Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
ImageMagick Security Update Fixes Multiple Critical Issues
Summary
ImageMagick has released a security update to fix several critical vulnerabilities that could allow attackers to disclose sensitive information, crash the system, or execute malicious code. Affected users should update ImageMagick to the latest version to prevent potential security risks. This update is recommended for all users who rely on ImageMagick for image processing and manipulation.
What to do
- Update imagemagick to version 7.1.1.21-150600.3.42.2.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | imagemagick | <= 7.1.1.21-150600.3.42.2 | 7.1.1.21-150600.3.42.2 |
| – | imagemagick | <= 7.1.1.21-150600.3.42.2 | 7.1.1.21-150600.3.42.2 |
| – | imagemagick | <= 7.1.1.21-150600.3.42.2 | 7.1.1.21-150600.3.42.2 |
Original title
Security update for ImageMagick
Original description
This update for ImageMagick fixes the following issues:
- CVE-2026-24481: Possible Heap Information Disclosure in PSD ZIP Decompression (bsc#1258743).
- CVE-2026-24484: denial of service vulnerability via multi-layer nested MVG to SVG conversion (bsc#1258790).
- CVE-2026-24485: denial of service via malformed PCD file processing (bsc#1258791).
- CVE-2026-25576: Out of bounds read in multiple coders that read raw pixel data (bsc#1258748).
- CVE-2026-25637: Denial of Service via crafted image due to memory leak (bsc#1258759).
- CVE-2026-25638: Denial of Service due to memory leak in image processing (bsc#1258793).
- CVE-2026-25795: Denial of Service due to NULL pointer dereference during temporary file creation failure
(bsc#1258792).
- CVE-2026-25796: Memory leak of watermark Image object in ReadSTEGANOImage on multiple error/early-return paths
(bsc#1258757).
- CVE-2026-25797: Code injection in various encoders (bsc#1258770).
- CVE-2026-25798: NULL Pointer Dereference in ClonePixelCacheRepository via crafted image (bsc#1258787).
- CVE-2026-25799: Division-by-Zero in YUV sampling factor validation leads to crash (bsc#1258786).
- CVE-2026-25897: Out-of-bounds heap write via integer overflow in sun decoder (bsc#1258799).
- CVE-2026-25898: Information disclosure or denial of service via crafted image with invalid pixel index (bsc#1258807).
- CVE-2026-25965: Policy bypass through path traversal allows reading restricted content despite secured policy
(bsc#1258785).
- CVE-2026-25966: Security Policy Bypass through config/policy-secure.xml via 'fd handler' leads to stdin/stdout access
(bsc#1258780).
- CVE-2026-25967: Stack buffer overflow in FTXT reader via oversized integer field (bsc#1258779).
- CVE-2026-25968: MSL attribute stack buffer overflow leads to out of bounds write (bsc#1258776).
- CVE-2026-25969: Memory Leak in coders/ashlar.c (bsc#1258775).
- CVE-2026-25970: Memory corruption and denial of service via signed integer overflow in SIXEL decoder (bsc#1258802).
- CVE-2026-25971: MSL: Stack overflow in ProcessMSLScript (bsc#1258774).
- CVE-2026-25983: Denial of service via crafted MSL script (bsc#1258805).
- CVE-2026-25985: Memory allocation with excessive without limits in the internal SVG decoder (bsc#1258812).
- CVE-2026-25986: Denial of Service via malicious YUV image processing (bsc#1258818).
- CVE-2026-25987: Memory disclosure and denial of service via crafted MAP files (bsc#1258821).
- CVE-2026-25988: Denial of Service due to memory leak in image processing (bsc#1258810).
- CVE-2026-25989: Integer overflow or wraparound and incorrect conversion between numeric types in the internal SVG
decoder (bsc#1258771).
- CVE-2026-26066: Infinite loop when writing IPTCTEXT leads to denial of service via crafted profile (bsc#1258769).
- CVE-2026-26284: Heap overflow in pcd decoder leads to out of bounds read (bsc#1258765).
- CVE-2026-26983: Invalid MSL <map> can result in a use after free (bsc#1258763).
- CVE-2026-27798: Heap Buffer Over-read in WaveletDenoise when processing small images (bsc#1259018).
- CVE-2026-27799: ImageMagick has a heap Buffer Over-read in its DJVU image format handler (bsc#1259017).
- CVE-2026-24481: Possible Heap Information Disclosure in PSD ZIP Decompression (bsc#1258743).
- CVE-2026-24484: denial of service vulnerability via multi-layer nested MVG to SVG conversion (bsc#1258790).
- CVE-2026-24485: denial of service via malformed PCD file processing (bsc#1258791).
- CVE-2026-25576: Out of bounds read in multiple coders that read raw pixel data (bsc#1258748).
- CVE-2026-25637: Denial of Service via crafted image due to memory leak (bsc#1258759).
- CVE-2026-25638: Denial of Service due to memory leak in image processing (bsc#1258793).
- CVE-2026-25795: Denial of Service due to NULL pointer dereference during temporary file creation failure
(bsc#1258792).
- CVE-2026-25796: Memory leak of watermark Image object in ReadSTEGANOImage on multiple error/early-return paths
(bsc#1258757).
- CVE-2026-25797: Code injection in various encoders (bsc#1258770).
- CVE-2026-25798: NULL Pointer Dereference in ClonePixelCacheRepository via crafted image (bsc#1258787).
- CVE-2026-25799: Division-by-Zero in YUV sampling factor validation leads to crash (bsc#1258786).
- CVE-2026-25897: Out-of-bounds heap write via integer overflow in sun decoder (bsc#1258799).
- CVE-2026-25898: Information disclosure or denial of service via crafted image with invalid pixel index (bsc#1258807).
- CVE-2026-25965: Policy bypass through path traversal allows reading restricted content despite secured policy
(bsc#1258785).
- CVE-2026-25966: Security Policy Bypass through config/policy-secure.xml via 'fd handler' leads to stdin/stdout access
(bsc#1258780).
- CVE-2026-25967: Stack buffer overflow in FTXT reader via oversized integer field (bsc#1258779).
- CVE-2026-25968: MSL attribute stack buffer overflow leads to out of bounds write (bsc#1258776).
- CVE-2026-25969: Memory Leak in coders/ashlar.c (bsc#1258775).
- CVE-2026-25970: Memory corruption and denial of service via signed integer overflow in SIXEL decoder (bsc#1258802).
- CVE-2026-25971: MSL: Stack overflow in ProcessMSLScript (bsc#1258774).
- CVE-2026-25983: Denial of service via crafted MSL script (bsc#1258805).
- CVE-2026-25985: Memory allocation with excessive without limits in the internal SVG decoder (bsc#1258812).
- CVE-2026-25986: Denial of Service via malicious YUV image processing (bsc#1258818).
- CVE-2026-25987: Memory disclosure and denial of service via crafted MAP files (bsc#1258821).
- CVE-2026-25988: Denial of Service due to memory leak in image processing (bsc#1258810).
- CVE-2026-25989: Integer overflow or wraparound and incorrect conversion between numeric types in the internal SVG
decoder (bsc#1258771).
- CVE-2026-26066: Infinite loop when writing IPTCTEXT leads to denial of service via crafted profile (bsc#1258769).
- CVE-2026-26284: Heap overflow in pcd decoder leads to out of bounds read (bsc#1258765).
- CVE-2026-26983: Invalid MSL <map> can result in a use after free (bsc#1258763).
- CVE-2026-27798: Heap Buffer Over-read in WaveletDenoise when processing small images (bsc#1259018).
- CVE-2026-27799: ImageMagick has a heap Buffer Over-read in its DJVU image format handler (bsc#1259017).
- https://www.suse.com/support/update/announcement/2026/suse-su-20260852-1/ Vendor Advisory
- https://bugzilla.suse.com/1258743 Third Party Advisory
- https://bugzilla.suse.com/1258748 Third Party Advisory
- https://bugzilla.suse.com/1258757 Third Party Advisory
- https://bugzilla.suse.com/1258759 Third Party Advisory
- https://bugzilla.suse.com/1258763 Third Party Advisory
- https://bugzilla.suse.com/1258765 Third Party Advisory
- https://bugzilla.suse.com/1258769 Third Party Advisory
- https://bugzilla.suse.com/1258770 Third Party Advisory
- https://bugzilla.suse.com/1258771 Third Party Advisory
- https://bugzilla.suse.com/1258774 Third Party Advisory
- https://bugzilla.suse.com/1258775 Third Party Advisory
- https://bugzilla.suse.com/1258776 Third Party Advisory
- https://bugzilla.suse.com/1258779 Third Party Advisory
- https://bugzilla.suse.com/1258780 Third Party Advisory
- https://bugzilla.suse.com/1258785 Third Party Advisory
- https://bugzilla.suse.com/1258786 Third Party Advisory
- https://bugzilla.suse.com/1258787 Third Party Advisory
- https://bugzilla.suse.com/1258790 Third Party Advisory
- https://bugzilla.suse.com/1258791 Third Party Advisory
- https://bugzilla.suse.com/1258792 Third Party Advisory
- https://bugzilla.suse.com/1258793 Third Party Advisory
- https://bugzilla.suse.com/1258799 Third Party Advisory
- https://bugzilla.suse.com/1258802 Third Party Advisory
- https://bugzilla.suse.com/1258805 Third Party Advisory
- https://bugzilla.suse.com/1258807 Third Party Advisory
- https://bugzilla.suse.com/1258810 Third Party Advisory
- https://bugzilla.suse.com/1258812 Third Party Advisory
- https://bugzilla.suse.com/1258818 Third Party Advisory
- https://bugzilla.suse.com/1258821 Third Party Advisory
- https://bugzilla.suse.com/1259017 Third Party Advisory
- https://bugzilla.suse.com/1259018 Third Party Advisory
- https://www.suse.com/security/cve/CVE-2026-24481 URL
- https://www.suse.com/security/cve/CVE-2026-24484 URL
- https://www.suse.com/security/cve/CVE-2026-24485 URL
- https://www.suse.com/security/cve/CVE-2026-25576 URL
- https://www.suse.com/security/cve/CVE-2026-25637 URL
- https://www.suse.com/security/cve/CVE-2026-25638 URL
- https://www.suse.com/security/cve/CVE-2026-25795 URL
- https://www.suse.com/security/cve/CVE-2026-25796 URL
- https://www.suse.com/security/cve/CVE-2026-25797 URL
- https://www.suse.com/security/cve/CVE-2026-25798 URL
- https://www.suse.com/security/cve/CVE-2026-25799 URL
- https://www.suse.com/security/cve/CVE-2026-25897 URL
- https://www.suse.com/security/cve/CVE-2026-25898 URL
- https://www.suse.com/security/cve/CVE-2026-25965 URL
- https://www.suse.com/security/cve/CVE-2026-25966 URL
- https://www.suse.com/security/cve/CVE-2026-25967 URL
- https://www.suse.com/security/cve/CVE-2026-25968 URL
- https://www.suse.com/security/cve/CVE-2026-25969 URL
- https://www.suse.com/security/cve/CVE-2026-25970 URL
- https://www.suse.com/security/cve/CVE-2026-25971 URL
- https://www.suse.com/security/cve/CVE-2026-25983 URL
- https://www.suse.com/security/cve/CVE-2026-25985 URL
- https://www.suse.com/security/cve/CVE-2026-25986 URL
- https://www.suse.com/security/cve/CVE-2026-25987 URL
- https://www.suse.com/security/cve/CVE-2026-25988 URL
- https://www.suse.com/security/cve/CVE-2026-25989 URL
- https://www.suse.com/security/cve/CVE-2026-26066 URL
- https://www.suse.com/security/cve/CVE-2026-26284 URL
- https://www.suse.com/security/cve/CVE-2026-26983 URL
- https://www.suse.com/security/cve/CVE-2026-27798 URL
- https://www.suse.com/security/cve/CVE-2026-27799 URL
Published: 9 Mar 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026