SUSE SLES12 Security Update : ImageMagick (SUSE-SU-2026:0854-1)

critical Nessus Plugin ID 301805

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:0854-1 advisory.

- CVE-2026-24484: denial of service vulnerability via multi-layer nested MVG to SVG conversion (bsc#1258790).
- CVE-2026-24485: denial of service via malformed PCD file processing (bsc#1258791).
- CVE-2026-25576: Out of bounds read in multiple coders that read raw pixel data (bsc#1258748).
- CVE-2026-25795: Denial of Service due to NULL pointer dereference during temporary file creation failure (bsc#1258792).
- CVE-2026-25796: Memory leak of watermark Image object in ReadSTEGANOImage on multiple error/early-return paths (bsc#1258757).
- CVE-2026-25797: Code injection in various encoders (bsc#1258770).
- CVE-2026-25799: Division-by-Zero in YUV sampling factor validation leads to crash (bsc#1258786).
- CVE-2026-25966: Security Policy Bypass through config/policy-secure.xml via 'fd handler' leads to stdin/stdout access (bsc#1258780).
- CVE-2026-25983: Denial of service via crafted MSL script (bsc#1258805).
- CVE-2026-25987: Memory disclosure and denial of service via crafted MAP files (bsc#1258821).
- CVE-2026-25988: Denial of Service due to memory leak in image processing (bsc#1258810).
- CVE-2026-26066: Infinite loop when writing IPTCTEXT leads to denial of service via crafted profile (bsc#1258769).
- CVE-2026-26284: Heap overflow in pcd decoder leads to out of bounds read (bsc#1258765).
- CVE-2026-26983: Invalid MSL <map> can result in a use after free (bsc#1258763).
- CVE-2026-27799: ImageMagick has a heap Buffer Over-read in its DJVU image format handler (bsc#1259017).

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1258748

https://bugzilla.suse.com/1258757

https://bugzilla.suse.com/1258763

https://bugzilla.suse.com/1258765

https://bugzilla.suse.com/1258769

https://bugzilla.suse.com/1258770

https://bugzilla.suse.com/1258780

https://bugzilla.suse.com/1258786

https://bugzilla.suse.com/1258790

https://bugzilla.suse.com/1258791

https://bugzilla.suse.com/1258792

https://www.suse.com/security/cve/CVE-2026-25796

https://www.suse.com/security/cve/CVE-2026-25797

https://www.suse.com/security/cve/CVE-2026-25799

https://www.suse.com/security/cve/CVE-2026-25966

https://www.suse.com/security/cve/CVE-2026-25983

https://www.suse.com/security/cve/CVE-2026-25987

https://www.suse.com/security/cve/CVE-2026-25988

https://www.suse.com/security/cve/CVE-2026-26066

https://www.suse.com/security/cve/CVE-2026-26284

https://www.suse.com/security/cve/CVE-2026-26983

https://www.suse.com/security/cve/CVE-2026-27799

https://bugzilla.suse.com/1258805

https://bugzilla.suse.com/1258810

https://bugzilla.suse.com/1258821

https://bugzilla.suse.com/1259017

http://www.nessus.org/u?60a4ad42

https://www.suse.com/security/cve/CVE-2026-24484

https://www.suse.com/security/cve/CVE-2026-24485

https://www.suse.com/security/cve/CVE-2026-25576

https://www.suse.com/security/cve/CVE-2026-25795

Plugin Details

Severity: Critical

ID: 301805

File Name: suse_SU-2026-0854-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 3/11/2026

Updated: 3/11/2026

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2026-25983

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:imagemagick-config-6-upstream, cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:libmagickcore-6_q16-1, p-cpe:/a:novell:suse_linux:libmagickwand-6_q16-1, p-cpe:/a:novell:suse_linux:imagemagick-devel, p-cpe:/a:novell:suse_linux:libmagick%2b%2b-devel, p-cpe:/a:novell:suse_linux:imagemagick-config-6-suse

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 3/9/2026

Vulnerability Publication Date: 2/24/2026

Reference Information

CVE: CVE-2026-24484, CVE-2026-24485, CVE-2026-25576, CVE-2026-25795, CVE-2026-25796, CVE-2026-25797, CVE-2026-25799, CVE-2026-25966, CVE-2026-25983, CVE-2026-25987, CVE-2026-25988, CVE-2026-26066, CVE-2026-26284, CVE-2026-26983, CVE-2026-27799

SuSE: SUSE-SU-2026:0854-1