{"schema_version":"1.7.2","id":"OESA-2026-1721","modified":"2026-03-27T14:03:39Z","published":"2026-03-27T14:03:39Z","upstream":["CVE-2026-30935","CVE-2026-32636","CVE-2026-33535","CVE-2026-33536"],"summary":"ImageMagick security update","details":"Use ImageMagick to create, edit, compose, or convert bitmap images. It can read and write images in a variety of formats (over 200) including PNG, JPEG, GIF, HEIC, TIFF, DPX, EXR, WebP, Postscript, PDF, and SVG. Use ImageMagick to resize, flip, mirror, rotate, distort, shear and transform images, adjust image colors, apply various special effects, or draw text, lines, polygons, ellipses and Bézier curves.\r\n\r\nSecurity Fix(es):\n\nImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, BilateralBlurImage contains a heap buffer over-read caused by an incorrect conversion. When processing a crafted image with the -bilateral-blur operation an out of bounds read can occur. This vulnerability is fixed in 7.1.2-16.(CVE-2026-30935)\n\nImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-17 and 6.9.13-42, the NewXMLTree method contains a bug that could result in a crash due to an out of write bounds of a single zero byte. Versions 7.1.2-17 and 6.9.13-42 fix the issue.(CVE-2026-32636)\n\nImageMagick contains an out-of-bounds write vulnerability in X11 display interaction that could allow an attacker to cause memory corruption or execute arbitrary code.(CVE-2026-33535)\n\nImageMagick has a stack buffer overflow vulnerability in the InterpretImageFilename function that causes WRITE operation out-of-bounds due to buffer overflow. Attackers can exploit this vulnerability to execute arbitrary code or cause service crashes.(CVE-2026-33536)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"ImageMagick","purl":"pkg:rpm/openEuler/ImageMagick&distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.1.2.18-1.oe2203sp4"}]}],"ecosystem_specific":{"aarch64":["ImageMagick-7.1.2.18-1.oe2203sp4.aarch64.rpm","ImageMagick-c++-7.1.2.18-1.oe2203sp4.aarch64.rpm","ImageMagick-c++-devel-7.1.2.18-1.oe2203sp4.aarch64.rpm","ImageMagick-debuginfo-7.1.2.18-1.oe2203sp4.aarch64.rpm","ImageMagick-debugsource-7.1.2.18-1.oe2203sp4.aarch64.rpm","ImageMagick-devel-7.1.2.18-1.oe2203sp4.aarch64.rpm","ImageMagick-perl-7.1.2.18-1.oe2203sp4.aarch64.rpm"],"noarch":["ImageMagick-help-7.1.2.18-1.oe2203sp4.noarch.rpm"],"src":["ImageMagick-7.1.2.18-1.oe2203sp4.src.rpm"],"x86_64":["ImageMagick-7.1.2.18-1.oe2203sp4.x86_64.rpm","ImageMagick-c++-7.1.2.18-1.oe2203sp4.x86_64.rpm","ImageMagick-c++-devel-7.1.2.18-1.oe2203sp4.x86_64.rpm","ImageMagick-debuginfo-7.1.2.18-1.oe2203sp4.x86_64.rpm","ImageMagick-debugsource-7.1.2.18-1.oe2203sp4.x86_64.rpm","ImageMagick-devel-7.1.2.18-1.oe2203sp4.x86_64.rpm","ImageMagick-perl-7.1.2.18-1.oe2203sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1721"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-30935"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32636"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33535"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33536"}],"database_specific":{"severity":"High"}}
