<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">ImageMagick-7.1.0.9-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11564-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">ImageMagick-7.1.0.9-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the ImageMagick-7.1.0.9-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11564</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10805/</URL>
      <Description>SUSE CVE CVE-2018-10805 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-14434/</URL>
      <Description>SUSE CVE CVE-2018-14434 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16328/</URL>
      <Description>SUSE CVE CVE-2018-16328 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16641/</URL>
      <Description>SUSE CVE CVE-2018-16641 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-17966/</URL>
      <Description>SUSE CVE CVE-2018-17966 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11007/</URL>
      <Description>SUSE CVE CVE-2019-11007 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11506/</URL>
      <Description>SUSE CVE CVE-2019-11506 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-12976/</URL>
      <Description>SUSE CVE CVE-2019-12976 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-13134/</URL>
      <Description>SUSE CVE CVE-2019-13134 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-13296/</URL>
      <Description>SUSE CVE CVE-2019-13296 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-13301/</URL>
      <Description>SUSE CVE CVE-2019-13301 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-13306/</URL>
      <Description>SUSE CVE CVE-2019-13306 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-13311/</URL>
      <Description>SUSE CVE CVE-2019-13311 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15139/</URL>
      <Description>SUSE CVE CVE-2019-15139 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-16710/</URL>
      <Description>SUSE CVE CVE-2019-16710 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19949/</URL>
      <Description>SUSE CVE CVE-2019-19949 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-7398/</URL>
      <Description>SUSE CVE CVE-2019-7398 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25666/</URL>
      <Description>SUSE CVE CVE-2020-25666 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27750/</URL>
      <Description>SUSE CVE CVE-2020-27750 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27755/</URL>
      <Description>SUSE CVE CVE-2020-27755 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27760/</URL>
      <Description>SUSE CVE CVE-2020-27760 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27765/</URL>
      <Description>SUSE CVE CVE-2020-27765 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27770/</URL>
      <Description>SUSE CVE CVE-2020-27770 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27775/</URL>
      <Description>SUSE CVE CVE-2020-27775 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-20246/</URL>
      <Description>SUSE CVE CVE-2021-20246 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-20312/</URL>
      <Description>SUSE CVE CVE-2021-20312 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-7.1.0.9-1.1">
      <FullProductName ProductID="ImageMagick-7.1.0.9-1.1">ImageMagick-7.1.0.9-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-config-7-SUSE-7.1.0.9-1.1">
      <FullProductName ProductID="ImageMagick-config-7-SUSE-7.1.0.9-1.1">ImageMagick-config-7-SUSE-7.1.0.9-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-config-7-upstream-7.1.0.9-1.1">
      <FullProductName ProductID="ImageMagick-config-7-upstream-7.1.0.9-1.1">ImageMagick-config-7-upstream-7.1.0.9-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-devel-7.1.0.9-1.1">
      <FullProductName ProductID="ImageMagick-devel-7.1.0.9-1.1">ImageMagick-devel-7.1.0.9-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-devel-32bit-7.1.0.9-1.1">
      <FullProductName ProductID="ImageMagick-devel-32bit-7.1.0.9-1.1">ImageMagick-devel-32bit-7.1.0.9-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-doc-7.1.0.9-1.1">
      <FullProductName ProductID="ImageMagick-doc-7.1.0.9-1.1">ImageMagick-doc-7.1.0.9-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-extra-7.1.0.9-1.1">
      <FullProductName ProductID="ImageMagick-extra-7.1.0.9-1.1">ImageMagick-extra-7.1.0.9-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-7_Q16HDRI5-7.1.0.9-1.1">
      <FullProductName ProductID="libMagick++-7_Q16HDRI5-7.1.0.9-1.1">libMagick++-7_Q16HDRI5-7.1.0.9-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1">
      <FullProductName ProductID="libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1">libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-devel-7.1.0.9-1.1">
      <FullProductName ProductID="libMagick++-devel-7.1.0.9-1.1">libMagick++-devel-7.1.0.9-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-devel-32bit-7.1.0.9-1.1">
      <FullProductName ProductID="libMagick++-devel-32bit-7.1.0.9-1.1">libMagick++-devel-32bit-7.1.0.9-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore-7_Q16HDRI10-7.1.0.9-1.1">
      <FullProductName ProductID="libMagickCore-7_Q16HDRI10-7.1.0.9-1.1">libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1">
      <FullProductName ProductID="libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1">libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickWand-7_Q16HDRI10-7.1.0.9-1.1">
      <FullProductName ProductID="libMagickWand-7_Q16HDRI10-7.1.0.9-1.1">libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1">
      <FullProductName ProductID="libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1">libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="perl-PerlMagick-7.1.0.9-1.1">
      <FullProductName ProductID="perl-PerlMagick-7.1.0.9-1.1">perl-PerlMagick-7.1.0.9-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ImageMagick-7.1.0.9-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1">ImageMagick-7.1.0.9-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-config-7-SUSE-7.1.0.9-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1">ImageMagick-config-7-SUSE-7.1.0.9-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-config-7-upstream-7.1.0.9-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1">ImageMagick-config-7-upstream-7.1.0.9-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-7.1.0.9-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1">ImageMagick-devel-7.1.0.9-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-32bit-7.1.0.9-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1">ImageMagick-devel-32bit-7.1.0.9-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-doc-7.1.0.9-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1">ImageMagick-doc-7.1.0.9-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-extra-7.1.0.9-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1">ImageMagick-extra-7.1.0.9-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-7_Q16HDRI5-7.1.0.9-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1">libMagick++-7_Q16HDRI5-7.1.0.9-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1">libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-7.1.0.9-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1">libMagick++-devel-7.1.0.9-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-32bit-7.1.0.9-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1">libMagick++-devel-32bit-7.1.0.9-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore-7_Q16HDRI10-7.1.0.9-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1">libMagickCore-7_Q16HDRI10-7.1.0.9-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1">libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand-7_Q16HDRI10-7.1.0.9-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1">libMagickWand-7_Q16HDRI10-7.1.0.9-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1">libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="perl-PerlMagick-7.1.0.9-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1">perl-PerlMagick-7.1.0.9-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick version 7.0.7-28 contains a memory leak in ReadYCBCRImage in coders/ycbcr.c.</Note>
    </Notes>
    <CVE>CVE-2018-10805</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10805.html</URL>
        <Description>CVE-2018-10805</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1095812</URL>
        <Description>SUSE Bug 1095812</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.8-4 has a memory leak for a colormap in WriteMPCImage in coders/mpc.c.</Note>
    </Notes>
    <CVE>CVE-2018-14434</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14434.html</URL>
        <Description>CVE-2018-14434</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1102003</URL>
        <Description>SUSE Bug 1102003</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick before 7.0.8-8, a NULL pointer dereference exists in the CheckEventLogging function in MagickCore/log.c.</Note>
    </Notes>
    <CVE>CVE-2018-16328</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16328.html</URL>
        <Description>CVE-2018-16328</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106857</URL>
        <Description>SUSE Bug 1106857</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.8-6 has a memory leak vulnerability in the TIFFWritePhotoshopLayers function in coders/tiff.c.</Note>
    </Notes>
    <CVE>CVE-2018-16641</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16641.html</URL>
        <Description>CVE-2018-16641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107618</URL>
        <Description>SUSE Bug 1107618</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.7-28 has a memory leak vulnerability in WritePDBImage in coders/pdb.c.</Note>
    </Notes>
    <CVE>CVE-2018-17966</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17966.html</URL>
        <Description>CVE-2018-17966</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110746</URL>
        <Description>SUSE Bug 1110746</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117463</URL>
        <Description>SUSE Bug 1117463</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the ReadMNGImage function of coders/png.c, which allows attackers to cause a denial of service or information disclosure via an image colormap.</Note>
    </Notes>
    <CVE>CVE-2019-11007</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11007.html</URL>
        <Description>CVE-2019-11007</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132060</URL>
        <Description>SUSE Bug 1132060</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In GraphicsMagick from version 1.3.30 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WriteMATLABImage of coders/mat.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to ExportRedQuantumType in magick/export.c.</Note>
    </Notes>
    <CVE>CVE-2019-11506</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11506.html</URL>
        <Description>CVE-2019-11506</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1133498</URL>
        <Description>SUSE Bug 1133498</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.8-34 has a memory leak in the ReadPCLImage function in coders/pcl.c.</Note>
    </Notes>
    <CVE>CVE-2019-12976</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-12976.html</URL>
        <Description>CVE-2019-12976</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1140110</URL>
        <Description>SUSE Bug 1140110</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c.</Note>
    </Notes>
    <CVE>CVE-2019-13134</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-13134.html</URL>
        <Description>CVE-2019-13134</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1140102</URL>
        <Description>SUSE Bug 1140102</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.8-50 Q16 has direct memory leaks in AcquireMagickMemory because of an error in CLIListOperatorImages in MagickWand/operation.c for a NULL value.</Note>
    </Notes>
    <CVE>CVE-2019-13296</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-13296.html</URL>
        <Description>CVE-2019-13296</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1140665</URL>
        <Description>SUSE Bug 1140665</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error.</Note>
    </Notes>
    <CVE>CVE-2019-13301</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-13301.html</URL>
        <Description>CVE-2019-13301</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1140554</URL>
        <Description>SUSE Bug 1140554</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of off-by-one errors.</Note>
    </Notes>
    <CVE>CVE-2019-13306</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-13306.html</URL>
        <Description>CVE-2019-13306</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1140543</URL>
        <Description>SUSE Bug 1140543</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of a wand/mogrify.c error.</Note>
    </Notes>
    <CVE>CVE-2019-13311</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-13311.html</URL>
        <Description>CVE-2019-13311</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1140513</URL>
        <Description>SUSE Bug 1140513</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1140554</URL>
        <Description>SUSE Bug 1140554</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The XWD image (X Window System window dumping file) parsing component in ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (application crash resulting from an out-of-bounds Read) in ReadXWDImage in coders/xwd.c by crafting a corrupted XWD image file, a different vulnerability than CVE-2019-11472.</Note>
    </Notes>
    <CVE>CVE-2019-15139</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15139.html</URL>
        <Description>CVE-2019-15139</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146213</URL>
        <Description>SUSE Bug 1146213</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 7.0.8-35 has a memory leak in coders/dot.c, as demonstrated by AcquireMagickMemory in MagickCore/memory.c.</Note>
    </Notes>
    <CVE>CVE-2019-16710</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-16710.html</URL>
        <Description>CVE-2019-16710</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1151783</URL>
        <Description>SUSE Bug 1151783</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WritePNGImage of coders/png.c, related to Magick_png_write_raw_profile and LocaleNCompare.</Note>
    </Notes>
    <CVE>CVE-2019-19949</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19949.html</URL>
        <Description>CVE-2019-19949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160369</URL>
        <Description>SUSE Bug 1160369</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick before 7.0.8-25, a memory leak exists in WriteDIBImage in coders/dib.c.</Note>
    </Notes>
    <CVE>CVE-2019-7398</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-7398.html</URL>
        <Description>CVE-2019-7398</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124365</URL>
        <Description>SUSE Bug 1124365</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There are 4 places in HistogramCompare() in MagickCore/histogram.c where an integer overflow is possible during simple math calculations. This occurs in the rgb values and `count` value for a color. The patch uses casts to `ssize_t` type for these calculations, instead of `int`. This flaw could impact application reliability in the event that ImageMagick processes a crafted input file. This flaw affects ImageMagick versions prior to 7.0.9-0.</Note>
    </Notes>
    <CVE>CVE-2020-25666</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25666.html</URL>
        <Description>CVE-2020-25666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179212</URL>
        <Description>SUSE Bug 1179212</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in ImageMagick in MagickCore/colorspace-private.h and MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` and math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.</Note>
    </Notes>
    <CVE>CVE-2020-27750</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27750.html</URL>
        <Description>CVE-2020-27750</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179260</URL>
        <Description>SUSE Bug 1179260</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">in SetImageExtent() of /MagickCore/image.c, an incorrect image depth size can cause a memory leak because the code which checks for the proper image depth size does not reset the size in the event there is an invalid size. The patch resets the depth to a proper size before throwing an exception. The memory leak can be triggered by a crafted input file that is processed by ImageMagick and could cause an impact to application reliability, such as denial of service. This flaw affects ImageMagick versions prior to 7.0.9-0.</Note>
    </Notes>
    <CVE>CVE-2020-27755</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27755.html</URL>
        <Description>CVE-2020-27755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179345</URL>
        <Description>SUSE Bug 1179345</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In `GammaImage()` of /MagickCore/enhance.c, depending on the `gamma` value, it's possible to trigger a divide-by-zero condition when a crafted input file is processed by ImageMagick. This could lead to an impact to application availability. The patch uses the `PerceptibleReciprocal()` to prevent the divide-by-zero from occurring. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.</Note>
    </Notes>
    <CVE>CVE-2020-27760</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27760.html</URL>
        <Description>CVE-2020-27760</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179281</URL>
        <Description>SUSE Bug 1179281</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.</Note>
    </Notes>
    <CVE>CVE-2020-27765</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27765.html</URL>
        <Description>CVE-2020-27765</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179311</URL>
        <Description>SUSE Bug 1179311</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in SubstituteString(), causing potential impact to application availability. This could be triggered by a crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68.</Note>
    </Notes>
    <CVE>CVE-2020-27770</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27770.html</URL>
        <Description>CVE-2020-27770</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179343</URL>
        <Description>SUSE Bug 1179343</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.</Note>
    </Notes>
    <CVE>CVE-2020-27775</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27775.html</URL>
        <Description>CVE-2020-27775</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179338</URL>
        <Description>SUSE Bug 1179338</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.</Note>
    </Notes>
    <CVE>CVE-2021-20246</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-20246.html</URL>
        <Description>CVE-2021-20246</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182337</URL>
        <Description>SUSE Bug 1182337</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in ImageMagick in versions 7.0.11, where an integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.</Note>
    </Notes>
    <CVE>CVE-2021-20312</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-upstream-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.0.9-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.0.9-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-20312.html</URL>
        <Description>CVE-2021-20312</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184627</URL>
        <Description>SUSE Bug 1184627</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
