ImageMagick is vulnerable to denial of service (DoS) attacks. A malicious user can pass a PSD file to the system causing big loop that consumes a large amount of CPU resources. This is due to the library lacking an end of file (EOF) check.
github.com/ImageMagick/ImageMagick/commit/8598a497e2d1f556a34458cf54b40ba40674734c
github.com/ImageMagick/ImageMagick/commit/bdbbb13f1fe9b7e2465502c500561720f7456aac
github.com/ImageMagick/ImageMagick/issues/715
lists.debian.org/debian-lts-announce/2019/05/msg00015.html
lists.debian.org/debian-lts-announce/2020/09/msg00007.html
security.gentoo.org/glsa/201711-07
usn.ubuntu.com/3681-1/