1.3.20-3+deb8u3
  • H
Out-of-bounds Read

<1.3.20-3+deb8u4
  • C
Missing Release of Resource after Effective Lifetime

<1.3.20-3+deb8u4
  • C
Out-of-Bounds

<1.3.20-3+deb8u3
  • H
Improper Input Validation

<1.3.20-3+deb8u4
  • C
Out-of-Bounds

<1.3.20-3+deb8u3
  • C
NULL Pointer Dereference

<1.3.20-3+deb8u4
  • H
NULL Pointer Dereference

<1.3.20-3+deb8u4
  • H
Use After Free

<1.3.20-3+deb8u4
  • M
Resource Exhaustion

<1.3.20-3+deb8u4
  • H
Improper Input Validation

<1.3.20-3+deb8u4
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

<1.3.20-3+deb8u6
  • H
Use of Uninitialized Resource

<1.3.20-3+deb8u4
  • M
Out-of-bounds Read

<1.3.20-3+deb8u1
  • C
Improper Access Control

<1.3.20-3+deb8u4
  • M
Out-of-bounds Read

<1.3.20-3+deb8u4
  • M
Improper Input Validation

<1.3.20-3+deb8u2
  • M
Improper Input Validation

<1.3.20-3+deb8u2
  • H
Out-of-Bounds

<1.3.20-3+deb8u2
  • H
Out-of-Bounds

<1.3.20-3+deb8u2
  • H
Out-of-bounds Read

<1.3.20-3+deb8u2
  • H
Resource Management Errors

<1.3.20-3+deb8u3
  • H
Out-of-Bounds

<1.3.20-3+deb8u2
  • C
Out-of-Bounds

<1.3.20-3+deb8u3
  • H
Out-of-bounds Read

<1.3.20-3+deb8u3
  • C
Out-of-Bounds

<1.3.20-3+deb8u3
  • M
Out-of-Bounds

<1.3.20-3+deb8u2
  • M
NULL Pointer Dereference

<1.3.20-3+deb8u2
  • M
Numeric Errors

<1.3.20-3+deb8u3
  • C
Out-of-Bounds

<1.3.20-3+deb8u2
  • H
NULL Pointer Dereference

<1.3.20-3+deb8u2
  • M
Out-of-Bounds

<1.3.20-3+deb8u2
  • C
Improper Access Control

<1.3.20-3+deb8u2
  • M
Information Exposure

<1.3.20-3+deb8u3
  • L
Access Restriction Bypass

<1.3.20-3+deb8u3
  • H
Improper Input Validation

<1.3.20-3+deb8u2
  • M
Improper Input Validation

<1.3.20-3+deb8u3
  • M
Improper Access Control

<1.3.20-3+deb8u2
  • M
CVE-2013-4589

<1.3.18-1
  • M
Out-of-Bounds

<1.3.16-1.1
  • H
CVE-2009-3736

<1.3.5-6
  • H
Numeric Errors

<1.3.5-5.1
  • H
CVE-2008-6621

<1.2.3-1
  • M
CVE-2008-6072

<1.2.3-1
  • H
Out-of-Bounds

<1.2.3-1
  • C
Out-of-Bounds

<1.2.3-1
  • M
Resource Management Errors

<1.2.4-1
  • M
Resource Management Errors

<1.1.7-13
  • M
Out-of-Bounds

<1.1.11-3.2
  • M
Resource Management Errors

<1.1.11-1
  • M
Numeric Errors

<1.1.11-1
  • H
Out-of-Bounds

<1.1.11-1
  • M
Numeric Errors

<1.1.7-15
  • H
Numeric Errors

<1.1.7-14
  • H
CVE-2007-0770

<1.1.7-12
  • M
Out-of-Bounds

<1.1.7-9
  • M
CVE-2006-3743

<1.1.7-8
  • M
Numeric Errors

<1.1.7-7
  • L
CVE-2006-4144

<1.1.7-7
  • H
CVE-2005-4601

<1.1.7-1
  • H
CVE-2005-0397

<1.1.7-1
  • C
CVE-2004-0981

<1.1.7-1