<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ImageMagick</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:0025-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-01-05T11:24:25Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-01-05T11:24:25Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-01-05T11:24:25Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ImageMagick</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for ImageMagick fixes the following issues:

- security update (xcf.c):
  * CVE-2017-14343: Memory leak vulnerability in ReadXCFImage could lead to denial of service via a crafted file.
    CVE-2017-12691: The ReadOneLayer function in coders/xcf.c allows remote attackers to cause a denial of service 
    (memory consumption) via a crafted file.
    [bsc#1058422]

- security update (pnm.c):
  * CVE-2017-14042: A memory allocation failure was discovered in the ReadPNMImage function in coders/pnm.c and 
    could lead to remote denial of service [bsc#1056550]

- security update (psd.c):
  * CVE-2017-15281: ReadPSDImage allows remote attackers to cause a denial of service (application crash) or 
    possibly have unspecified other impact via a crafted file [bsc#1063049]
  * CVE-2017-13061: A length-validation vulnerability was found in the function ReadPSDLayersInternal in coders/psd.c, 
    which allows attackers to cause a denial of service (ReadPSDImage memory exhaustion) via a crafted file. [bsc#1055063]
  * CVE-2017-12563: A Memory exhaustion vulnerability was found in the function ReadPSDImage in coders/psd.c, 
    which allows attackers to cause a denial of service. [bsc#1052460]
  * CVE-2017-14174: Due to a lack of an EOF check (End of File) in ReadPSDLayersInternal could cause huge CPU consumption, 
    when a crafted PSD file, which claims a large 'length' field in the header but does not contain sufficient backing data, 
    is provided, the loop over \'length\' would consume huge CPU resources, since there is no EOF check inside the loop.[bsc#1057723]

- security update (meta.c):
  * CVE-2017-13062: Amemory leak vulnerability was found in the function formatIPTC in coders/meta.c, 
    which allows attackers to cause a denial of service (WriteMETAImage memory consumption) via a crafted file [bsc#1055053]

- security update (gif.c):
  * CVE-2017-15277: ReadGIFImage in coders/gif.c leaves the palette uninitialized when processing a GIF file that has neither 
    a global nor local palette. If the affected product is used as a library loaded into a process that operates on interesting 
    data, this data sometimes can be leaked via the uninitialized palette.[bsc#1063050]

This update was imported from the SUSE:SLE-12:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:0025-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-6.8.8.1-43.1">
      <FullProductName ProductID="ImageMagick-6.8.8.1-43.1">ImageMagick-6.8.8.1-43.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-devel-6.8.8.1-43.1">
      <FullProductName ProductID="ImageMagick-devel-6.8.8.1-43.1">ImageMagick-devel-6.8.8.1-43.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-devel-32bit-6.8.8.1-43.1">
      <FullProductName ProductID="ImageMagick-devel-32bit-6.8.8.1-43.1">ImageMagick-devel-32bit-6.8.8.1-43.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-doc-6.8.8.1-43.1">
      <FullProductName ProductID="ImageMagick-doc-6.8.8.1-43.1">ImageMagick-doc-6.8.8.1-43.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-extra-6.8.8.1-43.1">
      <FullProductName ProductID="ImageMagick-extra-6.8.8.1-43.1">ImageMagick-extra-6.8.8.1-43.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-6_Q16-3-6.8.8.1-43.1">
      <FullProductName ProductID="libMagick++-6_Q16-3-6.8.8.1-43.1">libMagick++-6_Q16-3-6.8.8.1-43.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-6_Q16-3-32bit-6.8.8.1-43.1">
      <FullProductName ProductID="libMagick++-6_Q16-3-32bit-6.8.8.1-43.1">libMagick++-6_Q16-3-32bit-6.8.8.1-43.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-devel-6.8.8.1-43.1">
      <FullProductName ProductID="libMagick++-devel-6.8.8.1-43.1">libMagick++-devel-6.8.8.1-43.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-devel-32bit-6.8.8.1-43.1">
      <FullProductName ProductID="libMagick++-devel-32bit-6.8.8.1-43.1">libMagick++-devel-32bit-6.8.8.1-43.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore-6_Q16-1-6.8.8.1-43.1">
      <FullProductName ProductID="libMagickCore-6_Q16-1-6.8.8.1-43.1">libMagickCore-6_Q16-1-6.8.8.1-43.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1">
      <FullProductName ProductID="libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1">libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickWand-6_Q16-1-6.8.8.1-43.1">
      <FullProductName ProductID="libMagickWand-6_Q16-1-6.8.8.1-43.1">libMagickWand-6_Q16-1-6.8.8.1-43.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1">
      <FullProductName ProductID="libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1">libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="perl-PerlMagick-6.8.8.1-43.1">
      <FullProductName ProductID="perl-PerlMagick-6.8.8.1-43.1">perl-PerlMagick-6.8.8.1-43.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ImageMagick-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:ImageMagick-6.8.8.1-43.1">ImageMagick-6.8.8.1-43.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-43.1">ImageMagick-devel-6.8.8.1-43.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-32bit-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-43.1">ImageMagick-devel-32bit-6.8.8.1-43.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-doc-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-43.1">ImageMagick-doc-6.8.8.1-43.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-extra-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-43.1">ImageMagick-extra-6.8.8.1-43.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-6_Q16-3-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-43.1">libMagick++-6_Q16-3-6.8.8.1-43.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-6_Q16-3-32bit-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-43.1">libMagick++-6_Q16-3-32bit-6.8.8.1-43.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-43.1">libMagick++-devel-6.8.8.1-43.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-32bit-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-43.1">libMagick++-devel-32bit-6.8.8.1-43.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore-6_Q16-1-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-43.1">libMagickCore-6_Q16-1-6.8.8.1-43.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1">libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand-6_Q16-1-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-43.1">libMagickWand-6_Q16-1-6.8.8.1-43.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1">libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="perl-PerlMagick-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-43.1">perl-PerlMagick-6.8.8.1-43.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ImageMagick-6.8.8.1-43.1">ImageMagick-6.8.8.1-43.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-43.1">ImageMagick-devel-6.8.8.1-43.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-32bit-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-43.1">ImageMagick-devel-32bit-6.8.8.1-43.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-doc-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-43.1">ImageMagick-doc-6.8.8.1-43.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-extra-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-43.1">ImageMagick-extra-6.8.8.1-43.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-6_Q16-3-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-43.1">libMagick++-6_Q16-3-6.8.8.1-43.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-6_Q16-3-32bit-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-43.1">libMagick++-6_Q16-3-32bit-6.8.8.1-43.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-43.1">libMagick++-devel-6.8.8.1-43.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-32bit-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-43.1">libMagick++-devel-32bit-6.8.8.1-43.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore-6_Q16-1-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-43.1">libMagickCore-6_Q16-1-6.8.8.1-43.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1">libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand-6_Q16-1-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-43.1">libMagickWand-6_Q16-1-6.8.8.1-43.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1">libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="perl-PerlMagick-6.8.8.1-43.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-43.1">perl-PerlMagick-6.8.8.1-43.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.6-2, a memory exhaustion vulnerability was found in the function ReadPSDImage in coders/psd.c, which allows attackers to cause a denial of service.</Note>
    </Notes>
    <CVE>CVE-2017-12563</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-43.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12563.html</URL>
        <Description>CVE-2017-12563</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052460</URL>
        <Description>SUSE Bug 1052460</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1072901</URL>
        <Description>SUSE Bug 1072901</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadOneLayer function in coders/xcf.c in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (memory consumption) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-12691</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-43.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12691.html</URL>
        <Description>CVE-2017-12691</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053955</URL>
        <Description>SUSE Bug 1053955</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1058422</URL>
        <Description>SUSE Bug 1058422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082363</URL>
        <Description>SUSE Bug 1082363</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.6-5, a length-validation vulnerability was found in the function ReadPSDLayersInternal in coders/psd.c, which allows attackers to cause a denial of service (ReadPSDImage memory exhaustion) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-13061</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-43.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13061.html</URL>
        <Description>CVE-2017-13061</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1055063</URL>
        <Description>SUSE Bug 1055063</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1072901</URL>
        <Description>SUSE Bug 1072901</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.6-6, a memory leak vulnerability was found in the function formatIPTC in coders/meta.c, which allows attackers to cause a denial of service (WriteMETAImage memory consumption) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-13062</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-43.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13062.html</URL>
        <Description>CVE-2017-13062</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1055053</URL>
        <Description>SUSE Bug 1055053</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1055055</URL>
        <Description>SUSE Bug 1055055</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory allocation failure was discovered in the ReadPNMImage function in coders/pnm.c in GraphicsMagick 1.3.26. The vulnerability causes a big memory allocation, which may lead to remote denial of service in the MagickRealloc function in magick/memory.c.</Note>
    </Notes>
    <CVE>CVE-2017-14042</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-43.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14042.html</URL>
        <Description>CVE-2017-14042</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1054598</URL>
        <Description>SUSE Bug 1054598</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1054600</URL>
        <Description>SUSE Bug 1054600</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056550</URL>
        <Description>SUSE Bug 1056550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1059721</URL>
        <Description>SUSE Bug 1059721</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In coders/psd.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSDLayersInternal() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "length" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would consume huge CPU resources, since there is no EOF check inside the loop.</Note>
    </Notes>
    <CVE>CVE-2017-14174</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-43.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14174.html</URL>
        <Description>CVE-2017-14174</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057723</URL>
        <Description>SUSE Bug 1057723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1072901</URL>
        <Description>SUSE Bug 1072901</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.6-6 has a memory leak vulnerability in ReadXCFImage in coders/xcf.c via a crafted xcf image file.</Note>
    </Notes>
    <CVE>CVE-2017-14343</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-43.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14343.html</URL>
        <Description>CVE-2017-14343</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1058422</URL>
        <Description>SUSE Bug 1058422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082363</URL>
        <Description>SUSE Bug 1082363</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ReadGIFImage in coders/gif.c in ImageMagick 7.0.6-1 and GraphicsMagick 1.3.26 leaves the palette uninitialized when processing a GIF file that has neither a global nor local palette. If the affected product is used as a library loaded into a process that operates on interesting data, this data sometimes can be leaked via the uninitialized palette.</Note>
    </Notes>
    <CVE>CVE-2017-15277</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-43.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15277.html</URL>
        <Description>CVE-2017-15277</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1063050</URL>
        <Description>SUSE Bug 1063050</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ReadPSDImage in coders/psd.c in ImageMagick 7.0.7-6 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to "Conditional jump or move depends on uninitialised value(s)."</Note>
    </Notes>
    <CVE>CVE-2017-15281</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-43.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-43.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15281.html</URL>
        <Description>CVE-2017-15281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1063049</URL>
        <Description>SUSE Bug 1063049</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1072901</URL>
        <Description>SUSE Bug 1072901</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
