<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ImageMagick</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:1205-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-05-10T17:54:37Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-05-10T17:54:37Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-05-10T17:54:37Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ImageMagick</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for ImageMagick fixes the following issues:

- CVE-2017-14325: In ImageMagick, a memory leak vulnerability was found in
  the function PersistPixelCache in magick/cache.c, which allowed attackers
  to cause a denial of service (memory consumption in ReadMPCImage in
  coders/mpc.c) via a crafted file.  [bsc#1058635]
- CVE-2017-17887: In ImageMagick, a memory leak vulnerability was found
  in the function GetImagePixelCache in magick/cache.c, which allowed
  attackers to cause a denial of service via a crafted MNG image file that
  is processed by ReadOneMNGImage.  [bsc#1074117]
- CVE-2017-18250: A NULL pointer dereference vulnerability was found in the function 
  LogOpenCLBuildFailure in MagickCore/opencl.c, which could lead to a denial of service 
  via a crafted file. [bsc#1087039]
- CVE-2017-18251: A memory leak vulnerability was found in the function ReadPCDImage in coders/pcd.c, 
  which could lead to a denial of service via a crafted file. [bsc#1087037]
- CVE-2017-18252: The MogrifyImageList function in MagickWand/mogrify.c could allow 
  attackers to cause a denial of service via a crafted file. [bsc#1087033]
- CVE-2017-18254: A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, 
  which could lead to  denial of service via a crafted file. [bsc#1087027]
- CVE-2018-8960: The ReadTIFFImage function in coders/tiff.c in
  ImageMagick did not properly restrict memory allocation, leading to a
  heap-based buffer over-read.  [bsc#1086782]
- CVE-2018-9018: divide-by-zero in the ReadMNGImage function of coders/png.c. 
  Attackers could leverage this vulnerability to cause a crash and denial of service 
  via a crafted mng file. [bsc#1086773]
- CVE-2018-9135: heap-based buffer over-read in IsWEBPImageLossless in coders/webp.c 
  could lead to denial of service. [bsc#1087825]
- CVE-2018-10177: In ImageMagick, there was an infinite loop in the
  ReadOneMNGImage function of the coders/png.c file. Remote attackers
  could leverage this vulnerability to cause a denial of service via a
  crafted mng file.  [bsc#1089781]
- CVE-2017-10928: a heap-based buffer over-read in the GetNextToken function in token.c 
  could allow attackers to obtain sensitive information from process memory or possibly have 
  unspecified other impact via a crafted SVG document that is mishandled in the 
  GetUserSpaceCoordinateValue function in coders/svg.c. [bsc#1047356]


This update was imported from the SUSE:SLE-12:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:1205-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-6.8.8.1-61.2">
      <FullProductName ProductID="ImageMagick-6.8.8.1-61.2">ImageMagick-6.8.8.1-61.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-devel-6.8.8.1-61.2">
      <FullProductName ProductID="ImageMagick-devel-6.8.8.1-61.2">ImageMagick-devel-6.8.8.1-61.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-devel-32bit-6.8.8.1-61.2">
      <FullProductName ProductID="ImageMagick-devel-32bit-6.8.8.1-61.2">ImageMagick-devel-32bit-6.8.8.1-61.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-doc-6.8.8.1-61.2">
      <FullProductName ProductID="ImageMagick-doc-6.8.8.1-61.2">ImageMagick-doc-6.8.8.1-61.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-extra-6.8.8.1-61.2">
      <FullProductName ProductID="ImageMagick-extra-6.8.8.1-61.2">ImageMagick-extra-6.8.8.1-61.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-6_Q16-3-6.8.8.1-61.2">
      <FullProductName ProductID="libMagick++-6_Q16-3-6.8.8.1-61.2">libMagick++-6_Q16-3-6.8.8.1-61.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-6_Q16-3-32bit-6.8.8.1-61.2">
      <FullProductName ProductID="libMagick++-6_Q16-3-32bit-6.8.8.1-61.2">libMagick++-6_Q16-3-32bit-6.8.8.1-61.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-devel-6.8.8.1-61.2">
      <FullProductName ProductID="libMagick++-devel-6.8.8.1-61.2">libMagick++-devel-6.8.8.1-61.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-devel-32bit-6.8.8.1-61.2">
      <FullProductName ProductID="libMagick++-devel-32bit-6.8.8.1-61.2">libMagick++-devel-32bit-6.8.8.1-61.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore-6_Q16-1-6.8.8.1-61.2">
      <FullProductName ProductID="libMagickCore-6_Q16-1-6.8.8.1-61.2">libMagickCore-6_Q16-1-6.8.8.1-61.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore-6_Q16-1-32bit-6.8.8.1-61.2">
      <FullProductName ProductID="libMagickCore-6_Q16-1-32bit-6.8.8.1-61.2">libMagickCore-6_Q16-1-32bit-6.8.8.1-61.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickWand-6_Q16-1-6.8.8.1-61.2">
      <FullProductName ProductID="libMagickWand-6_Q16-1-6.8.8.1-61.2">libMagickWand-6_Q16-1-6.8.8.1-61.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickWand-6_Q16-1-32bit-6.8.8.1-61.2">
      <FullProductName ProductID="libMagickWand-6_Q16-1-32bit-6.8.8.1-61.2">libMagickWand-6_Q16-1-32bit-6.8.8.1-61.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="perl-PerlMagick-6.8.8.1-61.2">
      <FullProductName ProductID="perl-PerlMagick-6.8.8.1-61.2">perl-PerlMagick-6.8.8.1-61.2</FullProductName>
    </Branch>
    <Relationship ProductReference="ImageMagick-6.8.8.1-61.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ImageMagick-6.8.8.1-61.2">ImageMagick-6.8.8.1-61.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-6.8.8.1-61.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-61.2">ImageMagick-devel-6.8.8.1-61.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-32bit-6.8.8.1-61.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-61.2">ImageMagick-devel-32bit-6.8.8.1-61.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-doc-6.8.8.1-61.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-61.2">ImageMagick-doc-6.8.8.1-61.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-extra-6.8.8.1-61.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-61.2">ImageMagick-extra-6.8.8.1-61.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-6_Q16-3-6.8.8.1-61.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-61.2">libMagick++-6_Q16-3-6.8.8.1-61.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-6_Q16-3-32bit-6.8.8.1-61.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-61.2">libMagick++-6_Q16-3-32bit-6.8.8.1-61.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-6.8.8.1-61.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-61.2">libMagick++-devel-6.8.8.1-61.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-32bit-6.8.8.1-61.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-61.2">libMagick++-devel-32bit-6.8.8.1-61.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore-6_Q16-1-6.8.8.1-61.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-61.2">libMagickCore-6_Q16-1-6.8.8.1-61.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore-6_Q16-1-32bit-6.8.8.1-61.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-61.2">libMagickCore-6_Q16-1-32bit-6.8.8.1-61.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand-6_Q16-1-6.8.8.1-61.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-61.2">libMagickWand-6_Q16-1-6.8.8.1-61.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand-6_Q16-1-32bit-6.8.8.1-61.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-61.2">libMagickWand-6_Q16-1-32bit-6.8.8.1-61.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="perl-PerlMagick-6.8.8.1-61.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-61.2">perl-PerlMagick-6.8.8.1-61.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.7-12 Q16, a CPU exhaustion vulnerability was found in the function ReadDDSInfo in coders/dds.c, which allows attackers to cause a denial of service.</Note>
    </Notes>
    <CVE>CVE-2017-1000476</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-61.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1000476.html</URL>
        <Description>CVE-2017-1000476</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074610</URL>
        <Description>SUSE Bug 1074610</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.6-0, a heap-based buffer over-read in the GetNextToken function in token.c allows remote attackers to obtain sensitive information from process memory or possibly have unspecified other impact via a crafted SVG document that is mishandled in the GetUserSpaceCoordinateValue function in coders/svg.c.</Note>
    </Notes>
    <CVE>CVE-2017-10928</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-61.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-10928.html</URL>
        <Description>CVE-2017-10928</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1047356</URL>
        <Description>SUSE Bug 1047356</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1047359</URL>
        <Description>SUSE Bug 1047359</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056277</URL>
        <Description>SUSE Bug 1056277</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1060176</URL>
        <Description>SUSE Bug 1060176</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1096261</URL>
        <Description>SUSE Bug 1096261</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via JPEG data that is too short.</Note>
    </Notes>
    <CVE>CVE-2017-11450</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-61.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11450.html</URL>
        <Description>CVE-2017-11450</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049374</URL>
        <Description>SUSE Bug 1049374</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.7-1 Q16, a memory leak vulnerability was found in the function PersistPixelCache in magick/cache.c, which allows attackers to cause a denial of service (memory consumption in ReadMPCImage in coders/mpc.c) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-14325</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-61.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14325.html</URL>
        <Description>CVE-2017-14325</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1058635</URL>
        <Description>SUSE Bug 1058635</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.7-16 Q16, a memory leak vulnerability was found in the function GetImagePixelCache in magick/cache.c, which allows attackers to cause a denial of service via a crafted MNG image file that is processed by ReadOneMNGImage.</Note>
    </Notes>
    <CVE>CVE-2017-17887</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-61.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-17887.html</URL>
        <Description>CVE-2017-17887</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074117</URL>
        <Description>SUSE Bug 1074117</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in ImageMagick 7.0.7. A NULL pointer dereference vulnerability was found in the function LogOpenCLBuildFailure in MagickCore/opencl.c, which allows attackers to cause a denial of service via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-18250</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-61.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18250.html</URL>
        <Description>CVE-2017-18250</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087039</URL>
        <Description>SUSE Bug 1087039</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability was found in the function ReadPCDImage in coders/pcd.c, which allow remote attackers to cause a denial of service via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-18251</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-61.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18251.html</URL>
        <Description>CVE-2017-18251</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087037</URL>
        <Description>SUSE Bug 1087037</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in ImageMagick 7.0.7. The MogrifyImageList function in MagickWand/mogrify.c allows attackers to cause a denial of service (assertion failure and application exit in ReplaceImageInList) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-18252</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-61.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18252.html</URL>
        <Description>CVE-2017-18252</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087033</URL>
        <Description>SUSE Bug 1087033</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, which allow remote attackers to cause a denial of service via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-18254</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-61.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18254.html</URL>
        <Description>CVE-2017-18254</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087027</URL>
        <Description>SUSE Bug 1087027</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.7-28, there is an infinite loop in the ReadOneMNGImage function of the coders/png.c file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted mng file.</Note>
    </Notes>
    <CVE>CVE-2018-10177</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-61.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10177.html</URL>
        <Description>CVE-2018-10177</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089781</URL>
        <Description>SUSE Bug 1089781</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadTIFFImage function in coders/tiff.c in ImageMagick 7.0.7-26 Q16 does not properly restrict memory allocation, leading to a heap-based buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2018-8960</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-61.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-8960.html</URL>
        <Description>CVE-2018-8960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086782</URL>
        <Description>SUSE Bug 1086782</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In GraphicsMagick 1.3.28, there is a divide-by-zero in the ReadMNGImage function of coders/png.c. Remote attackers could leverage this vulnerability to cause a crash and denial of service via a crafted mng file.</Note>
    </Notes>
    <CVE>CVE-2018-9018</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-61.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-9018.html</URL>
        <Description>CVE-2018-9018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086773</URL>
        <Description>SUSE Bug 1086773</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.7-24 Q16, there is a heap-based buffer over-read in IsWEBPImageLossless in coders/webp.c.</Note>
    </Notes>
    <CVE>CVE-2018-9135</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-61.2</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-61.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-9135.html</URL>
        <Description>CVE-2018-9135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087825</URL>
        <Description>SUSE Bug 1087825</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
