[CLSA-2026:1775121601] ImageMagick: Fix of 7 CVEs
Type:
security
Severity:
Important
Release date:
2026-04-02 09:51:43 UTC
Description:
- CVE-2026-28494: fix stack buffer overflow in morphology kernel parsing - CVE-2026-28691: fix uninitialized pointer dereference in JBIG decoder - CVE-2026-25989: fix off-by-one boundary check in CastDoubleToLong - CVE-2026-25985: fix memory allocation without limits in SVG decoder - CVE-2026-24485: fix infinite loop in PCD decoder - CVE-2025-66628: fix integer overflow in TIM decoder on 32-bit systems - CVE-2026-28693: fix integer overflow in DIB/BMP coder
Updated packages:
  • ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els9.i686.rpm
    sha:c24998329c24fe98b63d226b269e1402ea81b2b316be65541e01492d838aa655
  • ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els9.x86_64.rpm
    sha:ac0844ee6c7822b6ae5b7cded611a557a2577bf2bbabfd8dfff118646fc99163
  • ImageMagick-c++-6.9.10.68-7.0.3.el7_9.tuxcare.els9.i686.rpm
    sha:99c87de5b17140e8bf4d378b2e7c93cbb4bb1c8c0d4d4f25a92d2405d3a6db4f
  • ImageMagick-c++-6.9.10.68-7.0.3.el7_9.tuxcare.els9.x86_64.rpm
    sha:295f023dfb21a6e527ac1aeee72094365be166841aefdc519cd43fd35a15cdbc
  • ImageMagick-c++-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els9.i686.rpm
    sha:f2a1fc40fa622fdccfbfd034f70736d9c7bdc8311cf6dea190704cc11376f15d
  • ImageMagick-c++-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els9.x86_64.rpm
    sha:af9bec4a599da738d59e47d5afb8f3e50fdcf9946096e57e4d1ad9ff66fad521
  • ImageMagick-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els9.i686.rpm
    sha:43d97961e869fcaa95748759cc074f4c23973eaa2828ac7bd87fd62d804e8ff9
  • ImageMagick-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els9.x86_64.rpm
    sha:ac968aef35e4eadf8530b15c69cb34c9130fb7d0ca9cd1978635ee9d357c54e9
  • ImageMagick-doc-6.9.10.68-7.0.3.el7_9.tuxcare.els9.x86_64.rpm
    sha:5bbf26612744916232e347da23805435498c60f643426f45c04b3676916677b1
  • ImageMagick-perl-6.9.10.68-7.0.3.el7_9.tuxcare.els9.x86_64.rpm
    sha:6a4a74fcb891af4cd6c2222289f9be7dde3926d48ddfec658af6654a592bc6d7
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.