{"id":"CVE-2019-16709","details":"ImageMagick 7.0.8-35 has a memory leak in coders/dps.c, as demonstrated by XCreateImage.","modified":"2026-04-11T12:19:50.599279Z","published":"2019-09-23T12:15:10.487Z","related":["MGASA-2019-0372","SUSE-SU-2019:2785-1","SUSE-SU-2019:2785-2","SUSE-SU-2019:2896-1","openSUSE-SU-2019:2317-1","openSUSE-SU-2019:2321-1","openSUSE-SU-2019:2515-1","openSUSE-SU-2019:2519-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"16.04"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"extracted_events":[{"last_affected":"18.04"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"extracted_events":[{"last_affected":"19.04"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"19.10"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"sle-15-NA"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:opensuse:backports:sle-15:-:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"sle-15-sp1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"15.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"15.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"}]},"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4192-1/"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/issues/1531"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"0"},{"last_affected":"224159dfcc0ae3da9a247921e3c8bfb44d39965e"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"7.0.8-35"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:imagemagick:imagemagick:7.0.8-35:*:*:*:*:*:*:*"}}],"versions":["7.0.1-0","7.0.1-1","7.0.1-10","7.0.1-2","7.0.1-3","7.0.1-4","7.0.1-5","7.0.1-6","7.0.1-7","7.0.1-8","7.0.1-9","7.0.2-0","7.0.2-1","7.0.2-10","7.0.2-2","7.0.2-3","7.0.2-4","7.0.2-5","7.0.2-6","7.0.2-7","7.0.2-8","7.0.2-9","7.0.3-0","7.0.3-1","7.0.3-10","7.0.3-2","7.0.3-3","7.0.3-4","7.0.3-5","7.0.3-6","7.0.3-7","7.0.3-8","7.0.3-9","7.0.4-0","7.0.4-1","7.0.4-10","7.0.4-2","7.0.4-3","7.0.4-4","7.0.4-5","7.0.4-6","7.0.4-7","7.0.4-8","7.0.4-9","7.0.5-0","7.0.5-1","7.0.5-10","7.0.5-2","7.0.5-3","7.0.5-4","7.0.5-5","7.0.5-6","7.0.5-7","7.0.5-8","7.0.5-9","7.0.6-0","7.0.6-1","7.0.6-2","7.0.6-3","7.0.6-4","7.0.6-5","7.0.6-6","7.0.6-7","7.0.6-8","7.0.6-9","7.0.7-0","7.0.7-1","7.0.7-10","7.0.7-11","7.0.7-12","7.0.7-13","7.0.7-14","7.0.7-15","7.0.7-16","7.0.7-17","7.0.7-18","7.0.7-19","7.0.7-2","7.0.7-20","7.0.7-21","7.0.7-22","7.0.7-23","7.0.7-24","7.0.7-25","7.0.7-26","7.0.7-27","7.0.7-28","7.0.7-29","7.0.7-3","7.0.7-30","7.0.7-31","7.0.7-32","7.0.7-33","7.0.7-34","7.0.7-35","7.0.7-36","7.0.7-37","7.0.7-38","7.0.7-39","7.0.7-4","7.0.7-5","7.0.7-6","7.0.7-8","7.0.7-9","7.0.7.7","7.0.8-0","7.0.8-1","7.0.8-10","7.0.8-11","7.0.8-12","7.0.8-13","7.0.8-14","7.0.8-15","7.0.8-16","7.0.8-17","7.0.8-18","7.0.8-19","7.0.8-2","7.0.8-20","7.0.8-21","7.0.8-22","7.0.8-23","7.0.8-24","7.0.8-25","7.0.8-26","7.0.8-27","7.0.8-28","7.0.8-29","7.0.8-3","7.0.8-30","7.0.8-31","7.0.8-32","7.0.8-33","7.0.8-34","7.0.8-35","7.0.8-4","7.0.8-5","7.0.8-6","7.0.8-7","7.0.8-8","7.0.8-9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-16709.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}