SUSE-SU-2026:0852-1

Source
https://www.suse.com/support/update/announcement/2026/suse-su-20260852-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:0852-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2026:0852-1
Upstream
Related
Published
2026-03-09T15:32:56Z
Modified
2026-03-10T12:45:06.531353Z
Summary
Security update for ImageMagick
Details

This update for ImageMagick fixes the following issues:

  • CVE-2026-24481: Possible Heap Information Disclosure in PSD ZIP Decompression (bsc#1258743).
  • CVE-2026-24484: denial of service vulnerability via multi-layer nested MVG to SVG conversion (bsc#1258790).
  • CVE-2026-24485: denial of service via malformed PCD file processing (bsc#1258791).
  • CVE-2026-25576: Out of bounds read in multiple coders that read raw pixel data (bsc#1258748).
  • CVE-2026-25637: Denial of Service via crafted image due to memory leak (bsc#1258759).
  • CVE-2026-25638: Denial of Service due to memory leak in image processing (bsc#1258793).
  • CVE-2026-25795: Denial of Service due to NULL pointer dereference during temporary file creation failure (bsc#1258792).
  • CVE-2026-25796: Memory leak of watermark Image object in ReadSTEGANOImage on multiple error/early-return paths (bsc#1258757).
  • CVE-2026-25797: Code injection in various encoders (bsc#1258770).
  • CVE-2026-25798: NULL Pointer Dereference in ClonePixelCacheRepository via crafted image (bsc#1258787).
  • CVE-2026-25799: Division-by-Zero in YUV sampling factor validation leads to crash (bsc#1258786).
  • CVE-2026-25897: Out-of-bounds heap write via integer overflow in sun decoder (bsc#1258799).
  • CVE-2026-25898: Information disclosure or denial of service via crafted image with invalid pixel index (bsc#1258807).
  • CVE-2026-25965: Policy bypass through path traversal allows reading restricted content despite secured policy (bsc#1258785).
  • CVE-2026-25966: Security Policy Bypass through config/policy-secure.xml via 'fd handler' leads to stdin/stdout access (bsc#1258780).
  • CVE-2026-25967: Stack buffer overflow in FTXT reader via oversized integer field (bsc#1258779).
  • CVE-2026-25968: MSL attribute stack buffer overflow leads to out of bounds write (bsc#1258776).
  • CVE-2026-25969: Memory Leak in coders/ashlar.c (bsc#1258775).
  • CVE-2026-25970: Memory corruption and denial of service via signed integer overflow in SIXEL decoder (bsc#1258802).
  • CVE-2026-25971: MSL: Stack overflow in ProcessMSLScript (bsc#1258774).
  • CVE-2026-25983: Denial of service via crafted MSL script (bsc#1258805).
  • CVE-2026-25985: Memory allocation with excessive without limits in the internal SVG decoder (bsc#1258812).
  • CVE-2026-25986: Denial of Service via malicious YUV image processing (bsc#1258818).
  • CVE-2026-25987: Memory disclosure and denial of service via crafted MAP files (bsc#1258821).
  • CVE-2026-25988: Denial of Service due to memory leak in image processing (bsc#1258810).
  • CVE-2026-25989: Integer overflow or wraparound and incorrect conversion between numeric types in the internal SVG decoder (bsc#1258771).
  • CVE-2026-26066: Infinite loop when writing IPTCTEXT leads to denial of service via crafted profile (bsc#1258769).
  • CVE-2026-26284: Heap overflow in pcd decoder leads to out of bounds read (bsc#1258765).
  • CVE-2026-26983: Invalid MSL <map> can result in a use after free (bsc#1258763).
  • CVE-2026-27798: Heap Buffer Over-read in WaveletDenoise when processing small images (bsc#1259018).
  • CVE-2026-27799: ImageMagick has a heap Buffer Over-read in its DJVU image format handler (bsc#1259017).
References

Affected packages

openSUSE:Leap 15.6
ImageMagick

Package

Name
ImageMagick
Purl
pkg:rpm/opensuse/ImageMagick&distro=openSUSE%20Leap%2015.6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.1.1.21-150600.3.42.2

Ecosystem specific

{
    "binaries": [
        {
            "ImageMagick-config-7-upstream-limited": "7.1.1.21-150600.3.42.2",
            "libMagickCore-7_Q16HDRI10": "7.1.1.21-150600.3.42.2",
            "ImageMagick-devel-32bit": "7.1.1.21-150600.3.42.2",
            "libMagick++-7_Q16HDRI5-32bit": "7.1.1.21-150600.3.42.2",
            "ImageMagick-config-7-upstream-open": "7.1.1.21-150600.3.42.2",
            "ImageMagick-config-7-SUSE": "7.1.1.21-150600.3.42.2",
            "ImageMagick-config-7-upstream-secure": "7.1.1.21-150600.3.42.2",
            "ImageMagick-config-7-upstream-websafe": "7.1.1.21-150600.3.42.2",
            "libMagickCore-7_Q16HDRI10-32bit": "7.1.1.21-150600.3.42.2",
            "perl-PerlMagick": "7.1.1.21-150600.3.42.2",
            "ImageMagick-doc": "7.1.1.21-150600.3.42.2",
            "ImageMagick-extra": "7.1.1.21-150600.3.42.2",
            "ImageMagick-devel": "7.1.1.21-150600.3.42.2",
            "libMagick++-7_Q16HDRI5": "7.1.1.21-150600.3.42.2",
            "libMagick++-devel-32bit": "7.1.1.21-150600.3.42.2",
            "libMagickWand-7_Q16HDRI10-32bit": "7.1.1.21-150600.3.42.2",
            "libMagick++-devel": "7.1.1.21-150600.3.42.2",
            "ImageMagick": "7.1.1.21-150600.3.42.2",
            "libMagickWand-7_Q16HDRI10": "7.1.1.21-150600.3.42.2"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:0852-1.json"
SUSE:Linux Enterprise Server 15 SP6-LTSS
ImageMagick

Package

Name
ImageMagick
Purl
pkg:rpm/suse/ImageMagick&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP6-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.1.1.21-150600.3.42.2

Ecosystem specific

{
    "binaries": [
        {
            "ImageMagick-config-7-upstream-limited": "7.1.1.21-150600.3.42.2",
            "libMagick++-devel": "7.1.1.21-150600.3.42.2",
            "ImageMagick-config-7-upstream-websafe": "7.1.1.21-150600.3.42.2",
            "libMagickCore-7_Q16HDRI10": "7.1.1.21-150600.3.42.2",
            "perl-PerlMagick": "7.1.1.21-150600.3.42.2",
            "ImageMagick-config-7-upstream-secure": "7.1.1.21-150600.3.42.2",
            "ImageMagick-devel": "7.1.1.21-150600.3.42.2",
            "libMagick++-7_Q16HDRI5": "7.1.1.21-150600.3.42.2",
            "ImageMagick-config-7-upstream-open": "7.1.1.21-150600.3.42.2",
            "ImageMagick-config-7-SUSE": "7.1.1.21-150600.3.42.2",
            "ImageMagick": "7.1.1.21-150600.3.42.2",
            "libMagickWand-7_Q16HDRI10": "7.1.1.21-150600.3.42.2"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:0852-1.json"
SUSE:Linux Enterprise Server for SAP Applications 15 SP6
ImageMagick

Package

Name
ImageMagick
Purl
pkg:rpm/suse/ImageMagick&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.1.1.21-150600.3.42.2

Ecosystem specific

{
    "binaries": [
        {
            "ImageMagick-config-7-upstream-limited": "7.1.1.21-150600.3.42.2",
            "libMagick++-devel": "7.1.1.21-150600.3.42.2",
            "ImageMagick-config-7-upstream-websafe": "7.1.1.21-150600.3.42.2",
            "libMagickCore-7_Q16HDRI10": "7.1.1.21-150600.3.42.2",
            "perl-PerlMagick": "7.1.1.21-150600.3.42.2",
            "ImageMagick-config-7-upstream-secure": "7.1.1.21-150600.3.42.2",
            "ImageMagick-devel": "7.1.1.21-150600.3.42.2",
            "libMagick++-7_Q16HDRI5": "7.1.1.21-150600.3.42.2",
            "ImageMagick-config-7-upstream-open": "7.1.1.21-150600.3.42.2",
            "ImageMagick-config-7-SUSE": "7.1.1.21-150600.3.42.2",
            "ImageMagick": "7.1.1.21-150600.3.42.2",
            "libMagickWand-7_Q16HDRI10": "7.1.1.21-150600.3.42.2"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:0852-1.json"