gd-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the gd-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-Bounds

<0:2.2.5-7.el8
  • M
Out-of-Bounds

<0:2.2.5-7.el8
  • M
Out-of-Bounds

<0:2.2.5-7.el8
  • M
Out-of-Bounds

<0:2.2.5-7.el8
  • M
Out-of-Bounds

<0:2.2.5-7.el8
  • M
Out-of-Bounds

<0:2.2.5-7.el8
  • M
Out-of-Bounds

<0:2.2.5-7.el8
  • M
Out-of-Bounds

<0:2.2.5-7.el8
  • M
Out-of-Bounds

<0:2.2.5-7.el8
  • M
Out-of-Bounds

<0:2.2.5-7.el8
  • M
Out-of-Bounds

<0:2.2.5-7.el8
  • M
Out-of-Bounds

<0:2.2.5-7.el8
  • M
Out-of-Bounds

<0:2.2.5-7.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-7.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-7.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-7.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-7.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-7.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-7.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-7.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-7.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-7.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-7.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-7.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-7.el8
  • M
Heap-based Buffer Overflow

<0:2.2.5-7.el8
  • M
Use After Free

<0:2.2.5-7.el8
  • M
Use After Free

<0:2.2.5-7.el8
  • M
Use After Free

<0:2.2.5-7.el8
  • M
Use After Free

<0:2.2.5-7.el8
  • M
Use After Free

<0:2.2.5-7.el8
  • M
Use After Free

<0:2.2.5-7.el8
  • M
Use After Free

<0:2.2.5-7.el8
  • M
Use After Free

<0:2.2.5-7.el8
  • M
Use After Free

<0:2.2.5-7.el8
  • M
Use After Free

<0:2.2.5-7.el8
  • M
Use After Free

<0:2.2.5-7.el8
  • M
Use After Free

<0:2.2.5-7.el8
  • M
Use After Free

<0:2.2.5-7.el8
  • L
Information Exposure

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*