<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ImageMagick</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2017:1599-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-06-19T06:54:23Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-06-19T06:54:23Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-06-19T06:54:23Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ImageMagick</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for ImageMagick fixes the following issues:

This security issue was fixed:

- CVE-2017-7941: The ReadSGIImage function in sgi.c allowed remote attackers to consume an
  amount of available memory via a crafted file (bsc#1034876).
- CVE-2017-8351: ImageMagick, GraphicsMagick: denial of service (memory leak) via a crafted
  file (ReadPCDImage func in pcd.c) (bsc#1036986).
- CVE-2017-8352: denial of service (memory leak) via a crafted file (ReadXWDImage func in
  xwd.c) (bsc#1036987)
- CVE-2017-8349: denial of service (memory leak) via a crafted file (ReadSFWImage func in
  sfw.c) (bsc#1036984)
- CVE-2017-8350: denial of service (memory leak) via a crafted file (ReadJNGImage function in
  png.c) (bsc#1036985)
- CVE-2017-8345: denial of service (memory leak) via a crafted file (ReadMNGImage func in
  png.c) (bsc#1036980)
- CVE-2017-8346: denial of service (memory leak) via a crafted file (ReadDCMImage func in
  dcm.c) (bsc#1036981)
- CVE-2017-8353: denial of service (memory leak) via a crafted file (ReadPICTImage func in
  pict.c) (bsc#1036988)
- CVE-2017-8830: denial of service (memory leak) via a crafted file (ReadBMPImage func in
  bmp.c:1379) (bsc#1038000)
- CVE-2017-7606: denial of service (application crash) or possibly have unspecified other
  impact via a crafted image (bsc#1033091)
- CVE-2017-8765: memory leak vulnerability via a crafted ICON file (ReadICONImage in
  coders\icon.c) (bsc#1037527)
- CVE-2017-8355: denial of service (memory leak) via a crafted file (ReadMTVImage func in
  mtv.c) (bsc#1036990)
- CVE-2017-8344: denial of service (memory leak) via a crafted file (ReadPCXImage func in
  pcx.c) (bsc#1036978)
- CVE-2017-9098: uninitialized memory usage in the  ReadRLEImage RLE decoder 
  function coders/rle.c (bsc#1040025)
- CVE-2017-9141: Missing checks in the ReadDDSImage function in
  coders/dds.c could lead to a denial of service (assertion) (bsc#1040303)
- CVE-2017-9142: Missing checks in theReadOneJNGImage function in
  coders/png.c could lead to denial of service (assertion) (bsc#1040304)
- CVE-2017-9143: A possible denial of service attack via crafted .art
  file in ReadARTImage function in coders/art.c (bsc#1040306)
- CVE-2017-9144: A crafted RLE image can trigger a crash in coders/rle.c
  could lead to a denial of service (crash) (bsc#1040332)

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">sdksp4-ImageMagick-13152,slessp4-ImageMagick-13152</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      <Description>Link for SUSE-SU-2017:1599-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html</URL>
      <Description>E-Mail link for SUSE-SU-2017:1599-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1033091</URL>
      <Description>SUSE Bug 1033091</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1034870</URL>
      <Description>SUSE Bug 1034870</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1034872</URL>
      <Description>SUSE Bug 1034872</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1034876</URL>
      <Description>SUSE Bug 1034876</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1036976</URL>
      <Description>SUSE Bug 1036976</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1036978</URL>
      <Description>SUSE Bug 1036978</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1036980</URL>
      <Description>SUSE Bug 1036980</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1036981</URL>
      <Description>SUSE Bug 1036981</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1036983</URL>
      <Description>SUSE Bug 1036983</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1036984</URL>
      <Description>SUSE Bug 1036984</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1036985</URL>
      <Description>SUSE Bug 1036985</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1036986</URL>
      <Description>SUSE Bug 1036986</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1036987</URL>
      <Description>SUSE Bug 1036987</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1036988</URL>
      <Description>SUSE Bug 1036988</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1036989</URL>
      <Description>SUSE Bug 1036989</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1036990</URL>
      <Description>SUSE Bug 1036990</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1037527</URL>
      <Description>SUSE Bug 1037527</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1038000</URL>
      <Description>SUSE Bug 1038000</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1040025</URL>
      <Description>SUSE Bug 1040025</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1040303</URL>
      <Description>SUSE Bug 1040303</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1040304</URL>
      <Description>SUSE Bug 1040304</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1040306</URL>
      <Description>SUSE Bug 1040306</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1040332</URL>
      <Description>SUSE Bug 1040332</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9846/</URL>
      <Description>SUSE CVE CVE-2014-9846 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10050/</URL>
      <Description>SUSE CVE CVE-2016-10050 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7606/</URL>
      <Description>SUSE CVE CVE-2017-7606 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7941/</URL>
      <Description>SUSE CVE CVE-2017-7941 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7942/</URL>
      <Description>SUSE CVE CVE-2017-7942 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7943/</URL>
      <Description>SUSE CVE CVE-2017-7943 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8344/</URL>
      <Description>SUSE CVE CVE-2017-8344 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8345/</URL>
      <Description>SUSE CVE CVE-2017-8345 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8346/</URL>
      <Description>SUSE CVE CVE-2017-8346 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8348/</URL>
      <Description>SUSE CVE CVE-2017-8348 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8349/</URL>
      <Description>SUSE CVE CVE-2017-8349 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8350/</URL>
      <Description>SUSE CVE CVE-2017-8350 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8351/</URL>
      <Description>SUSE CVE CVE-2017-8351 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8352/</URL>
      <Description>SUSE CVE CVE-2017-8352 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8353/</URL>
      <Description>SUSE CVE CVE-2017-8353 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8354/</URL>
      <Description>SUSE CVE CVE-2017-8354 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8355/</URL>
      <Description>SUSE CVE CVE-2017-8355 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8357/</URL>
      <Description>SUSE CVE CVE-2017-8357 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8765/</URL>
      <Description>SUSE CVE CVE-2017-8765 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-8830/</URL>
      <Description>SUSE CVE CVE-2017-8830 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9098/</URL>
      <Description>SUSE CVE CVE-2017-9098 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9141/</URL>
      <Description>SUSE CVE CVE-2017-9141 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9142/</URL>
      <Description>SUSE CVE CVE-2017-9142 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9143/</URL>
      <Description>SUSE CVE CVE-2017-9143 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-9144/</URL>
      <Description>SUSE CVE CVE-2017-9144 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4" CPE="cpe:/o:suse:suse_sles:11:sp4">SUSE Linux Enterprise Server 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4" CPE="cpe:/o:suse:sles_sap:11:sp4">SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4" CPE="cpe:/a:suse:sle-sdk:11:sp4">SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-6.4.3.6-7.77.1">
      <FullProductName ProductID="ImageMagick-6.4.3.6-7.77.1">ImageMagick-6.4.3.6-7.77.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-devel-6.4.3.6-7.77.1">
      <FullProductName ProductID="ImageMagick-devel-6.4.3.6-7.77.1">ImageMagick-devel-6.4.3.6-7.77.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-devel-6.4.3.6-7.77.1">
      <FullProductName ProductID="libMagick++-devel-6.4.3.6-7.77.1">libMagick++-devel-6.4.3.6-7.77.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++1-6.4.3.6-7.77.1">
      <FullProductName ProductID="libMagick++1-6.4.3.6-7.77.1">libMagick++1-6.4.3.6-7.77.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickWand1-6.4.3.6-7.77.1">
      <FullProductName ProductID="libMagickWand1-6.4.3.6-7.77.1">libMagickWand1-6.4.3.6-7.77.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickWand1-32bit-6.4.3.6-7.77.1">
      <FullProductName ProductID="libMagickWand1-32bit-6.4.3.6-7.77.1">libMagickWand1-32bit-6.4.3.6-7.77.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="perl-PerlMagick-6.4.3.6-7.77.1">
      <FullProductName ProductID="perl-PerlMagick-6.4.3.6-7.77.1">perl-PerlMagick-6.4.3.6-7.77.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore1-6.4.3.6-7.77.1">
      <FullProductName ProductID="libMagickCore1-6.4.3.6-7.77.1">libMagickCore1-6.4.3.6-7.77.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore1-32bit-6.4.3.6-7.77.1">
      <FullProductName ProductID="libMagickCore1-32bit-6.4.3.6-7.77.1">libMagickCore1-32bit-6.4.3.6-7.77.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libMagickCore1-6.4.3.6-7.77.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1">libMagickCore1-6.4.3.6-7.77.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore1-32bit-6.4.3.6-7.77.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1">libMagickCore1-32bit-6.4.3.6-7.77.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore1-6.4.3.6-7.77.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1">libMagickCore1-6.4.3.6-7.77.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore1-32bit-6.4.3.6-7.77.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1">libMagickCore1-32bit-6.4.3.6-7.77.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-6.4.3.6-7.77.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1">ImageMagick-6.4.3.6-7.77.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-6.4.3.6-7.77.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1">ImageMagick-devel-6.4.3.6-7.77.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-6.4.3.6-7.77.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1">libMagick++-devel-6.4.3.6-7.77.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++1-6.4.3.6-7.77.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1">libMagick++1-6.4.3.6-7.77.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand1-6.4.3.6-7.77.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1">libMagickWand1-6.4.3.6-7.77.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand1-32bit-6.4.3.6-7.77.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1">libMagickWand1-32bit-6.4.3.6-7.77.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="perl-PerlMagick-6.4.3.6-7.77.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1">perl-PerlMagick-6.4.3.6-7.77.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.8.9.9 allows remote attackers to have unspecified impact.</Note>
    </Notes>
    <CVE>CVE-2014-9846</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9846.html</URL>
        <Description>CVE-2014-9846</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983521</URL>
        <Description>SUSE Bug 983521</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984408</URL>
        <Description>SUSE Bug 984408</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.9.4-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file.</Note>
    </Notes>
    <CVE>CVE-2016-10050</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10050.html</URL>
        <Description>CVE-2016-10050</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017312</URL>
        <Description>SUSE Bug 1017312</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">coders/rle.c in ImageMagick 7.0.5-4 has an "outside the range of representable values of type unsigned char" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.</Note>
    </Notes>
    <CVE>CVE-2017-7606</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7606.html</URL>
        <Description>CVE-2017-7606</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033091</URL>
        <Description>SUSE Bug 1033091</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadSGIImage function in sgi.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-7941</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7941.html</URL>
        <Description>CVE-2017-7941</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034876</URL>
        <Description>SUSE Bug 1034876</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126909</URL>
        <Description>SUSE Bug 1126909</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadAVSImage function in avs.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-7942</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7942.html</URL>
        <Description>CVE-2017-7942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034872</URL>
        <Description>SUSE Bug 1034872</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadSVGImage function in svg.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-7943</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7943.html</URL>
        <Description>CVE-2017-7943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034870</URL>
        <Description>SUSE Bug 1034870</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036985</URL>
        <Description>SUSE Bug 1036985</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadPCXImage function in pcx.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8344</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8344.html</URL>
        <Description>CVE-2017-8344</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036978</URL>
        <Description>SUSE Bug 1036978</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadMNGImage function in png.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8345</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8345.html</URL>
        <Description>CVE-2017-8345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036980</URL>
        <Description>SUSE Bug 1036980</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadDCMImage function in dcm.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8346</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8346.html</URL>
        <Description>CVE-2017-8346</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036981</URL>
        <Description>SUSE Bug 1036981</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadMATImage function in mat.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8348</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8348.html</URL>
        <Description>CVE-2017-8348</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036983</URL>
        <Description>SUSE Bug 1036983</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadSFWImage function in sfw.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8349</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8349.html</URL>
        <Description>CVE-2017-8349</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036984</URL>
        <Description>SUSE Bug 1036984</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadJNGImage function in png.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8350</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8350.html</URL>
        <Description>CVE-2017-8350</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036985</URL>
        <Description>SUSE Bug 1036985</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053919</URL>
        <Description>SUSE Bug 1053919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126909</URL>
        <Description>SUSE Bug 1126909</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadPCDImage function in pcd.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8351</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8351.html</URL>
        <Description>CVE-2017-8351</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036986</URL>
        <Description>SUSE Bug 1036986</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126909</URL>
        <Description>SUSE Bug 1126909</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadXWDImage function in xwd.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8352</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8352.html</URL>
        <Description>CVE-2017-8352</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036987</URL>
        <Description>SUSE Bug 1036987</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadPICTImage function in pict.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8353</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8353.html</URL>
        <Description>CVE-2017-8353</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036988</URL>
        <Description>SUSE Bug 1036988</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1055010</URL>
        <Description>SUSE Bug 1055010</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126909</URL>
        <Description>SUSE Bug 1126909</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadBMPImage function in bmp.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8354</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8354.html</URL>
        <Description>CVE-2017-8354</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036989</URL>
        <Description>SUSE Bug 1036989</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadMTVImage function in mtv.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8355</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8355.html</URL>
        <Description>CVE-2017-8355</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036990</URL>
        <Description>SUSE Bug 1036990</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126909</URL>
        <Description>SUSE Bug 1126909</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadEPTImage function in ept.c allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8357</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8357.html</URL>
        <Description>CVE-2017-8357</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036976</URL>
        <Description>SUSE Bug 1036976</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The function named ReadICONImage in coders\icon.c in ImageMagick 7.0.5-5 has a memory leak vulnerability which can cause memory exhaustion via a crafted ICON file.</Note>
    </Notes>
    <CVE>CVE-2017-8765</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8765.html</URL>
        <Description>CVE-2017-8765</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1037527</URL>
        <Description>SUSE Bug 1037527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053919</URL>
        <Description>SUSE Bug 1053919</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-6, the ReadBMPImage function in bmp.c:1379 allows attackers to cause a denial of service (memory leak) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-8830</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-8830.html</URL>
        <Description>CVE-2017-8830</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038000</URL>
        <Description>SUSE Bug 1038000</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053919</URL>
        <Description>SUSE Bug 1053919</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick before 7.0.5-2 and GraphicsMagick before 1.3.24 use uninitialized memory in the RLE decoder, allowing an attacker to leak sensitive information from process memory space, as demonstrated by remote attacks against ImageMagick code in a long-running server process that converts image data on behalf of multiple users. This is caused by a missing initialization step in the ReadRLEImage function in coders/rle.c.</Note>
    </Notes>
    <CVE>CVE-2017-9098</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9098.html</URL>
        <Description>CVE-2017-9098</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1040025</URL>
        <Description>SUSE Bug 1040025</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053919</URL>
        <Description>SUSE Bug 1053919</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the ResetImageProfileIterator function in MagickCore/profile.c because of missing checks in the ReadDDSImage function in coders/dds.c.</Note>
    </Notes>
    <CVE>CVE-2017-9141</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9141.html</URL>
        <Description>CVE-2017-9141</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1040303</URL>
        <Description>SUSE Bug 1040303</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053919</URL>
        <Description>SUSE Bug 1053919</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the WriteBlob function in MagickCore/blob.c because of missing checks in the ReadOneJNGImage function in coders/png.c.</Note>
    </Notes>
    <CVE>CVE-2017-9142</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9142.html</URL>
        <Description>CVE-2017-9142</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036985</URL>
        <Description>SUSE Bug 1036985</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1040304</URL>
        <Description>SUSE Bug 1040304</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, the ReadARTImage function in coders/art.c allows attackers to cause a denial of service (memory leak) via a crafted .art file.</Note>
    </Notes>
    <CVE>CVE-2017-9143</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9143.html</URL>
        <Description>CVE-2017-9143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1040306</URL>
        <Description>SUSE Bug 1040306</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053919</URL>
        <Description>SUSE Bug 1053919</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.5-5, a crafted RLE image can trigger a crash because of incorrect EOF handling in coders/rle.c.</Note>
    </Notes>
    <CVE>CVE-2017-9144</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:libMagickCore1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:ImageMagick-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++-devel-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagick++1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-32bit-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:libMagickWand1-6.4.3.6-7.77.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:perl-PerlMagick-6.4.3.6-7.77.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171599-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-9144.html</URL>
        <Description>CVE-2017-9144</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1040332</URL>
        <Description>SUSE Bug 1040332</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048936</URL>
        <Description>SUSE Bug 1048936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053919</URL>
        <Description>SUSE Bug 1053919</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
