<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ImageMagick</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:0621-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-03-06T19:30:24Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-03-06T19:30:24Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-03-06T19:30:24Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ImageMagick</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for ImageMagick fixes the following issues:

- CVE-2017-9405: A memory leak in the ReadICONImage function was fixed that could lead to DoS via memory exhaustion (bsc#1042911)
- CVE-2017-9407: In ImageMagick, the ReadPALMImage function in palm.c allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1042824)
- CVE-2017-11166: In ReadXWDImage in coders\xwd.c a memoryleak could have caused memory exhaustion via a crafted length (bsc#1048110)
- CVE-2017-11170: ReadTGAImage in coders\tga.c allowed for memory exhaustion via invalid colors data in the header of a TGA or VST file (bsc#1048272)
- CVE-2017-11448: The ReadJPEGImage function in coders/jpeg.c in ImageMagick allowed remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.  (bsc#1049375)
- CVE-2017-11450: A remote denial of service in coders/jpeg.c was fixed (bsc#1049374)
- CVE-2017-11528: ReadDIBImage in coders/dib.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050119)
- CVE-2017-11530: ReadEPTImage in coders/ept.c allows remote attackers to cause DoS via memory exhaustion (bsc#1050122)
- CVE-2017-11531: When ImageMagick processed a crafted file in convert, it could lead to a Memory Leak in the WriteHISTOGRAMImage() function in coders/histogram.c.  (bsc#1050126)
- CVE-2017-11533: A information leak by 1 byte due to heap-based buffer over-read in the WriteUILImage() in coders/uil.c was fixed (bsc#1050132)
- CVE-2017-11537: When ImageMagick processed a crafted file in convert, it can lead to a Floating Point Exception (FPE) in the WritePALMImage() function in coders/palm.c, related to an incorrect bits-per-pixel calculation.  (bsc#1050048)
- CVE-2017-11638, CVE-2017-11642: A NULL pointer dereference in theWriteMAPImage() in coders/map.c was fixed which could lead to a crash (bsc#1050617)
- CVE-2017-12418: ImageMagick had memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c.  (bsc#1052207)
- CVE-2017-12427: ProcessMSLScript coders/msl.c allowed remote attackers to cause a DoS (bsc#1052248)
- CVE-2017-12429: A memory exhaustion flaw in ReadMIFFImage in coders/miff.c was fixed, which allowed attackers to cause DoS (bsc#1052251)
- CVE-2017-12432: In ImageMagick, a memory exhaustion vulnerability was found in the function ReadPCXImage in coders/pcx.c, which allowed attackers to cause a denial of service.  (bsc#1052254)
- CVE-2017-12566: A memory leak in ReadMVGImage in coders/mvg.c, could have allowed attackers to cause DoS (bsc#1052472)
- CVE-2017-12654: The ReadPICTImage function in coders/pict.c in ImageMagick allowed attackers to cause a denial of service (memory leak) via a crafted file.  (bsc#1052761)
- CVE-2017-12663: A memory leak in WriteMAPImage in coders/map.c was fixed that could lead to a DoS via memory exhaustion (bsc#1052754)
- CVE-2017-12664: ImageMagick had a memory leak vulnerability in WritePALMImage in coders/palm.c.  (bsc#1052750)
- CVE-2017-12665: ImageMagick had a memory leak vulnerability in WritePICTImage in coders/pict.c.  (bsc#1052747)
- CVE-2017-12668: ImageMagick had a memory leak vulnerability in WritePCXImage in coders/pcx.c. (bsc#1052688)
- CVE-2017-12674: A CPU exhaustion in ReadPDBImage in coders/pdb.c was fixed, which allowed attackers to cause DoS (bsc#1052711)
- CVE-2017-13058: In ImageMagick, a memory leak vulnerability was found in the function WritePCXImage in coders/pcx.c, which allowed attackers to cause a denial of service via a crafted file.  (bsc#1055069)
- CVE-2017-13131: A memory leak vulnerability was found in thefunction ReadMIFFImage in coders/miff.c, which allowed attackers tocause a denial of service (memory consumption in NewL (bsc#1055229)
- CVE-2017-14060: A NULL Pointer Dereference issue in the ReadCUTImage function in coders/cut.c was fixed that could have caused a Denial of Service (bsc#1056768)
- CVE-2017-14139: A memory leak vulnerability in WriteMSLImage in coders/msl.c was fixed. (bsc#1057163)
- CVE-2017-14224: A heap-based buffer overflow in WritePCXImage in coders/pcx.c  could lead to  denial of service or code execution. (bsc#1058009)
- CVE-2017-17682: A large loop vulnerability was fixed in ExtractPostscript in coders/wpg.c, which allowed attackers to cause a denial of service (CPU exhaustion) (bsc#1072898)
- CVE-2017-17885: In ImageMagick, a memory leak vulnerability was found in the function ReadPICTImage in coders/pict.c, which allowed attackers to cause a denial of service via a crafted PICT image file. (bsc#1074119)
- CVE-2017-17934: A memory leak in the function MSLPopImage and ProcessMSLScript could have lead to a denial of service (bsc#1074170)
- CVE-2017-18028: A memory exhaustion in the function ReadTIFFImage in coders/tiff.c was fixed. (bsc#1076182)
- CVE-2018-5357: ImageMagick had memory leaks in the ReadDCMImage function in coders/dcm.c.  (bsc#1075821)
- CVE-2018-6405: In the ReadDCMImage function in coders/dcm.c in ImageMagick, each redmap, greenmap, and bluemap variable can be overwritten by a new pointer. The previous pointer is lost, which leads to a memory leak. This allowed remote attackers to cause a denial of service. (bsc#1078433)

This update was imported from the SUSE:SLE-12:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:0621-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-6.8.8.1-55.1">
      <FullProductName ProductID="ImageMagick-6.8.8.1-55.1">ImageMagick-6.8.8.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-devel-6.8.8.1-55.1">
      <FullProductName ProductID="ImageMagick-devel-6.8.8.1-55.1">ImageMagick-devel-6.8.8.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-devel-32bit-6.8.8.1-55.1">
      <FullProductName ProductID="ImageMagick-devel-32bit-6.8.8.1-55.1">ImageMagick-devel-32bit-6.8.8.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-doc-6.8.8.1-55.1">
      <FullProductName ProductID="ImageMagick-doc-6.8.8.1-55.1">ImageMagick-doc-6.8.8.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-extra-6.8.8.1-55.1">
      <FullProductName ProductID="ImageMagick-extra-6.8.8.1-55.1">ImageMagick-extra-6.8.8.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-6_Q16-3-6.8.8.1-55.1">
      <FullProductName ProductID="libMagick++-6_Q16-3-6.8.8.1-55.1">libMagick++-6_Q16-3-6.8.8.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-6_Q16-3-32bit-6.8.8.1-55.1">
      <FullProductName ProductID="libMagick++-6_Q16-3-32bit-6.8.8.1-55.1">libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-devel-6.8.8.1-55.1">
      <FullProductName ProductID="libMagick++-devel-6.8.8.1-55.1">libMagick++-devel-6.8.8.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-devel-32bit-6.8.8.1-55.1">
      <FullProductName ProductID="libMagick++-devel-32bit-6.8.8.1-55.1">libMagick++-devel-32bit-6.8.8.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore-6_Q16-1-6.8.8.1-55.1">
      <FullProductName ProductID="libMagickCore-6_Q16-1-6.8.8.1-55.1">libMagickCore-6_Q16-1-6.8.8.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1">
      <FullProductName ProductID="libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1">libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickWand-6_Q16-1-6.8.8.1-55.1">
      <FullProductName ProductID="libMagickWand-6_Q16-1-6.8.8.1-55.1">libMagickWand-6_Q16-1-6.8.8.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1">
      <FullProductName ProductID="libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1">libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="perl-PerlMagick-6.8.8.1-55.1">
      <FullProductName ProductID="perl-PerlMagick-6.8.8.1-55.1">perl-PerlMagick-6.8.8.1-55.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ImageMagick-6.8.8.1-55.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1">ImageMagick-6.8.8.1-55.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-6.8.8.1-55.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1">ImageMagick-devel-6.8.8.1-55.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-32bit-6.8.8.1-55.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1">ImageMagick-devel-32bit-6.8.8.1-55.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-doc-6.8.8.1-55.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1">ImageMagick-doc-6.8.8.1-55.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-extra-6.8.8.1-55.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1">ImageMagick-extra-6.8.8.1-55.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-6_Q16-3-6.8.8.1-55.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1">libMagick++-6_Q16-3-6.8.8.1-55.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-6_Q16-3-32bit-6.8.8.1-55.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1">libMagick++-6_Q16-3-32bit-6.8.8.1-55.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-6.8.8.1-55.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1">libMagick++-devel-6.8.8.1-55.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-32bit-6.8.8.1-55.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1">libMagick++-devel-32bit-6.8.8.1-55.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore-6_Q16-1-6.8.8.1-55.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1">libMagickCore-6_Q16-1-6.8.8.1-55.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1">libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand-6_Q16-1-6.8.8.1-55.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1">libMagickWand-6_Q16-1-6.8.8.1-55.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1">libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="perl-PerlMagick-6.8.8.1-55.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1">perl-PerlMagick-6.8.8.1-55.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadXWDImage function in coders\xwd.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted length (number of color-map entries) field in the header of an XWD file.</Note>
    </Notes>
    <CVE>CVE-2017-11166</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11166.html</URL>
        <Description>CVE-2017-11166</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048110</URL>
        <Description>SUSE Bug 1048110</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadTGAImage function in coders\tga.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via invalid colors data in the header of a TGA or VST file.</Note>
    </Notes>
    <CVE>CVE-2017-11170</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11170.html</URL>
        <Description>CVE-2017-11170</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048110</URL>
        <Description>SUSE Bug 1048110</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048272</URL>
        <Description>SUSE Bug 1048272</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadJPEGImage function in coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-11448</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11448.html</URL>
        <Description>CVE-2017-11448</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049375</URL>
        <Description>SUSE Bug 1049375</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via JPEG data that is too short.</Note>
    </Notes>
    <CVE>CVE-2017-11450</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11450.html</URL>
        <Description>CVE-2017-11450</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049374</URL>
        <Description>SUSE Bug 1049374</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadDIBImage function in coders/dib.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-11528</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11528.html</URL>
        <Description>CVE-2017-11528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050119</URL>
        <Description>SUSE Bug 1050119</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadEPTImage function in coders/ept.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory consumption) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-11530</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11530.html</URL>
        <Description>CVE-2017-11530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050122</URL>
        <Description>SUSE Bug 1050122</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the WriteHISTOGRAMImage() function in coders/histogram.c.</Note>
    </Notes>
    <CVE>CVE-2017-11531</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11531.html</URL>
        <Description>CVE-2017-11531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050126</URL>
        <Description>SUSE Bug 1050126</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a heap-based buffer over-read in the WriteUILImage() function in coders/uil.c.</Note>
    </Notes>
    <CVE>CVE-2017-11533</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11533.html</URL>
        <Description>CVE-2017-11533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050132</URL>
        <Description>SUSE Bug 1050132</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Floating Point Exception (FPE) in the WritePALMImage() function in coders/palm.c, related to an incorrect bits-per-pixel calculation.</Note>
    </Notes>
    <CVE>CVE-2017-11537</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11537.html</URL>
        <Description>CVE-2017-11537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050048</URL>
        <Description>SUSE Bug 1050048</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GraphicsMagick 1.3.26 has a segmentation violation in the WriteMAPImage() function in coders/map.c when processing a non-colormapped image, a different vulnerability than CVE-2017-11642.</Note>
    </Notes>
    <CVE>CVE-2017-11638</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11638.html</URL>
        <Description>CVE-2017-11638</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050617</URL>
        <Description>SUSE Bug 1050617</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GraphicsMagick 1.3.26 has a NULL pointer dereference in the WriteMAPImage() function in coders/map.c when processing a non-colormapped image, a different vulnerability than CVE-2017-11638.</Note>
    </Notes>
    <CVE>CVE-2017-11642</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11642.html</URL>
        <Description>CVE-2017-11642</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050617</URL>
        <Description>SUSE Bug 1050617</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.6-5 has memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c.</Note>
    </Notes>
    <CVE>CVE-2017-12418</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12418.html</URL>
        <Description>CVE-2017-12418</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052207</URL>
        <Description>SUSE Bug 1052207</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ProcessMSLScript function in coders/msl.c in ImageMagick before 6.9.9-5 and 7.x before 7.0.6-5 allows remote attackers to cause a denial of service (memory leak) via a crafted file, related to the WriteMSLImage function.</Note>
    </Notes>
    <CVE>CVE-2017-12427</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12427.html</URL>
        <Description>CVE-2017-12427</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052248</URL>
        <Description>SUSE Bug 1052248</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadMIFFImage in coders/miff.c, which allows attackers to cause a denial of service.</Note>
    </Notes>
    <CVE>CVE-2017-12429</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12429.html</URL>
        <Description>CVE-2017-12429</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052251</URL>
        <Description>SUSE Bug 1052251</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadPCXImage in coders/pcx.c, which allows attackers to cause a denial of service.</Note>
    </Notes>
    <CVE>CVE-2017-12432</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12432.html</URL>
        <Description>CVE-2017-12432</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052254</URL>
        <Description>SUSE Bug 1052254</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.6-2, a memory leak vulnerability was found in the function ReadMVGImage in coders/mvg.c, which allows attackers to cause a denial of service, related to the function ReadSVGImage in svg.c.</Note>
    </Notes>
    <CVE>CVE-2017-12566</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12566.html</URL>
        <Description>CVE-2017-12566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052472</URL>
        <Description>SUSE Bug 1052472</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadPICTImage function in coders/pict.c in ImageMagick 7.0.6-3 allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-12654</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12654.html</URL>
        <Description>CVE-2017-12654</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052761</URL>
        <Description>SUSE Bug 1052761</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074119</URL>
        <Description>SUSE Bug 1074119</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteMAPImage in coders/map.c.</Note>
    </Notes>
    <CVE>CVE-2017-12663</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12663.html</URL>
        <Description>CVE-2017-12663</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052754</URL>
        <Description>SUSE Bug 1052754</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePALMImage in coders/palm.c.</Note>
    </Notes>
    <CVE>CVE-2017-12664</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12664.html</URL>
        <Description>CVE-2017-12664</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052750</URL>
        <Description>SUSE Bug 1052750</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePICTImage in coders/pict.c.</Note>
    </Notes>
    <CVE>CVE-2017-12665</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12665.html</URL>
        <Description>CVE-2017-12665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052747</URL>
        <Description>SUSE Bug 1052747</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePCXImage in coders/pcx.c.</Note>
    </Notes>
    <CVE>CVE-2017-12668</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12668.html</URL>
        <Description>CVE-2017-12668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052688</URL>
        <Description>SUSE Bug 1052688</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.6-2, a CPU exhaustion vulnerability was found in the function ReadPDBImage in coders/pdb.c, which allows attackers to cause a denial of service.</Note>
    </Notes>
    <CVE>CVE-2017-12674</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12674.html</URL>
        <Description>CVE-2017-12674</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052711</URL>
        <Description>SUSE Bug 1052711</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.6-6, a memory leak vulnerability was found in the function WritePCXImage in coders/pcx.c, which allows attackers to cause a denial of service via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-13058</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13058.html</URL>
        <Description>CVE-2017-13058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1055069</URL>
        <Description>SUSE Bug 1055069</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111072</URL>
        <Description>SUSE Bug 1111072</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117463</URL>
        <Description>SUSE Bug 1117463</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.6-8, a memory leak vulnerability was found in the function ReadMIFFImage in coders/miff.c, which allows attackers to cause a denial of service (memory consumption in NewLinkedList in MagickCore/linked-list.c) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-13131</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13131.html</URL>
        <Description>CVE-2017-13131</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1055229</URL>
        <Description>SUSE Bug 1055229</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.6-10, a NULL Pointer Dereference issue is present in the ReadCUTImage function in coders/cut.c that could allow an attacker to cause a Denial of Service (in the QueueAuthenticPixelCacheNexus function within the MagickCore/cache.c file) by submitting a malformed image file.</Note>
    </Notes>
    <CVE>CVE-2017-14060</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14060.html</URL>
        <Description>CVE-2017-14060</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056768</URL>
        <Description>SUSE Bug 1056768</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteMSLImage in coders/msl.c.</Note>
    </Notes>
    <CVE>CVE-2017-14139</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14139.html</URL>
        <Description>CVE-2017-14139</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057163</URL>
        <Description>SUSE Bug 1057163</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap-based buffer overflow in WritePCXImage in coders/pcx.c in ImageMagick 7.0.6-8 Q16 allows remote attackers to cause a denial of service or code execution via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-14224</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14224.html</URL>
        <Description>CVE-2017-14224</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1058009</URL>
        <Description>SUSE Bug 1058009</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.7-12 Q16, a large loop vulnerability was found in the function ExtractPostscript in coders/wpg.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted wpg image file that triggers a ReadWPGImage call.</Note>
    </Notes>
    <CVE>CVE-2017-17682</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-17682.html</URL>
        <Description>CVE-2017-17682</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1072898</URL>
        <Description>SUSE Bug 1072898</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadPICTImage in coders/pict.c, which allows attackers to cause a denial of service via a crafted PICT image file.</Note>
    </Notes>
    <CVE>CVE-2017-17885</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-17885.html</URL>
        <Description>CVE-2017-17885</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074119</URL>
        <Description>SUSE Bug 1074119</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.7-17 Q16 x86_64 has memory leaks in coders/msl.c, related to MSLPopImage and ProcessMSLScript, and associated with mishandling of MSLPushImage calls.</Note>
    </Notes>
    <CVE>CVE-2017-17934</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-17934.html</URL>
        <Description>CVE-2017-17934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074170</URL>
        <Description>SUSE Bug 1074170</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.7-1 Q16, a memory exhaustion vulnerability was found in the function ReadTIFFImage in coders/tiff.c, which allow remote attackers to cause a denial of service via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-18028</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18028.html</URL>
        <Description>CVE-2017-18028</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076182</URL>
        <Description>SUSE Bug 1076182</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082792</URL>
        <Description>SUSE Bug 1082792</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085236</URL>
        <Description>SUSE Bug 1085236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadICONImage function in icon.c:452 allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-9405</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9405.html</URL>
        <Description>CVE-2017-9405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042911</URL>
        <Description>SUSE Bug 1042911</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadPALMImage function in palm.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-9407</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9407.html</URL>
        <Description>CVE-2017-9407</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042824</URL>
        <Description>SUSE Bug 1042824</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.7-22 Q16 has memory leaks in the ReadDCMImage function in coders/dcm.c.</Note>
    </Notes>
    <CVE>CVE-2018-5357</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5357.html</URL>
        <Description>CVE-2018-5357</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075821</URL>
        <Description>SUSE Bug 1075821</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1095726</URL>
        <Description>SUSE Bug 1095726</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the ReadDCMImage function in coders/dcm.c in ImageMagick before 7.0.7-23, each redmap, greenmap, and bluemap variable can be overwritten by a new pointer. The previous pointer is lost, which leads to a memory leak. This allows remote attackers to cause a denial of service.</Note>
    </Notes>
    <CVE>CVE-2018-6405</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:ImageMagick-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-doc-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:ImageMagick-extra-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-6_Q16-3-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagick++-devel-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickCore-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-32bit-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libMagickWand-6_Q16-1-6.8.8.1-55.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-PerlMagick-6.8.8.1-55.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6405.html</URL>
        <Description>CVE-2018-6405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078433</URL>
        <Description>SUSE Bug 1078433</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1095726</URL>
        <Description>SUSE Bug 1095726</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
