imagemagick vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the imagemagick package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-bounds Write

<8:6.6.9.7-5ubuntu3.3
  • M
Buffer Overflow

<8:6.6.9.7-5ubuntu3.3
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • M
Improper Access Control

<8:6.6.9.7-5ubuntu3.5
  • M
Improper Access Control

<8:6.6.9.7-5ubuntu3.5
  • M
Improper Access Control

<8:6.6.9.7-5ubuntu3.5
  • L
Resource Management Errors

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Write

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Divide By Zero

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Resource Management Errors

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Write

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Write

<8:6.6.9.7-5ubuntu3.5
  • L
Improper Input Validation

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Write

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
NULL Pointer Dereference

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • L
Error Handling

<8:6.6.9.7-5ubuntu3.5
  • M
Improper Input Validation

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • M
Improper Input Validation

<8:6.6.9.7-5ubuntu3.5
  • M
Improper Input Validation

<8:6.6.9.7-5ubuntu3.5
  • M
Improper Input Validation

<8:6.6.9.7-5ubuntu3.5
  • M
Improper Input Validation

<8:6.6.9.7-5ubuntu3.5
  • M
Improper Input Validation

<8:6.6.9.7-5ubuntu3.5
  • M
Double Free

<8:6.6.9.7-5ubuntu3.5
  • M
Improper Input Validation

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
NULL Pointer Dereference

<8:6.6.9.7-5ubuntu3.5
  • M
Improper Input Validation

<8:6.6.9.7-5ubuntu3.5
  • L
Missing Release of Resource after Effective Lifetime

<8:6.6.9.7-5ubuntu3.8
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.8
  • M
Numeric Errors

<8:6.6.9.7-5ubuntu3.8
  • M
Double Free

<8:6.6.9.7-5ubuntu3.8
  • M
Out-of-bounds Write

<8:6.6.9.7-5ubuntu3.8
  • L
Improper Access Control

<8:6.6.9.7-5ubuntu3.8
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.8
  • L
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.6
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.6
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Use After Free

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Directory Traversal

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
CVE-2014-9838

<8:6.6.9.7-5ubuntu3.5
  • M
Resource Management Errors

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Improper Input Validation

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Error Handling

<8:6.6.9.7-5ubuntu3.5
  • M
Resource Management Errors

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Resource Management Errors

<8:6.6.9.7-5ubuntu3.5
  • M
Resource Management Errors

<8:6.6.9.7-5ubuntu3.5
  • M
Improper Access Control

<8:6.6.9.7-5ubuntu3.4
  • M
Double Free

<8:6.6.9.7-5ubuntu3.5
  • M
Integer Overflow or Wraparound

<8:6.6.9.7-5ubuntu3.5
  • M
NULL Pointer Dereference

<8:6.6.9.7-5ubuntu3.5
  • M
CVE-2015-8896

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.9
  • M
Improper Input Validation

<8:6.6.9.7-5ubuntu3.9
  • M
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.6
  • M
Buffer Overflow

<8:6.6.9.7-5ubuntu3.6
  • L
Unchecked Return Value

<8:6.6.9.7-5ubuntu3.6
  • L
Improper Access Control

<8:6.6.9.7-5ubuntu3.6
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.6
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.6
  • M
Improper Input Validation

<8:6.6.9.7-5ubuntu3.6
  • M
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.6
  • L
Error Handling

<8:6.6.9.7-5ubuntu3.8
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.6
  • M
NULL Pointer Dereference

<8:6.6.9.7-5ubuntu3.6
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.6.9.7-5ubuntu3.5
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.6.9.7-5ubuntu3.5
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.6.9.7-5ubuntu3.5
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.6.9.7-5ubuntu3.5
  • M
CVE-2016-8677

<8:6.6.9.7-5ubuntu3.6
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.6
  • M
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.6
  • M
Integer Overflow or Wraparound

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-bounds Write

<8:6.6.9.7-5ubuntu3.8
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
NULL Pointer Dereference

<8:6.6.9.7-5ubuntu3.5
  • M
Integer Overflow or Wraparound

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • M
NULL Pointer Dereference

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • M
Improper Input Validation

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.5
  • M
Improper Access Control

<8:6.6.9.7-5ubuntu3.4
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Out-of-Bounds

<8:6.6.9.7-5ubuntu3.5
  • M
Improper Access Control

<8:6.6.9.7-5ubuntu3.4
  • M
Information Exposure

<8:6.6.9.7-5ubuntu3.4
  • M
Improper Input Validation

<8:6.6.9.7-5ubuntu3.4
  • M
Access Restriction Bypass

<8:6.6.9.7-5ubuntu3.4
  • M
Improper Input Validation

<8:6.6.9.7-5ubuntu3.4
  • M
CVE-2012-3437

<8:6.6.9.7-5ubuntu3.2
  • M
Integer Overflow or Wraparound

<8:6.6.9.7-5ubuntu3.1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.6.9.7-5ubuntu3.1
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<8:6.6.9.7-5ubuntu3.1
  • M
Integer Overflow or Wraparound

<8:6.6.9.7-5ubuntu3.1
  • L
Resource Exhaustion

<8:6.6.9.7-5ubuntu3.3
  • L
Out-of-bounds Read

<8:6.6.9.7-5ubuntu3.1
  • L
Improper Input Validation

<8:6.6.9.7-5ubuntu3.1