Release date:
2026-04-24 15:30:14 UTC
Description:
- CVE-2026-33900: fix integer truncation in viff encoder leading to
heap out-of-bounds write on 32-bit builds
- CVE-2026-33905: fix out-of-bounds read in -sample operation via
sample:offset define
- CVE-2026-34238: fix integer overflow in despeckle operation causing
heap buffer overflow on 32-bit builds
- CVE-2026-40310: fix heap out-of-bounds write in JP2 encoder on
invalid sampling index
- CVE-2026-40311: fix heap use-after-free reading and printing values
from an invalid XMP profile
Updated packages:
-
ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els12.i686.rpm
sha:88a8b963463e75c90fa7a0d51fc4fb9b6a520a250a61e399e76d4a26a2e9be83
-
ImageMagick-6.9.10.68-7.0.3.el7_9.tuxcare.els12.x86_64.rpm
sha:d29df0aef9463eafcf5e6fadfc6e56d206ce79e1b883b4211e5d570f56011164
-
ImageMagick-c++-6.9.10.68-7.0.3.el7_9.tuxcare.els12.i686.rpm
sha:fc8d1025f749683f86ea27ab5e632daab42cde886fea3d4b24af2b05a677f68f
-
ImageMagick-c++-6.9.10.68-7.0.3.el7_9.tuxcare.els12.x86_64.rpm
sha:bab797cca68c7b89f82ff5b2e8a8363c0eea6b1105c797ae18912711cf6b3346
-
ImageMagick-c++-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els12.i686.rpm
sha:258cff71e1daf4d6589c5db57eba89d273cdcc8e82b38334ca16e5634788f7b6
-
ImageMagick-c++-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els12.x86_64.rpm
sha:c34dea605cc08dc9b59b47ad2fff913942709191b46427878943532fc34b9d04
-
ImageMagick-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els12.i686.rpm
sha:76c147a556af0832a65a24076ffa50cec4c3225112347c9a0fe90b64221bd83a
-
ImageMagick-devel-6.9.10.68-7.0.3.el7_9.tuxcare.els12.x86_64.rpm
sha:2468d878c2d7d2a2c39357b745dc1cd735d8cec2a12bf9ee957b1eb0e1add609
-
ImageMagick-doc-6.9.10.68-7.0.3.el7_9.tuxcare.els12.x86_64.rpm
sha:44a96e1c1a8c5e7dc490642ae2f17e4998d8de51b5f6fc149b49d5bfa0b58531
-
ImageMagick-perl-6.9.10.68-7.0.3.el7_9.tuxcare.els12.x86_64.rpm
sha:c85b4eee454d93adf1e976724e89d613abb1e7804557c727ae8b3166236f97a0
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.