{"id":"USN-4222-1","summary":"graphicsmagick vulnerabilities","details":"It was discovered that GraphicsMagick incorrectly handled certain image files.\nAn attacker could possibly use this issue to cause a denial of service or other\nunspecified impact.\n","modified":"2026-02-10T04:41:43Z","published":"2019-12-16T16:37:05Z","related":["UBUNTU-CVE-2017-11638","UBUNTU-CVE-2017-11641","UBUNTU-CVE-2017-11642","UBUNTU-CVE-2017-11643","UBUNTU-CVE-2017-12935","UBUNTU-CVE-2017-12936","UBUNTU-CVE-2017-12937","UBUNTU-CVE-2017-13063","UBUNTU-CVE-2017-13064","UBUNTU-CVE-2017-13065","UBUNTU-CVE-2017-13134","UBUNTU-CVE-2017-13737","UBUNTU-CVE-2017-13775","UBUNTU-CVE-2017-13776","UBUNTU-CVE-2017-13777"],"upstream":["CVE-2017-11638","CVE-2017-11641","CVE-2017-11642","CVE-2017-11643","CVE-2017-12935","CVE-2017-12936","CVE-2017-12937","CVE-2017-13063","CVE-2017-13064","CVE-2017-13065","CVE-2017-13134","CVE-2017-13737","CVE-2017-13775","CVE-2017-13776","CVE-2017-13777","UBUNTU-CVE-2017-11638","UBUNTU-CVE-2017-11641","UBUNTU-CVE-2017-11642","UBUNTU-CVE-2017-11643","UBUNTU-CVE-2017-12935","UBUNTU-CVE-2017-12936","UBUNTU-CVE-2017-12937","UBUNTU-CVE-2017-13063","UBUNTU-CVE-2017-13064","UBUNTU-CVE-2017-13065","UBUNTU-CVE-2017-13134","UBUNTU-CVE-2017-13737","UBUNTU-CVE-2017-13775","UBUNTU-CVE-2017-13776","UBUNTU-CVE-2017-13777"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4222-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-11638"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-11641"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-11642"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-11643"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-12935"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-12936"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-12937"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13063"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13064"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13065"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13134"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13737"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13775"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13776"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13777"}],"affected":[{"package":{"name":"graphicsmagick","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/graphicsmagick@1.3.23-1ubuntu0.3?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.23-1ubuntu0.3"}]}],"versions":["1.3.21-3","1.3.23-1","1.3.23-1build1","1.3.23-1ubuntu0.1","1.3.23-1ubuntu0.2"],"ecosystem_specific":{"binaries":[{"binary_name":"graphicsmagick","binary_version":"1.3.23-1ubuntu0.3"},{"binary_name":"graphicsmagick-imagemagick-compat","binary_version":"1.3.23-1ubuntu0.3"},{"binary_name":"graphicsmagick-libmagick-dev-compat","binary_version":"1.3.23-1ubuntu0.3"},{"binary_name":"libgraphics-magick-perl","binary_version":"1.3.23-1ubuntu0.3"},{"binary_name":"libgraphicsmagick++-q16-12","binary_version":"1.3.23-1ubuntu0.3"},{"binary_name":"libgraphicsmagick++1-dev","binary_version":"1.3.23-1ubuntu0.3"},{"binary_name":"libgraphicsmagick-q16-3","binary_version":"1.3.23-1ubuntu0.3"},{"binary_name":"libgraphicsmagick1-dev","binary_version":"1.3.23-1ubuntu0.3"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4222-1.json","cves_map":{"cves":[{"id":"CVE-2017-11638","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2017-11641","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2017-11642","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2017-11643","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2017-12935","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2017-12936","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2017-12937","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2017-13063","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2017-13064","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2017-13065","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2017-13134","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2017-13737","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2017-13775","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2017-13776","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2017-13777","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:16.04:LTS"}}}],"schema_version":"1.7.3"}