Product:

Imagemagick

(Imagemagick)
Date Id Summary Products Score Patch Annotated
2022-08-10 CVE-2022-2719 In ImageMagick, a crafted file could trigger an assertion failure when a call to WriteImages was made in MagickWand/operation.c, due to a NULL image list. This could potentially cause a denial of service. This was fixed in upstream ImageMagick version 7.1.0-30. Extra_packages_for_enterprise_linux, Fedora, Imagemagick 5.5
2022-04-29 CVE-2022-1114 A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service. Imagemagick 7.1
2019-09-23 CVE-2019-16708 ImageMagick 7.0.8-35 has a memory leak in magick/xwindow.c, related to XCreateImage. Ubuntu_linux, Debian_linux, Imagemagick, Leap 6.5
2019-09-23 CVE-2019-16710 ImageMagick 7.0.8-35 has a memory leak in coders/dot.c, as demonstrated by AcquireMagickMemory in MagickCore/memory.c. Ubuntu_linux, Debian_linux, Imagemagick, Leap 6.5
2019-09-23 CVE-2019-16711 ImageMagick 7.0.8-40 has a memory leak in Huffman2DEncodeImage in coders/ps2.c. Ubuntu_linux, Debian_linux, Imagemagick, Leap 6.5
2019-09-23 CVE-2019-16713 ImageMagick 7.0.8-43 has a memory leak in coders/dot.c, as demonstrated by PingImage in MagickCore/constitute.c. Ubuntu_linux, Debian_linux, Imagemagick, Leap 6.5
2022-03-23 CVE-2021-4219 A flaw was found in ImageMagick. The vulnerability occurs due to improper use of open functions and leads to a denial of service. This flaw allows an attacker to crash the system. Imagemagick 5.5
2019-09-23 CVE-2019-16709 ImageMagick 7.0.8-35 has a memory leak in coders/dps.c, as demonstrated by XCreateImage. Ubuntu_linux, Imagemagick, Backports, Leap 6.5
2019-09-23 CVE-2019-16712 ImageMagick 7.0.8-43 has a memory leak in Huffman2DEncodeImage in coders/ps3.c, as demonstrated by WritePS3Image. Imagemagick, Leap 6.5
2021-11-19 CVE-2021-3962 A flaw was found in ImageMagick where it did not properly sanitize certain input before using it to invoke convert processes. This flaw allows an attacker to create a specially crafted image that leads to a use-after-free vulnerability when processed by ImageMagick. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Imagemagick 7.8