Security Advisories (3)
CVE-2026-8669 (2026-05-15)

Imager versions through 1.030 for Perl allow a heap out of bounds (OOB) write on crafted multi-frame GIF files. Imager::File::GIF's i_readgif_multi_low allocates a single per-row buffer GifRow sized for the GIF's global screen width 'SWidth' and reuses it across every image in the file. The page-match branch validates Image.Width + Image.Left > SWidth before each DGifGetLine write, but the parallel skip-image branch at imgif.c:790-805 calls DGifGetLine(GifFile, GifRow, Width) with no such check.

CVE-2016-1238 (2016-08-02)

Imager would search the default current directory entry in @INC when searching for file format support modules.

CVE-2024-53901 (2024-11-17)

"invalid next size" backtrace on use of trim on certain images

NAME

Imager::Filter::Mandelbrot - filter that renders the Mandelbrot set.

SYNOPSIS

use Imager;
use Imager::Filter::Mandelbrot;

$img->filter(type=>'mandelbrot', ...);

DESCRIPTION

This is a expansion of the mandelbrot dynamically loadable filter provided in dynfilt in previous releases of Imager.

Valid filter parameters are:

  • minx, maxx - the range of x values to render. Defaults: -2.5, 1.5.

  • miny, maxy - the range of y values to render. Defaults: -1.5, 1.5

  • maxiter - the maximum number of iterations to perform when checking if the sequence tend towards infinity.

AUTHOR

Original by Arnar M. Hrafnkelsson.

Adapted and expanded by Tony Cook <tonyc@cpan.org>

SEE ALSO

Imager, Imager::Filters.