Release date:
2026-03-04 17:32:35 UTC
Description:
- CVE-2026-25798: fix NULL pointer dereference in ClonePixelCacheRepository
- CVE-2026-24481: fix heap information disclosure in PSD handler
- CVE-2026-25799: fix division-by-zero in YUV sampling factor validation
- CVE-2026-26284: fix out-of-bounds read in PCD Huffman decoder
- CVE-2026-25897: fix integer overflow in Sun decoder on 32-bit systems
- CVE-2026-26066: fix infinite loop in IPTCTEXT profile writing
- CVE-2026-26283: fix infinite loop in JPEG encoder extent binary search
- CVE-2026-25795: fix NULL pointer dereference in ReadSFWImage
- CVE-2026-25796: fix memory leak in ReadSTEGANOImage
Updated packages:
-
ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els5.i686.rpm
sha:930190ba0058d8be7143f4908f824b050eaaa5ea98a727e57593b7ce3b41ffd5
-
ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els5.x86_64.rpm
sha:db6d30c2f6e78b5a86dd4372556a5be8ce779052e4e02e2d8822f6b5b849e64d
-
ImageMagick-c++-6.9.10.68-7.0.3.el7_9.tuxcare.els5.i686.rpm
sha:f4ab138b0a72a3bb4bb4d9052c9e1c867ec5f984d69371f68cfa63d27cf0fb74
-
ImageMagick-c++-6.9.10.68-7.0.3.el7_9.tuxcare.els5.x86_64.rpm
sha:88c6ae1c95ce8d66b90e4e251a00c66457d08e35be09562203dee7e87e2b5b36
-
ImageMagick-c++-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els5.i686.rpm
sha:c830bca93919279fe272f17ee7bfabc3d9a52fea79b565d8d54d089293b68da7
-
ImageMagick-c++-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els5.x86_64.rpm
sha:b872b324d4daba516633d6944c946dc4c4eb4cc3ecb9529199c43724444a8f17
-
ImageMagick-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els5.i686.rpm
sha:e73269a6ae259d085a015a5603320caf291c5845980aa9f7df4b25ca441adc15
-
ImageMagick-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els5.x86_64.rpm
sha:4df14658d35d0528e29239baed0ab2f5c9ecc60a2a2edfed1c5bff6415a2ece8
-
ImageMagick-doc-6.9.10.68-7.0.3.el7_9.tuxcare.els5.x86_64.rpm
sha:1a61e29834bd34179f009ed799b6a084ff0fd4f5535a0d752befb7e0cc349536
-
ImageMagick-perl-6.9.10.68-7.0.3.el7_9.tuxcare.els5.x86_64.rpm
sha:2d6bbc2f6f7a0e662f4651ba9c160cfebc11985384bb5424d02138ce2c9e710e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.