<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ImageMagick</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:3420-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-12-22T15:55:12Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-12-22T15:55:12Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-12-22T15:55:12Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ImageMagick</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for ImageMagick fixes the following issues:

  * CVE-2017-14989: use-after-free in RenderFreetype in MagickCore/annotate.c could lead to denial of service [bsc#1061254]
  * CVE-2017-14682: GetNextToken in MagickCore/token.c heap buffer overflow could lead to denial of service [bsc#1060176]
  * Memory leak in WriteINLINEImage in coders/inline.c could lead to denial of service [bsc#1052744]
  * CVE-2017-14607: out of bounds read flaw related to ReadTIFFImagehas  could possibly disclose potentially sensitive memory [bsc#1059778]
  * CVE-2017-11640: NULL pointer deref in WritePTIFImage() in coders/tiff.c [bsc#1050632]
  * CVE-2017-14342: a memory exhaustion vulnerability in ReadWPGImage in coders/wpg.c could lead to denial of service [bsc#1058485]
  * CVE-2017-14341: Infinite loop in the ReadWPGImage function [bsc#1058637]
  * CVE-2017-16546: problem in the function ReadWPGImage in coders/wpg.c could lead to denial of service [bsc#1067181]
  * CVE-2017-16545: The ReadWPGImage function in coders/wpg.c in  validation problems could lead to denial of service [bsc#1067184]
  * CVE-2017-16669: problem in coders/wpg.c could allow remote attackers to cause a denial of service via crafted file [bsc#1067409]
  * CVE-2017-14175: Lack of End of File check could lead to denial of service [bsc#1057719]
  * CVE-2017-14138: memory leak vulnerability in ReadWEBPImage in coders/webp.c could lead to denial of service [bsc#1057157]
  * CVE-2017-13769: denial of service issue in function WriteTHUMBNAILImage in coders/thumbnail.c [bsc#1056432]
  * CVE-2017-13134: a heap-based buffer over-read was found in thefunction SFWScan in coders/sfw.c, which allows attackers to cause adenial of service via a crafted file. [bsc#1055214]
  * CVE-2017-15217: memory leak in ReadSGIImage in coders/sgi.c [bsc#1062750]
  * CVE-2017-11478: ReadOneDJVUImage in coders/djvu.c in ImageMagick allows remote attackers to cause a DoS [bsc#1049796]
  * CVE-2017-15930: Null Pointer dereference  while transfering JPEG scanlines could lead to denial of service [bsc#1066003]
  * CVE-2017-12983: Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c inImageMagick 7.0.6-8 allows remote attackers to cause a denial of service [bsc#1054757]
  * CVE-2017-14531: memory exhaustion issue in ReadSUNImage incoders/sun.c. [bsc#1059666]
  * CVE-2017-12435: Memory exhaustion in ReadSUNImage in coders/sun.c, which allows attackers to cause denial of service [bsc#1052553]
  * CVE-2017-12587: User controlable large loop in the ReadPWPImage in coders\pwp.c could lead to denial of service [bsc#1052450]
  * CVE-2017-11523: ReadTXTImage in coders/txt.c allows remote attackers to cause a denial of service [bsc#1050083]
  * CVE-2017-14173: unction ReadTXTImage is vulnerable to a integer overflow that could lead to denial of service [bsc#1057729]
  * CVE-2017-11188: ImageMagick: The ReadDPXImage function in codersdpx.c in ImageMagick 7.0.6-0 has a largeloop vulnerability that can cause CPU exhaustion via a crafted DPX file, relatedto lack of an EOF check. [bnc#1048457]
  * CVE-2017-11527: ImageMagick: ReadDPXImage in coders/dpx.c allows remote attackers to cause DoS [bnc#1050116] 
  * CVE-2017-11535: GraphicsMagick, ImageMagick: Heap-based buffer over-read in WritePSImage() in coders/ps.c [bnc#1050139]
  * CVE-2017-11752: ImageMagick: ReadMAGICKImage in coders/magick.c allows to cause DoS  [bnc#1051441] 
  * CVE-2017-12140: ImageMagick: ReadDCMImage in codersdcm.c has a ninteger signedness error leading to excessive memory consumption [bnc#1051847] 
  * CVE-2017-12669: ImageMagick: Memory leak in WriteCALSImage in coders/cals.c [bnc#1052689]
  * CVE-2017-12662: GraphicsMagick, ImageMagick: Memory leak in WritePDFImage in coders/pdf.c [bnc#1052758]
  * CVE-2017-12644: ImageMagick: Memory leak in ReadDCMImage in codersdcm.c [bnc#1052764]
  * CVE-2017-14172: ImageMagick: Lack of end of file check in ReadPSImage() could lead to a denial of service [bnc#1057730]
  * CVE-2017-14733: GraphicsMagick: Heap overflow on ReadRLEImage in coders/rle.c could lead to denial of service [bnc#1060577]

This update was imported from the SUSE:SLE-12:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:3420-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-6.8.8.1-40.1">
      <FullProductName ProductID="ImageMagick-6.8.8.1-40.1">ImageMagick-6.8.8.1-40.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-devel-6.8.8.1-40.1">
      <FullProductName ProductID="ImageMagick-devel-6.8.8.1-40.1">ImageMagick-devel-6.8.8.1-40.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-devel-32bit-6.8.8.1-40.1">
      <FullProductName ProductID="ImageMagick-devel-32bit-6.8.8.1-40.1">ImageMagick-devel-32bit-6.8.8.1-40.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-doc-6.8.8.1-40.1">
      <FullProductName ProductID="ImageMagick-doc-6.8.8.1-40.1">ImageMagick-doc-6.8.8.1-40.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-extra-6.8.8.1-40.1">
      <FullProductName ProductID="ImageMagick-extra-6.8.8.1-40.1">ImageMagick-extra-6.8.8.1-40.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-6_Q16-3-6.8.8.1-40.1">
      <FullProductName ProductID="libMagick++-6_Q16-3-6.8.8.1-40.1">libMagick++-6_Q16-3-6.8.8.1-40.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-6_Q16-3-32bit-6.8.8.1-40.1">
      <FullProductName ProductID="libMagick++-6_Q16-3-32bit-6.8.8.1-40.1">libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-devel-6.8.8.1-40.1">
      <FullProductName ProductID="libMagick++-devel-6.8.8.1-40.1">libMagick++-devel-6.8.8.1-40.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-devel-32bit-6.8.8.1-40.1">
      <FullProductName ProductID="libMagick++-devel-32bit-6.8.8.1-40.1">libMagick++-devel-32bit-6.8.8.1-40.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore-6_Q16-1-6.8.8.1-40.1">
      <FullProductName ProductID="libMagickCore-6_Q16-1-6.8.8.1-40.1">libMagickCore-6_Q16-1-6.8.8.1-40.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1">
      <FullProductName ProductID="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1">libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickWand-6_Q16-1-6.8.8.1-40.1">
      <FullProductName ProductID="libMagickWand-6_Q16-1-6.8.8.1-40.1">libMagickWand-6_Q16-1-6.8.8.1-40.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1">
      <FullProductName ProductID="libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1">libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="perl-PerlMagick-6.8.8.1-40.1">
      <FullProductName ProductID="perl-PerlMagick-6.8.8.1-40.1">perl-PerlMagick-6.8.8.1-40.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ImageMagick-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1">ImageMagick-6.8.8.1-40.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1">ImageMagick-devel-6.8.8.1-40.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-32bit-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1">ImageMagick-devel-32bit-6.8.8.1-40.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-doc-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1">ImageMagick-doc-6.8.8.1-40.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-extra-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1">ImageMagick-extra-6.8.8.1-40.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-6_Q16-3-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1">libMagick++-6_Q16-3-6.8.8.1-40.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-6_Q16-3-32bit-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1">libMagick++-6_Q16-3-32bit-6.8.8.1-40.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1">libMagick++-devel-6.8.8.1-40.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-32bit-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1">libMagick++-devel-32bit-6.8.8.1-40.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore-6_Q16-1-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1">libMagickCore-6_Q16-1-6.8.8.1-40.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1">libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand-6_Q16-1-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1">libMagickWand-6_Q16-1-6.8.8.1-40.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1">libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="perl-PerlMagick-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1">perl-PerlMagick-6.8.8.1-40.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1">ImageMagick-6.8.8.1-40.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1">ImageMagick-devel-6.8.8.1-40.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-32bit-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1">ImageMagick-devel-32bit-6.8.8.1-40.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-doc-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1">ImageMagick-doc-6.8.8.1-40.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-extra-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1">ImageMagick-extra-6.8.8.1-40.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-6_Q16-3-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1">libMagick++-6_Q16-3-6.8.8.1-40.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-6_Q16-3-32bit-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1">libMagick++-6_Q16-3-32bit-6.8.8.1-40.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1">libMagick++-devel-6.8.8.1-40.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-32bit-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1">libMagick++-devel-32bit-6.8.8.1-40.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore-6_Q16-1-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1">libMagickCore-6_Q16-1-6.8.8.1-40.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1">libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand-6_Q16-1-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1">libMagickWand-6_Q16-1-6.8.8.1-40.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1">libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="perl-PerlMagick-6.8.8.1-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1">perl-PerlMagick-6.8.8.1-40.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadDPXImage function in coders\dpx.c in ImageMagick 7.0.6-0 has a large loop vulnerability that can cause CPU exhaustion via a crafted DPX file, related to lack of an EOF check.</Note>
    </Notes>
    <CVE>CVE-2017-11188</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11188.html</URL>
        <Description>CVE-2017-11188</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048457</URL>
        <Description>SUSE Bug 1048457</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadOneDJVUImage function in coders/djvu.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed DJVU image.</Note>
    </Notes>
    <CVE>CVE-2017-11478</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11478.html</URL>
        <Description>CVE-2017-11478</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049796</URL>
        <Description>SUSE Bug 1049796</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadTXTImage function in coders/txt.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (infinite loop) via a crafted file, because the end-of-file condition is not considered.</Note>
    </Notes>
    <CVE>CVE-2017-11523</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11523.html</URL>
        <Description>CVE-2017-11523</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050083</URL>
        <Description>SUSE Bug 1050083</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadDPXImage function in coders/dpx.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory consumption) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-11527</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11527.html</URL>
        <Description>CVE-2017-11527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1047054</URL>
        <Description>SUSE Bug 1047054</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050116</URL>
        <Description>SUSE Bug 1050116</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a heap-based buffer over-read in the WritePSImage() function in coders/ps.c.</Note>
    </Notes>
    <CVE>CVE-2017-11535</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11535.html</URL>
        <Description>CVE-2017-11535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050139</URL>
        <Description>SUSE Bug 1050139</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to an address access exception in the WritePTIFImage() function in coders/tiff.c.</Note>
    </Notes>
    <CVE>CVE-2017-11640</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11640.html</URL>
        <Description>CVE-2017-11640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050632</URL>
        <Description>SUSE Bug 1050632</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadMAGICKImage function in coders/magick.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-11752</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11752.html</URL>
        <Description>CVE-2017-11752</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1051441</URL>
        <Description>SUSE Bug 1051441</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadDCMImage function in coders\dcm.c in ImageMagick 7.0.6-1 has an integer signedness error leading to excessive memory consumption via a crafted DCM file.</Note>
    </Notes>
    <CVE>CVE-2017-12140</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12140.html</URL>
        <Description>CVE-2017-12140</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1051847</URL>
        <Description>SUSE Bug 1051847</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052764</URL>
        <Description>SUSE Bug 1052764</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadSUNImage in coders/sun.c, which allows attackers to cause a denial of service.</Note>
    </Notes>
    <CVE>CVE-2017-12435</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12435.html</URL>
        <Description>CVE-2017-12435</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052553</URL>
        <Description>SUSE Bug 1052553</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057508</URL>
        <Description>SUSE Bug 1057508</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.6-1 has a large loop vulnerability in the ReadPWPImage function in coders\pwp.c.</Note>
    </Notes>
    <CVE>CVE-2017-12587</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12587.html</URL>
        <Description>CVE-2017-12587</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052450</URL>
        <Description>SUSE Bug 1052450</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadDCMImage in coders\dcm.c.</Note>
    </Notes>
    <CVE>CVE-2017-12644</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12644.html</URL>
        <Description>CVE-2017-12644</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1051847</URL>
        <Description>SUSE Bug 1051847</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052764</URL>
        <Description>SUSE Bug 1052764</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePDFImage in coders/pdf.c.</Note>
    </Notes>
    <CVE>CVE-2017-12662</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12662.html</URL>
        <Description>CVE-2017-12662</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052758</URL>
        <Description>SUSE Bug 1052758</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteCALSImage in coders/cals.c.</Note>
    </Notes>
    <CVE>CVE-2017-12669</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12669.html</URL>
        <Description>CVE-2017-12669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052689</URL>
        <Description>SUSE Bug 1052689</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c in ImageMagick 7.0.6-8 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-12983</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12983.html</URL>
        <Description>CVE-2017-12983</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1054757</URL>
        <Description>SUSE Bug 1054757</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.6-6 and GraphicsMagick 1.3.26, a heap-based buffer over-read was found in the function SFWScan in coders/sfw.c, which allows attackers to cause a denial of service via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-13134</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13134.html</URL>
        <Description>CVE-2017-13134</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1055214</URL>
        <Description>SUSE Bug 1055214</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The WriteTHUMBNAILImage function in coders/thumbnail.c in ImageMagick through 7.0.6-10 allows an attacker to cause a denial of service (buffer over-read) by sending a crafted JPEG file.</Note>
    </Notes>
    <CVE>CVE-2017-13769</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13769.html</URL>
        <Description>CVE-2017-13769</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056432</URL>
        <Description>SUSE Bug 1056432</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.6-5 has a memory leak vulnerability in ReadWEBPImage in coders/webp.c because memory is not freed in certain error cases, as demonstrated by VP8 errors.</Note>
    </Notes>
    <CVE>CVE-2017-14138</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14138.html</URL>
        <Description>CVE-2017-14138</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057153</URL>
        <Description>SUSE Bug 1057153</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057157</URL>
        <Description>SUSE Bug 1057157</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In coders/ps.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "extent" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would consume huge CPU resources, since there is no EOF check inside the loop.</Note>
    </Notes>
    <CVE>CVE-2017-14172</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14172.html</URL>
        <Description>CVE-2017-14172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057730</URL>
        <Description>SUSE Bug 1057730</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the function ReadTXTImage() in coders/txt.c in ImageMagick 7.0.6-10, an integer overflow might occur for the addition operation "GetQuantumRange(depth)+1" when "depth" is large, producing a smaller value than expected. As a result, an infinite loop would occur for a crafted TXT file that claims a very large "max_value" value.</Note>
    </Notes>
    <CVE>CVE-2017-14173</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14173.html</URL>
        <Description>CVE-2017-14173</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057729</URL>
        <Description>SUSE Bug 1057729</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In coders/xbm.c in ImageMagick 7.0.6-1 Q16, a DoS in ReadXBMImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted XBM file, which claims large rows and columns fields in the header but does not contain sufficient backing data, is provided, the loop over the rows would consume huge CPU resources, since there is no EOF check inside the loop.</Note>
    </Notes>
    <CVE>CVE-2017-14175</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14175.html</URL>
        <Description>CVE-2017-14175</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056426</URL>
        <Description>SUSE Bug 1056426</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056429</URL>
        <Description>SUSE Bug 1056429</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057719</URL>
        <Description>SUSE Bug 1057719</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.6-6 has a large loop vulnerability in ReadWPGImage in coders/wpg.c, causing CPU exhaustion via a crafted wpg image file.</Note>
    </Notes>
    <CVE>CVE-2017-14341</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14341.html</URL>
        <Description>CVE-2017-14341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1058637</URL>
        <Description>SUSE Bug 1058637</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.6-6 has a memory exhaustion vulnerability in ReadWPGImage in coders/wpg.c via a crafted wpg image file.</Note>
    </Notes>
    <CVE>CVE-2017-14342</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14342.html</URL>
        <Description>CVE-2017-14342</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1058485</URL>
        <Description>SUSE Bug 1058485</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.7-0 has a memory exhaustion issue in ReadSUNImage in coders/sun.c.</Note>
    </Notes>
    <CVE>CVE-2017-14531</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14531.html</URL>
        <Description>CVE-2017-14531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057508</URL>
        <Description>SUSE Bug 1057508</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1059666</URL>
        <Description>SUSE Bug 1059666</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.7-4 Q16, an out of bounds read flaw related to ReadTIFFImage has been reported in coders/tiff.c. An attacker could possibly exploit this flaw to disclose potentially sensitive memory or cause an application crash.</Note>
    </Notes>
    <CVE>CVE-2017-14607</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14607.html</URL>
        <Description>CVE-2017-14607</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1059778</URL>
        <Description>SUSE Bug 1059778</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GetNextToken in MagickCore/token.c in ImageMagick 7.0.6 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted SVG document, a different vulnerability than CVE-2017-10928.</Note>
    </Notes>
    <CVE>CVE-2017-14682</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14682.html</URL>
        <Description>CVE-2017-14682</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1047356</URL>
        <Description>SUSE Bug 1047356</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1060176</URL>
        <Description>SUSE Bug 1060176</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ReadRLEImage in coders/rle.c in GraphicsMagick 1.3.26 mishandles RLE headers that specify too few colors, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-14733</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14733.html</URL>
        <Description>CVE-2017-14733</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1060577</URL>
        <Description>SUSE Bug 1060577</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free in RenderFreetype in MagickCore/annotate.c in ImageMagick 7.0.7-4 Q16 allows attackers to crash the application via a crafted font file, because the FT_Done_Glyph function (from FreeType 2) is called at an incorrect place in the ImageMagick code.</Note>
    </Notes>
    <CVE>CVE-2017-14989</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14989.html</URL>
        <Description>CVE-2017-14989</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1061254</URL>
        <Description>SUSE Bug 1061254</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.7-2 has a memory leak in ReadSGIImage in coders/sgi.c.</Note>
    </Notes>
    <CVE>CVE-2017-15217</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15217.html</URL>
        <Description>CVE-2017-15217</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1062750</URL>
        <Description>SUSE Bug 1062750</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ReadOneJNGImage in coders/png.c in GraphicsMagick 1.3.26, a Null Pointer Dereference occurs while transferring JPEG scanlines, related to a PixelPacket pointer.</Note>
    </Notes>
    <CVE>CVE-2017-15930</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15930.html</URL>
        <Description>CVE-2017-15930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1066003</URL>
        <Description>SUSE Bug 1066003</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadWPGImage function in coders/wpg.c in GraphicsMagick 1.3.26 does not properly validate colormapped images, which allows remote attackers to cause a denial of service (ImportIndexQuantumType invalid write and application crash) or possibly have unspecified other impact via a malformed WPG image.</Note>
    </Notes>
    <CVE>CVE-2017-16545</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16545.html</URL>
        <Description>CVE-2017-16545</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1067184</URL>
        <Description>SUSE Bug 1067184</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadWPGImage function in coders/wpg.c in ImageMagick 7.0.7-9 does not properly validate the colormap index in a WPG palette, which allows remote attackers to cause a denial of service (use of uninitialized data or invalid memory allocation) or possibly have unspecified other impact via a malformed WPG file.</Note>
    </Notes>
    <CVE>CVE-2017-16546</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16546.html</URL>
        <Description>CVE-2017-16546</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1067181</URL>
        <Description>SUSE Bug 1067181</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">coders/wpg.c in GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file, related to the AcquireCacheNexus function in magick/pixel_cache.c.</Note>
    </Notes>
    <CVE>CVE-2017-16669</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.2:perl-PerlMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16669.html</URL>
        <Description>CVE-2017-16669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1067409</URL>
        <Description>SUSE Bug 1067409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1072898</URL>
        <Description>SUSE Bug 1072898</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
