[CLSA-2026:1775121288] ImageMagick: Fix of 7 CVEs
Type:
security
Severity:
Important
Release date:
2026-04-03 13:36:40 UTC
Description:
- CVE-2026-28494: fix stack buffer overflow in morphology kernel parsing - CVE-2026-28691: fix uninitialized pointer dereference in JBIG decoder - CVE-2026-25989: fix off-by-one boundary check in CastDoubleToLong - CVE-2026-25985: fix memory allocation without limits in SVG decoder - CVE-2026-24485: fix infinite loop in PCD decoder - CVE-2025-66628: fix integer overflow in TIM decoder on 32-bit systems - CVE-2026-28693: fix integer overflow in DIB/BMP coder
Updated packages:
  • ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els9.i686.rpm
    sha:3da164fa6fed35bea0e46eccfd2b12421ff20f4873243f1cd36d5ad9faf0172e
  • ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els9.x86_64.rpm
    sha:635c04da62bba39df6acf92807e80ebe2bf186c4b55b76cde0eb6a0b702f9417
  • ImageMagick-c++-6.9.10.68-7.0.3.el7_9.tuxcare.els9.i686.rpm
    sha:a157085d243ae08eb5ccbc20b67bf2f86e2e26909abcaa7d415d0eb9ac158ccc
  • ImageMagick-c++-6.9.10.68-7.0.3.el7_9.tuxcare.els9.x86_64.rpm
    sha:db9ae6f3b5f69c4a0cd01650ebf934bd7b9efedf802f9f6dfe5127de78e34f44
  • ImageMagick-c++-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els9.i686.rpm
    sha:c425d8472872ac24943ed6be2fad641680be9b37550be5f6032a62ba4baaab47
  • ImageMagick-c++-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els9.x86_64.rpm
    sha:311dcafc429c892a446558290b15b38cfceb66e07233de397064b92bde5b11ac
  • ImageMagick-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els9.i686.rpm
    sha:4bfa8a7136b1ac5c874dca39e616048ffca07c0d58819b5466fccdc3a5052d9b
  • ImageMagick-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els9.x86_64.rpm
    sha:eb18e84c50ed77aa8c49521c2b98fbdac339ddf3bb0f306468677886895d91f8
  • ImageMagick-doc-6.9.10.68-7.0.3.el7_9.tuxcare.els9.x86_64.rpm
    sha:acbf00de79b6382588be220f270fd8b226c0afd29cbbc751e8b8e7c9d33fa2ba
  • ImageMagick-perl-6.9.10.68-7.0.3.el7_9.tuxcare.els9.x86_64.rpm
    sha:6f080ccd03291b46b6e6eccf13e8dffb40ff4a1a33399d8b281feea5a10ed8b2
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.