{"id":"CVE-2017-18211","details":"In ImageMagick 7.0.7, a NULL pointer dereference vulnerability was found in the function saveBinaryCLProgram in magick/opencl.c because a program-lookup result is not checked, related to CacheOpenCLKernel.","modified":"2026-04-11T12:05:37.505839Z","published":"2018-03-01T21:29:00.343Z","related":["SUSE-SU-2018:0857-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"14.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"16.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"17.10"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"18.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/103220"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3681-1/"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/issues/792"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"last_affected":"27f8ba82ddd665ab41cef6588128f680cbd69905"},{"last_affected":"b601ab2f2e355350b14ca72753684cbeeef7ffcf"},{"last_affected":"2460488112c34711473f50e16566494155d8e6ef"},{"last_affected":"78684928670347f8229905d3487f3208e3ebe289"},{"last_affected":"dcd5a5fed62ec861b955bd3da1d6f5592486c05a"},{"last_affected":"908258552716d029a6119c34de2350344720d405"},{"last_affected":"fcebe0ec85a9f532a6108efc08f0fad1a6df83f0"},{"last_affected":"8910f12f08e614a150fd8d717df5170c8c9e8a4b"},{"last_affected":"b964b20847be9015699bdb59b6431cf1101806ad"},{"last_affected":"7be0c046e2cfa5d1c97c4185137697b4617c882c"},{"last_affected":"315d854ad367b89f0e62b107fb9a9dda1a7659a0"},{"last_affected":"2884ed8a622c4b5678d1083fcaf0530ea3d58c7a"},{"last_affected":"ccc3afcfc93d5b421893d1da1cdae29908fc8dd1"},{"last_affected":"aba94de64e1423b5a3daa6178b04e6d22c839faf"},{"last_affected":"e017264a99f7621a5a7556454a2a6db43f8a45c3"},{"last_affected":"ddbf0ed10323d0fb329189041190630a8f7af5a7"},{"last_affected":"c9d4c4ecd1f7fb5168e512a0ba183b4bf8b47ce3"},{"last_affected":"652508e718a196c629fd97e465239d1ae52b2f23"},{"last_affected":"93b85201f22d0fb0b03f3f3e0d82c96c2bc103d1"},{"last_affected":"311157f0b67f4ccc85b3219f49db4f6d5277bd8e"},{"last_affected":"f39bfc52683755b50c83f3be693982a3bdb250fe"},{"last_affected":"b11a66975b900b3eb524360588edb15506290004"},{"last_affected":"3278fc22854db6236bcac95c963f0460b247a778"},{"last_affected":"d0c7deb7a2a4801ebfd589b33744294116f8873c"},{"last_affected":"009e5556dac88bcbb1aef80907747793299c30a6"},{"last_affected":"e12602b39b5e778240d286b6f9bbbc0fe3fb26c5"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"7.0.7-0"},{"last_affected":"7.0.7-1"},{"last_affected":"7.0.7-2"},{"last_affected":"7.0.7-3"},{"last_affected":"7.0.7-4"},{"last_affected":"7.0.7-5"},{"last_affected":"7.0.7-6"},{"last_affected":"7.0.7-8"},{"last_affected":"7.0.7-9"},{"last_affected":"7.0.7-10"},{"last_affected":"7.0.7-11"},{"last_affected":"7.0.7-12"},{"last_affected":"7.0.7-13"},{"last_affected":"7.0.7-14"},{"last_affected":"7.0.7-15"},{"last_affected":"7.0.7-16"},{"last_affected":"7.0.7-17"},{"last_affected":"7.0.7-18"},{"last_affected":"7.0.7-19"},{"last_affected":"7.0.7-20"},{"last_affected":"7.0.7-21"},{"last_affected":"7.0.7-22"},{"last_affected":"7.0.7-23"},{"last_affected":"7.0.7-24"},{"last_affected":"7.0.7-25"},{"last_affected":"7.0.7.7"}],"cpe":["cpe:2.3:a:imagemagick:imagemagick:7.0.7-0:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-1:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-2:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-3:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-4:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-5:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-6:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-8:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-9:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-10:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-11:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-12:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-13:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-14:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-15:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-16:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-17:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-18:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-19:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-20:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-21:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-22:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-23:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-24:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7-25:*:*:*:*:*:*:*","cpe:2.3:a:imagemagick:imagemagick:7.0.7.7:*:*:*:*:*:*:*"],"source":"CPE_FIELD"}}],"versions":["7.0.1-0","7.0.1-1","7.0.1-10","7.0.1-2","7.0.1-3","7.0.1-4","7.0.1-5","7.0.1-6","7.0.1-7","7.0.1-8","7.0.1-9","7.0.2-0","7.0.2-1","7.0.2-10","7.0.2-2","7.0.2-3","7.0.2-4","7.0.2-5","7.0.2-6","7.0.2-7","7.0.2-8","7.0.2-9","7.0.3-0","7.0.3-1","7.0.3-10","7.0.3-2","7.0.3-3","7.0.3-4","7.0.3-5","7.0.3-6","7.0.3-7","7.0.3-8","7.0.3-9","7.0.4-0","7.0.4-1","7.0.4-10","7.0.4-2","7.0.4-3","7.0.4-4","7.0.4-5","7.0.4-6","7.0.4-7","7.0.4-8","7.0.4-9","7.0.5-0","7.0.5-1","7.0.5-10","7.0.5-2","7.0.5-3","7.0.5-4","7.0.5-5","7.0.5-6","7.0.5-7","7.0.5-8","7.0.5-9","7.0.6-0","7.0.6-1","7.0.6-2","7.0.6-3","7.0.6-4","7.0.6-5","7.0.6-6","7.0.6-7","7.0.6-8","7.0.6-9","7.0.7-0","7.0.7-1","7.0.7-10","7.0.7-11","7.0.7-12","7.0.7-13","7.0.7-14","7.0.7-15","7.0.7-16","7.0.7-17","7.0.7-18","7.0.7-19","7.0.7-2","7.0.7-20","7.0.7-21","7.0.7-22","7.0.7-23","7.0.7-24","7.0.7-25","7.0.7-3","7.0.7-4","7.0.7-5","7.0.7-6","7.0.7-8","7.0.7-9","7.0.7.7"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-18211.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}