gdk-pixbuf2 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the gdk-pixbuf2 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Directory Traversal

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Information Exposure

<0:2.36.12-3.el7
  • M
Improper Certificate Validation

<0:2.36.12-3.el7
  • M
NULL Pointer Dereference

<0:2.36.12-3.el7
  • M
Stack-based Buffer Overflow

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Buffer Overflow

<0:2.36.12-3.el7
  • M
Uncontrolled Recursion

<0:2.36.12-3.el7
  • M
Buffer Overflow

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Out-of-bounds Write

*
  • M
Buffer Overflow

<0:2.36.12-3.el7
  • M
Buffer Overflow

<0:2.36.12-3.el7
  • M
Buffer Overflow

<0:2.36.12-3.el7
  • M
Buffer Overflow

<0:2.36.12-3.el7
  • M
Buffer Overflow

<0:2.36.12-3.el7
  • M
Buffer Overflow

<0:2.36.12-3.el7
  • M
Buffer Overflow

<0:2.36.12-3.el7
  • M
Buffer Overflow

<0:2.36.12-3.el7
  • M
Buffer Overflow

<0:2.36.12-3.el7
  • M
Directory Traversal

<0:2.36.12-3.el7
  • M
Directory Traversal

<0:2.36.12-3.el7
  • M
Directory Traversal

<0:2.36.12-3.el7
  • M
Directory Traversal

<0:2.36.12-3.el7
  • M
Directory Traversal

<0:2.36.12-3.el7
  • M
Directory Traversal

<0:2.36.12-3.el7
  • M
Directory Traversal

<0:2.36.12-3.el7
  • M
Directory Traversal

<0:2.36.12-3.el7
  • M
Directory Traversal

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Stack-based Buffer Overflow

<0:2.36.12-3.el7
  • M
Stack-based Buffer Overflow

<0:2.36.12-3.el7
  • M
Stack-based Buffer Overflow

<0:2.36.12-3.el7
  • M
Stack-based Buffer Overflow

<0:2.36.12-3.el7
  • M
Stack-based Buffer Overflow

<0:2.36.12-3.el7
  • M
Stack-based Buffer Overflow

<0:2.36.12-3.el7
  • M
Stack-based Buffer Overflow

<0:2.36.12-3.el7
  • M
Stack-based Buffer Overflow

<0:2.36.12-3.el7
  • M
Stack-based Buffer Overflow

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
NULL Pointer Dereference

<0:2.36.12-3.el7
  • M
NULL Pointer Dereference

<0:2.36.12-3.el7
  • M
NULL Pointer Dereference

<0:2.36.12-3.el7
  • M
NULL Pointer Dereference

<0:2.36.12-3.el7
  • M
NULL Pointer Dereference

<0:2.36.12-3.el7
  • M
NULL Pointer Dereference

<0:2.36.12-3.el7
  • M
NULL Pointer Dereference

<0:2.36.12-3.el7
  • M
NULL Pointer Dereference

<0:2.36.12-3.el7
  • M
NULL Pointer Dereference

<0:2.36.12-3.el7
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.28.2-5.el7_1
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Heap-based Buffer Overflow

<0:2.36.5-1.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Numeric Range Comparison Without Minimum Check

<0:2.31.6-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-Bounds

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Information Exposure

<0:2.36.12-3.el7
  • M
Information Exposure

<0:2.36.12-3.el7
  • M
Information Exposure

<0:2.36.12-3.el7
  • M
Information Exposure

<0:2.36.12-3.el7
  • M
Information Exposure

<0:2.36.12-3.el7
  • M
Information Exposure

<0:2.36.12-3.el7
  • M
Information Exposure

<0:2.36.12-3.el7
  • M
Information Exposure

<0:2.36.12-3.el7
  • M
Information Exposure

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Out-of-bounds Read

<0:2.36.12-3.el7
  • M
Improper Certificate Validation

<0:2.36.12-3.el7
  • M
Improper Certificate Validation

<0:2.36.12-3.el7
  • M
Improper Certificate Validation

<0:2.36.12-3.el7
  • M
Improper Certificate Validation

<0:2.36.12-3.el7
  • M
Improper Certificate Validation

<0:2.36.12-3.el7
  • M
Improper Certificate Validation

<0:2.36.12-3.el7
  • M
Improper Certificate Validation

<0:2.36.12-3.el7
  • M
Improper Certificate Validation

<0:2.36.12-3.el7
  • M
Improper Certificate Validation

<0:2.36.12-3.el7
  • L
Out-of-bounds Read

*
  • M
Buffer Overflow

<0:2.36.12-3.el7
  • M
Buffer Overflow

<0:2.36.12-3.el7
  • M
Buffer Overflow

<0:2.36.12-3.el7
  • M
Buffer Overflow

<0:2.36.12-3.el7
  • M
Buffer Overflow

<0:2.36.12-3.el7
  • M
Buffer Overflow

<0:2.36.12-3.el7
  • M
Buffer Overflow

<0:2.36.12-3.el7
  • M
Buffer Overflow

<0:2.36.12-3.el7
  • M
Buffer Overflow

<0:2.36.12-3.el7
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Uncontrolled Recursion

<0:2.36.12-3.el7
  • M
Uncontrolled Recursion

<0:2.36.12-3.el7
  • M
Uncontrolled Recursion

<0:2.36.12-3.el7
  • M
Uncontrolled Recursion

<0:2.36.12-3.el7
  • M
Uncontrolled Recursion

<0:2.36.12-3.el7
  • M
Uncontrolled Recursion

<0:2.36.12-3.el7
  • M
Uncontrolled Recursion

<0:2.36.12-3.el7
  • M
Uncontrolled Recursion

<0:2.36.12-3.el7
  • M
Uncontrolled Recursion

<0:2.36.12-3.el7
  • M
Out-of-bounds Write

*
  • M
Integer Overflow or Wraparound

*
  • M
Heap-based Buffer Overflow

*
  • M
Numeric Errors

*