<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ImageMagick</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:1560-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-06-14T09:43:02Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-06-14T09:43:02Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-06-14T09:43:02Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ImageMagick</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for ImageMagick fixes the following issues:

Security issues fixed:

- CVE-2017-6502: Possible file-descriptor leak in libmagickcore that could be triggered via a
  specially crafted webp file (bsc#1028075).
- CVE-2017-7943: The ReadSVGImage function in svg.c allowed remote attackers to consume an
  amount of available memory via a crafted file (bsc#1034870). Note that this only impacts the
  built-in SVG implementation. As we use the librsgv implementation, we are not affected.
- CVE-2017-7942: The ReadAVSImage function in avs.c allowed remote attackers to consume an
  amount of available memory via a crafted file (bsc#1034872).
- CVE-2017-7941: The ReadSGIImage function in sgi.c allowed remote attackers to consume an
  amount of available memory via a crafted file (bsc#1034876).
- CVE-2017-8351: ImageMagick, GraphicsMagick: denial of service (memory leak) via a crafted
  file (ReadPCDImage func in pcd.c) (bsc#1036986).
- CVE-2017-8352: denial of service (memory leak) via a crafted file (ReadXWDImage func in
  xwd.c) (bsc#1036987)
- CVE-2017-8349: denial of service (memory leak) via a crafted file (ReadSFWImage func in
  sfw.c) (bsc#1036984)
- CVE-2017-8350: denial of service (memory leak) via a crafted file (ReadJNGImage function in
  png.c) (bsc#1036985)
- CVE-2017-8347: denial of service (memory leak) via a crafted file (ReadEXRImage func in
  exr.c) (bsc#1036982)
- CVE-2017-8348: denial of service (memory leak) via a crafted file (ReadMATImage func in
  mat.c) (bsc#1036983)
- CVE-2017-8345: denial of service (memory leak) via a crafted file (ReadMNGImage func in
  png.c) (bsc#1036980)
- CVE-2017-8346: denial of service (memory leak) via a crafted file (ReadDCMImage func in
  dcm.c) (bsc#1036981)
- CVE-2017-8353: denial of service (memory leak) via a crafted file (ReadPICTImage func in
  pict.c) (bsc#1036988)
- CVE-2017-8354: denial of service (memory leak) via a crafted file (ReadBMPImage func in
  bmp.c) (bsc#1036989)
- CVE-2017-8830: denial of service (memory leak) via a crafted file (ReadBMPImage func in
  bmp.c:1379) (bsc#1038000)
- CVE-2017-7606: denial of service (application crash) or possibly have unspecified other
  impact via a crafted image (bsc#1033091)
- CVE-2017-8765: memory leak vulnerability via a crafted ICON file (ReadICONImage in
  coders\icon.c) (bsc#1037527)
- CVE-2017-8356: denial of service (memory leak) via a crafted file (ReadSUNImage function in
  sun.c) (bsc#1036991)
- CVE-2017-8355: denial of service (memory leak) via a crafted file (ReadMTVImage func in
  mtv.c) (bsc#1036990)
- CVE-2017-8344: denial of service (memory leak) via a crafted file (ReadPCXImage func in
  pcx.c) (bsc#1036978)
- CVE-2017-8343: denial of service (memory leak) via a crafted file (ReadAAIImage func in
  aai.c) (bsc#1036977)
- CVE-2017-8357: denial of service (memory leak) via a crafted file (ReadEPTImage func in
  ept.c) (bsc#1036976)
- CVE-2017-9098: uninitialized memory usage in the  ReadRLEImage RLE decoder 
  function coders/rle.c (bsc#1040025)
- CVE-2017-9141: Missing checks in the ReadDDSImage function in
  coders/dds.c could lead to a denial of service (assertion) (bsc#1040303)
- CVE-2017-9142: Missing checks in theReadOneJNGImage function in
  coders/png.c could lead to denial of service (assertion) (bsc#1040304)
- CVE-2017-9143: A possible denial of service attack via crafted .art
  file in ReadARTImage function in coders/art.c (bsc#1040306)
- CVE-2017-9144: A crafted RLE image can trigger a crash in coders/rle.c
  could lead to a denial of service (crash) (bsc#1040332)

This update was imported from the SUSE:SLE-12:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:1560-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-6.8.8.1-30.3.1">
      <FullProductName ProductID="ImageMagick-6.8.8.1-30.3.1">ImageMagick-6.8.8.1-30.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-devel-6.8.8.1-30.3.1">
      <FullProductName ProductID="ImageMagick-devel-6.8.8.1-30.3.1">ImageMagick-devel-6.8.8.1-30.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-devel-32bit-6.8.8.1-30.3.1">
      <FullProductName ProductID="ImageMagick-devel-32bit-6.8.8.1-30.3.1">ImageMagick-devel-32bit-6.8.8.1-30.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-doc-6.8.8.1-30.3.1">
      <FullProductName ProductID="ImageMagick-doc-6.8.8.1-30.3.1">ImageMagick-doc-6.8.8.1-30.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-extra-6.8.8.1-30.3.1">
      <FullProductName ProductID="ImageMagick-extra-6.8.8.1-30.3.1">ImageMagick-extra-6.8.8.1-30.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-6_Q16-3-6.8.8.1-30.3.1">
      <FullProductName ProductID="libMagick++-6_Q16-3-6.8.8.1-30.3.1">libMagick++-6_Q16-3-6.8.8.1-30.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1">
      <FullProductName ProductID="libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1">libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-devel-6.8.8.1-30.3.1">
      <FullProductName ProductID="libMagick++-devel-6.8.8.1-30.3.1">libMagick++-devel-6.8.8.1-30.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-devel-32bit-6.8.8.1-30.3.1">
      <FullProductName ProductID="libMagick++-devel-32bit-6.8.8.1-30.3.1">libMagick++-devel-32bit-6.8.8.1-30.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore-6_Q16-1-6.8.8.1-30.3.1">
      <FullProductName ProductID="libMagickCore-6_Q16-1-6.8.8.1-30.3.1">libMagickCore-6_Q16-1-6.8.8.1-30.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1">
      <FullProductName ProductID="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1">libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickWand-6_Q16-1-6.8.8.1-30.3.1">
      <FullProductName ProductID="libMagickWand-6_Q16-1-6.8.8.1-30.3.1">libMagickWand-6_Q16-1-6.8.8.1-30.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1">
      <FullProductName ProductID="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1">libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="perl-PerlMagick-6.8.8.1-30.3.1">
      <FullProductName ProductID="perl-PerlMagick-6.8.8.1-30.3.1">perl-PerlMagick-6.8.8.1-30.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ImageMagick-6.8.8.1-30.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1">ImageMagick-6.8.8.1-30.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-6.8.8.1-30.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1">ImageMagick-devel-6.8.8.1-30.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-32bit-6.8.8.1-30.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1">ImageMagick-devel-32bit-6.8.8.1-30.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-doc-6.8.8.1-30.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1">ImageMagick-doc-6.8.8.1-30.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-extra-6.8.8.1-30.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1">ImageMagick-extra-6.8.8.1-30.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-6_Q16-3-6.8.8.1-30.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1">libMagick++-6_Q16-3-6.8.8.1-30.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1">libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-6.8.8.1-30.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1">libMagick++-devel-6.8.8.1-30.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-32bit-6.8.8.1-30.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1">libMagick++-devel-32bit-6.8.8.1-30.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore-6_Q16-1-6.8.8.1-30.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1">libMagickCore-6_Q16-1-6.8.8.1-30.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1">libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand-6_Q16-1-6.8.8.1-30.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1">libMagickWand-6_Q16-1-6.8.8.1-30.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1">libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="perl-PerlMagick-6.8.8.1-30.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1">perl-PerlMagick-6.8.8.1-30.3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in ImageMagick 6.9.7. A specially crafted webp file could lead to a file-descriptor leak in libmagickcore (thus, a DoS).</Note>
    </Notes>
    <CVE>CVE-2017-6502</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6502.html</URL>
        <Description>CVE-2017-6502</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1028075</URL>
        <Description>SUSE Bug 1028075</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">coders/rle.c in ImageMagick 7.0.5-4 has an "outside the range of representable values of type unsigned char" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.</Note>
    </Notes>
    <CVE>CVE-2017-7606</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7606.html</URL>
        <Description>CVE-2017-7606</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033091</URL>
        <Description>SUSE Bug 1033091</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadSGIImage function in sgi.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-7941</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7941.html</URL>
        <Description>CVE-2017-7941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034876</URL>
        <Description>SUSE Bug 1034876</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126909</URL>
        <Description>SUSE Bug 1126909</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadAVSImage function in avs.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-7942</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7942.html</URL>
        <Description>CVE-2017-7942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034872</URL>
        <Description>SUSE Bug 1034872</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadSVGImage function in svg.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-7943</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7943.html</URL>
        <Description>CVE-2017-7943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034870</URL>
        <Description>SUSE Bug 1034870</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036985</URL>
        <Description>SUSE Bug 1036985</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadAAIImage function in aai.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8343</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8343.html</URL>
        <Description>CVE-2017-8343</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036977</URL>
        <Description>SUSE Bug 1036977</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadPCXImage function in pcx.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8344</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8344.html</URL>
        <Description>CVE-2017-8344</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036978</URL>
        <Description>SUSE Bug 1036978</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadMNGImage function in png.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8345</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8345.html</URL>
        <Description>CVE-2017-8345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036980</URL>
        <Description>SUSE Bug 1036980</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadDCMImage function in dcm.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8346</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8346.html</URL>
        <Description>CVE-2017-8346</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036981</URL>
        <Description>SUSE Bug 1036981</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadEXRImage function in exr.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8347</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8347.html</URL>
        <Description>CVE-2017-8347</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036982</URL>
        <Description>SUSE Bug 1036982</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadMATImage function in mat.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8348</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8348.html</URL>
        <Description>CVE-2017-8348</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036983</URL>
        <Description>SUSE Bug 1036983</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadSFWImage function in sfw.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8349</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8349.html</URL>
        <Description>CVE-2017-8349</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036984</URL>
        <Description>SUSE Bug 1036984</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadJNGImage function in png.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8350</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8350.html</URL>
        <Description>CVE-2017-8350</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036985</URL>
        <Description>SUSE Bug 1036985</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053919</URL>
        <Description>SUSE Bug 1053919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126909</URL>
        <Description>SUSE Bug 1126909</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadPCDImage function in pcd.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8351</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8351.html</URL>
        <Description>CVE-2017-8351</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036986</URL>
        <Description>SUSE Bug 1036986</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126909</URL>
        <Description>SUSE Bug 1126909</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadXWDImage function in xwd.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8352</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8352.html</URL>
        <Description>CVE-2017-8352</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036987</URL>
        <Description>SUSE Bug 1036987</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadPICTImage function in pict.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8353</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8353.html</URL>
        <Description>CVE-2017-8353</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036988</URL>
        <Description>SUSE Bug 1036988</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1055010</URL>
        <Description>SUSE Bug 1055010</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126909</URL>
        <Description>SUSE Bug 1126909</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadBMPImage function in bmp.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8354</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8354.html</URL>
        <Description>CVE-2017-8354</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036989</URL>
        <Description>SUSE Bug 1036989</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadMTVImage function in mtv.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8355</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8355.html</URL>
        <Description>CVE-2017-8355</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036990</URL>
        <Description>SUSE Bug 1036990</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126909</URL>
        <Description>SUSE Bug 1126909</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadSUNImage function in sun.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8356</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8356.html</URL>
        <Description>CVE-2017-8356</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036991</URL>
        <Description>SUSE Bug 1036991</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053919</URL>
        <Description>SUSE Bug 1053919</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadEPTImage function in ept.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8357</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8357.html</URL>
        <Description>CVE-2017-8357</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036976</URL>
        <Description>SUSE Bug 1036976</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The function named ReadICONImage in coders\icon.c in ImageMagick 7.0.5-5 has a memory leak vulnerability which can cause memory exhaustion via a crafted ICON file.</Note>
    </Notes>
    <CVE>CVE-2017-8765</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8765.html</URL>
        <Description>CVE-2017-8765</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1037527</URL>
        <Description>SUSE Bug 1037527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053919</URL>
        <Description>SUSE Bug 1053919</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-6, the ReadBMPImage function in bmp.c:1379 allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8830</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8830.html</URL>
        <Description>CVE-2017-8830</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038000</URL>
        <Description>SUSE Bug 1038000</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053919</URL>
        <Description>SUSE Bug 1053919</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick before 7.0.5-2 and GraphicsMagick before 1.3.24 use uninitialized memory in the RLE decoder, allowing an attacker to leak sensitive information from process memory space, as demonstrated by remote attacks against ImageMagick code in a long-running server process that converts image data on behalf of multiple users. This is caused by a missing initialization step in the ReadRLEImage function in coders/rle.c.</Note>
    </Notes>
    <CVE>CVE-2017-9098</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9098.html</URL>
        <Description>CVE-2017-9098</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1040025</URL>
        <Description>SUSE Bug 1040025</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053919</URL>
        <Description>SUSE Bug 1053919</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the ResetImageProfileIterator function in MagickCore/profile.c because of missing checks in the ReadDDSImage function in coders/dds.c.</Note>
    </Notes>
    <CVE>CVE-2017-9141</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9141.html</URL>
        <Description>CVE-2017-9141</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1040303</URL>
        <Description>SUSE Bug 1040303</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053919</URL>
        <Description>SUSE Bug 1053919</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the WriteBlob function in MagickCore/blob.c because of missing checks in the ReadOneJNGImage function in coders/png.c.</Note>
    </Notes>
    <CVE>CVE-2017-9142</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9142.html</URL>
        <Description>CVE-2017-9142</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036985</URL>
        <Description>SUSE Bug 1036985</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1040304</URL>
        <Description>SUSE Bug 1040304</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadARTImage function in coders/art.c allows attackers to cause a denial of service (memory leak) via a crafted .art file.</Note>
    </Notes>
    <CVE>CVE-2017-9143</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9143.html</URL>
        <Description>CVE-2017-9143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1040306</URL>
        <Description>SUSE Bug 1040306</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053919</URL>
        <Description>SUSE Bug 1053919</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, a crafted RLE image can trigger a crash because of incorrect EOF handling in coders/rle.c.</Note>
    </Notes>
    <CVE>CVE-2017-9144</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-30.3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-30.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9144.html</URL>
        <Description>CVE-2017-9144</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1040332</URL>
        <Description>SUSE Bug 1040332</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048936</URL>
        <Description>SUSE Bug 1048936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053919</URL>
        <Description>SUSE Bug 1053919</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
