Security update for ImageMagick
| Announcement ID: | SUSE-SU-2026:21380-1 |
|---|---|
| Release Date: | 2026-04-22T11:02:58Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves 16 vulnerabilities can now be installed.
Description:
This update for ImageMagick fixes the following issues:
- CVE-2026-32259: stack out-of-bounds write due to a memory allocation failure in the sixel encoder can lead to a crash (bsc#1259612).
- CVE-2026-32636: out-of-bounds write of a single zero byte due to bug the
NewXMLTreemethod can lead to denial of service (bsc#1259872). - CVE-2026-33535: out-of-bounds write of a zero byte in X11
displayinteraction path can lead to a crash (bsc#1260874). - CVE-2026-33536: stack out-of-bounds write due to incorrect return value on certain platforms can lead to a denial of service (bsc#1260879).
- CVE-2026-33899: out-of-bounds write of single zero byte in XML parsing can lead to a denial of service (bsc#1262154).
- CVE-2026-33900: heap out-of-bounds write due to integer truncation in viff encoder can lead to a crash (bsc#1262156).
- CVE-2026-33901: heap buffer overflow in the MVG decoder can lead to memory corruption or a crash (bsc#1262155).
- CVE-2026-33902: stack buffer overflow in the FX expression parser can lead to a process crash (bsc#1262153).
- CVE-2026-33905: out-of-bounds read in
-sampleoperation can lead to a denial of service (bsc#1262097). - CVE-2026-33908: recursive execution with no depth limit imposed when processing XML files can lead to resource exhaustion and a denial of service (bsc#1262152).
- CVE-2026-34238: heap buffer overflow due to integer overflow in the despeckle operation can lead to a denial of service (bsc#1262147).
- CVE-2026-40169: out-of-bounds heap write when processing a crafted image and writing a YAML or JSON output can lead to a crash (bsc#1262150).
- CVE-2026-40183: heap out-of-bounds write in the JXL encoder can lead to a denial of service (bsc#1262145).
- CVE-2026-40310: heap out-of-bounds write in the JP2 encoder can lead to a denial of service (bsc#1262148).
- CVE-2026-40311: heap use-after-free when reading and printing values from an invalid XMP profile can lead to a denial of service (bsc#1262146).
- CVE-2026-40312: off-by-one error in the MSL decoder can lead to a crash (bsc#1262149).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server for SAP applications 16.0
zypper in -t patch SUSE-SLES-16.0-618=1 -
SUSE Linux Enterprise Server 16.0
zypper in -t patch SUSE-SLES-16.0-618=1
Package List:
-
SUSE Linux Enterprise Server for SAP applications 16.0 (ppc64le x86_64)
- libMagick++-7_Q16HDRI5-7.1.2.0-160000.8.1
- ImageMagick-debuginfo-7.1.2.0-160000.8.1
- ImageMagick-extra-debuginfo-7.1.2.0-160000.8.1
- libMagickCore-7_Q16HDRI10-debuginfo-7.1.2.0-160000.8.1
- ImageMagick-7.1.2.0-160000.8.1
- perl-PerlMagick-debuginfo-7.1.2.0-160000.8.1
- ImageMagick-devel-7.1.2.0-160000.8.1
- perl-PerlMagick-7.1.2.0-160000.8.1
- libMagickWand-7_Q16HDRI10-7.1.2.0-160000.8.1
- ImageMagick-extra-7.1.2.0-160000.8.1
- libMagick++-devel-7.1.2.0-160000.8.1
- libMagick++-7_Q16HDRI5-debuginfo-7.1.2.0-160000.8.1
- libMagickCore-7_Q16HDRI10-7.1.2.0-160000.8.1
- libMagickWand-7_Q16HDRI10-debuginfo-7.1.2.0-160000.8.1
- ImageMagick-debugsource-7.1.2.0-160000.8.1
-
SUSE Linux Enterprise Server for SAP applications 16.0 (noarch)
- ImageMagick-config-7-upstream-limited-7.1.2.0-160000.8.1
- ImageMagick-config-7-upstream-open-7.1.2.0-160000.8.1
- ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.8.1
- ImageMagick-config-7-SUSE-7.1.2.0-160000.8.1
- ImageMagick-doc-7.1.2.0-160000.8.1
- ImageMagick-config-7-upstream-secure-7.1.2.0-160000.8.1
-
SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64)
- libMagick++-7_Q16HDRI5-7.1.2.0-160000.8.1
- ImageMagick-debuginfo-7.1.2.0-160000.8.1
- ImageMagick-extra-debuginfo-7.1.2.0-160000.8.1
- libMagickCore-7_Q16HDRI10-debuginfo-7.1.2.0-160000.8.1
- ImageMagick-7.1.2.0-160000.8.1
- perl-PerlMagick-debuginfo-7.1.2.0-160000.8.1
- ImageMagick-devel-7.1.2.0-160000.8.1
- perl-PerlMagick-7.1.2.0-160000.8.1
- libMagickWand-7_Q16HDRI10-7.1.2.0-160000.8.1
- ImageMagick-extra-7.1.2.0-160000.8.1
- libMagick++-devel-7.1.2.0-160000.8.1
- libMagick++-7_Q16HDRI5-debuginfo-7.1.2.0-160000.8.1
- libMagickCore-7_Q16HDRI10-7.1.2.0-160000.8.1
- libMagickWand-7_Q16HDRI10-debuginfo-7.1.2.0-160000.8.1
- ImageMagick-debugsource-7.1.2.0-160000.8.1
-
SUSE Linux Enterprise Server 16.0 (noarch)
- ImageMagick-config-7-upstream-limited-7.1.2.0-160000.8.1
- ImageMagick-config-7-upstream-open-7.1.2.0-160000.8.1
- ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.8.1
- ImageMagick-config-7-SUSE-7.1.2.0-160000.8.1
- ImageMagick-doc-7.1.2.0-160000.8.1
- ImageMagick-config-7-upstream-secure-7.1.2.0-160000.8.1
References:
- https://www.suse.com/security/cve/CVE-2026-32259.html
- https://www.suse.com/security/cve/CVE-2026-32636.html
- https://www.suse.com/security/cve/CVE-2026-33535.html
- https://www.suse.com/security/cve/CVE-2026-33536.html
- https://www.suse.com/security/cve/CVE-2026-33899.html
- https://www.suse.com/security/cve/CVE-2026-33900.html
- https://www.suse.com/security/cve/CVE-2026-33901.html
- https://www.suse.com/security/cve/CVE-2026-33902.html
- https://www.suse.com/security/cve/CVE-2026-33905.html
- https://www.suse.com/security/cve/CVE-2026-33908.html
- https://www.suse.com/security/cve/CVE-2026-34238.html
- https://www.suse.com/security/cve/CVE-2026-40169.html
- https://www.suse.com/security/cve/CVE-2026-40183.html
- https://www.suse.com/security/cve/CVE-2026-40310.html
- https://www.suse.com/security/cve/CVE-2026-40311.html
- https://www.suse.com/security/cve/CVE-2026-40312.html
- https://bugzilla.suse.com/show_bug.cgi?id=1259612
- https://bugzilla.suse.com/show_bug.cgi?id=1259872
- https://bugzilla.suse.com/show_bug.cgi?id=1260874
- https://bugzilla.suse.com/show_bug.cgi?id=1260879
- https://bugzilla.suse.com/show_bug.cgi?id=1262097
- https://bugzilla.suse.com/show_bug.cgi?id=1262145
- https://bugzilla.suse.com/show_bug.cgi?id=1262146
- https://bugzilla.suse.com/show_bug.cgi?id=1262147
- https://bugzilla.suse.com/show_bug.cgi?id=1262148
- https://bugzilla.suse.com/show_bug.cgi?id=1262149
- https://bugzilla.suse.com/show_bug.cgi?id=1262150
- https://bugzilla.suse.com/show_bug.cgi?id=1262152
- https://bugzilla.suse.com/show_bug.cgi?id=1262153
- https://bugzilla.suse.com/show_bug.cgi?id=1262154
- https://bugzilla.suse.com/show_bug.cgi?id=1262155
- https://bugzilla.suse.com/show_bug.cgi?id=1262156