Debian dsa-6158:imagemagick - 安全性更新

critical Nessus Plugin ID 301556

概要

遠端 Debian 主機上缺少一個或多個安全性更新。

說明

遠端 Debian 13 主機上安裝的多個套件受到 dsa-6158 公告中提及的多個弱點影響。

- ------------------------------------------------------------------------- Debian 安全公告 DSA-6158-1 [email protected] https://www.debian.org/security/Moritz Muehlenhoff 2026 年 3 月 9 日https://www.debian.org/security/faq
- -------------------------------------------------------------------------

套件:imagemagick CVE ID:CVE-2026-24481 CVE-2026-24484 CVE-2026-24485 CVE-2026-25576 CVE-2026-25637 CVE-2026-25638 CVE-2026-25794 CVE-2026-25795 CVE-2026-25796 CVE-2026-25797 CVE-2026-25798 CVE-2026-25799 CVE-2026-25897 CVE-2026-25898 CVE-2026-25965 CVE-2026-25966 CVE-2026-25967 CVE-2026-25968 CVE-2026-25969 CVE-2026-25970 CVE-2026-25971 CVE-2026-25982 CVE-2026-25983 CVE-2026-25985 CVE-2026-25986 CVE-2026-25987 CVE-2026-25988 CVE-2026-25989 CVE-2026-26066 CVE-2026-26283 CVE-2026-26284 CVE-2026-26983 CVE-2026-27798 CVE-2026-27799

在用於編輯及操控數位影像的軟體套件 imagemagick 中發現了多項安全弱點,可能導致資訊外洩、繞過安全原則、拒絕服務或執行任意程式碼。

針對穩定的發行版本 (trixie),這些問題已在 8:7.1.1.43+dfsg1-1+deb13u6 版本中修復。

建議您升級 imagemagick 套件。

如需有關 imagemagick 安全性狀態的詳細資訊,請參閱其安全追蹤頁面:
https://security-tracker.debian.org/tracker/imagemagick

有關 Debian 安全公告、如何將這些更新套用至您的系統以及常見問題的詳細資訊,請參閱 : https://www.debian.org/security/

郵寄清單:[email protected]

Tenable 已直接從 Debian 安全公告擷取前置描述區塊。

請注意,Nessus 並未測試這些問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

升級 imagemagick 套件。

另請參閱

http://www.nessus.org/u?9affa1bb

https://security-tracker.debian.org/tracker/CVE-2026-24481

https://security-tracker.debian.org/tracker/CVE-2026-24484

https://security-tracker.debian.org/tracker/CVE-2026-24485

https://security-tracker.debian.org/tracker/CVE-2026-25576

https://security-tracker.debian.org/tracker/CVE-2026-25637

https://security-tracker.debian.org/tracker/CVE-2026-25638

https://security-tracker.debian.org/tracker/CVE-2026-25794

https://security-tracker.debian.org/tracker/CVE-2026-25795

https://security-tracker.debian.org/tracker/CVE-2026-25796

https://security-tracker.debian.org/tracker/CVE-2026-25797

https://security-tracker.debian.org/tracker/CVE-2026-25798

https://security-tracker.debian.org/tracker/CVE-2026-25799

https://security-tracker.debian.org/tracker/CVE-2026-26284

https://security-tracker.debian.org/tracker/CVE-2026-26983

https://security-tracker.debian.org/tracker/CVE-2026-27798

https://security-tracker.debian.org/tracker/CVE-2026-27799

https://packages.debian.org/source/trixie/imagemagick

https://security-tracker.debian.org/tracker/CVE-2026-25897

https://security-tracker.debian.org/tracker/CVE-2026-25898

https://security-tracker.debian.org/tracker/CVE-2026-25965

https://security-tracker.debian.org/tracker/CVE-2026-25966

https://security-tracker.debian.org/tracker/CVE-2026-25967

https://security-tracker.debian.org/tracker/CVE-2026-25968

https://security-tracker.debian.org/tracker/CVE-2026-25969

https://security-tracker.debian.org/tracker/CVE-2026-25970

https://security-tracker.debian.org/tracker/CVE-2026-25971

https://security-tracker.debian.org/tracker/CVE-2026-25982

https://security-tracker.debian.org/tracker/CVE-2026-25983

https://security-tracker.debian.org/tracker/CVE-2026-25985

https://security-tracker.debian.org/tracker/CVE-2026-25986

https://security-tracker.debian.org/tracker/CVE-2026-25987

https://security-tracker.debian.org/tracker/CVE-2026-25988

https://security-tracker.debian.org/tracker/CVE-2026-25989

https://security-tracker.debian.org/tracker/CVE-2026-26066

https://security-tracker.debian.org/tracker/CVE-2026-26283

Plugin 詳細資訊

嚴重性: Critical

ID: 301556

檔案名稱: debian_DSA-6158.nasl

版本: 1.1

類型: local

代理程式: unix

已發布: 2026/3/9

已更新: 2026/3/9

支援的感應器: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

風險資訊

VPR

風險因素: Medium

分數: 6.7

CVSS v2

風險因素: Critical

基本分數: 10

時間性分數: 7.4

媒介: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS 評分資料來源: CVE-2026-25986

CVSS v3

風險因素: Critical

基本分數: 9.8

時間性分數: 8.5

媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:U/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:debian:debian_linux:libmagickwand-7.q16-10, p-cpe:/a:debian:debian_linux:libmagick%2b%2b-7-headers, p-cpe:/a:debian:debian_linux:libmagickcore-7.q16hdri-10-extra, p-cpe:/a:debian:debian_linux:libmagickcore-7.q16hdri-dev, p-cpe:/a:debian:debian_linux:libimage-magick-q16-perl, p-cpe:/a:debian:debian_linux:libmagickcore-7.q16hdri-10, p-cpe:/a:debian:debian_linux:libmagickwand-7.q16-dev, p-cpe:/a:debian:debian_linux:libmagickcore-7-arch-config, p-cpe:/a:debian:debian_linux:libmagickwand-7-headers, p-cpe:/a:debian:debian_linux:libmagick%2b%2b-7.q16-5, p-cpe:/a:debian:debian_linux:libmagick%2b%2b-dev, p-cpe:/a:debian:debian_linux:imagemagick-7-doc, p-cpe:/a:debian:debian_linux:imagemagick-7.q16, p-cpe:/a:debian:debian_linux:libmagickcore-dev, p-cpe:/a:debian:debian_linux:libmagickwand-7.q16hdri-dev, p-cpe:/a:debian:debian_linux:libmagickwand-dev, cpe:/o:debian:debian_linux:13.0, p-cpe:/a:debian:debian_linux:libimage-magick-q16hdri-perl, p-cpe:/a:debian:debian_linux:libmagickwand-7.q16hdri-10, p-cpe:/a:debian:debian_linux:libmagickcore-7.q16-10, p-cpe:/a:debian:debian_linux:imagemagick, p-cpe:/a:debian:debian_linux:libmagick%2b%2b-7.q16hdri-5, p-cpe:/a:debian:debian_linux:libmagickcore-7.q16-10-extra, p-cpe:/a:debian:debian_linux:libmagick%2b%2b-7.q16-dev, p-cpe:/a:debian:debian_linux:libimage-magick-perl, p-cpe:/a:debian:debian_linux:libmagickcore-7.q16-dev, p-cpe:/a:debian:debian_linux:libmagick%2b%2b-7.q16hdri-dev, p-cpe:/a:debian:debian_linux:libmagickcore-7-headers, p-cpe:/a:debian:debian_linux:imagemagick-7-common, p-cpe:/a:debian:debian_linux:perlmagick, p-cpe:/a:debian:debian_linux:imagemagick-7.q16hdri

必要的 KB 項目: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

可輕鬆利用: No known exploits are available

修補程式發佈日期: 2026/3/9

弱點發布日期: 2026/2/24

參考資訊

CVE: CVE-2026-24481, CVE-2026-24484, CVE-2026-24485, CVE-2026-25576, CVE-2026-25637, CVE-2026-25638, CVE-2026-25794, CVE-2026-25795, CVE-2026-25796, CVE-2026-25797, CVE-2026-25798, CVE-2026-25799, CVE-2026-25897, CVE-2026-25898, CVE-2026-25965, CVE-2026-25966, CVE-2026-25967, CVE-2026-25968, CVE-2026-25969, CVE-2026-25970, CVE-2026-25971, CVE-2026-25982, CVE-2026-25983, CVE-2026-25985, CVE-2026-25986, CVE-2026-25987, CVE-2026-25988, CVE-2026-25989, CVE-2026-26066, CVE-2026-26283, CVE-2026-26284, CVE-2026-26983, CVE-2026-27798, CVE-2026-27799

IAVB: 2026-B-0051