<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">ImageMagick-7.1.2.17-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2026:10386-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-03-18T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-03-18T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-03-18T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">ImageMagick-7.1.2.17-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the ImageMagick-7.1.2.17-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2026-10386</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-28493/</URL>
      <Description>SUSE CVE CVE-2026-28493 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-28494/</URL>
      <Description>SUSE CVE CVE-2026-28494 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-28686/</URL>
      <Description>SUSE CVE CVE-2026-28686 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-28687/</URL>
      <Description>SUSE CVE CVE-2026-28687 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-28688/</URL>
      <Description>SUSE CVE CVE-2026-28688 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-28689/</URL>
      <Description>SUSE CVE CVE-2026-28689 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-28690/</URL>
      <Description>SUSE CVE CVE-2026-28690 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-28691/</URL>
      <Description>SUSE CVE CVE-2026-28691 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-28692/</URL>
      <Description>SUSE CVE CVE-2026-28692 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-28693/</URL>
      <Description>SUSE CVE CVE-2026-28693 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-30883/</URL>
      <Description>SUSE CVE CVE-2026-30883 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-30929/</URL>
      <Description>SUSE CVE CVE-2026-30929 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-30931/</URL>
      <Description>SUSE CVE CVE-2026-30931 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-30935/</URL>
      <Description>SUSE CVE CVE-2026-30935 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-30936/</URL>
      <Description>SUSE CVE CVE-2026-30936 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-30937/</URL>
      <Description>SUSE CVE CVE-2026-30937 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-31853/</URL>
      <Description>SUSE CVE CVE-2026-31853 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-32259/</URL>
      <Description>SUSE CVE CVE-2026-32259 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-7.1.2.17-1.1">
      <FullProductName ProductID="ImageMagick-7.1.2.17-1.1">ImageMagick-7.1.2.17-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-config-7-SUSE-7.1.2.17-1.1">
      <FullProductName ProductID="ImageMagick-config-7-SUSE-7.1.2.17-1.1">ImageMagick-config-7-SUSE-7.1.2.17-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-devel-7.1.2.17-1.1">
      <FullProductName ProductID="ImageMagick-devel-7.1.2.17-1.1">ImageMagick-devel-7.1.2.17-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-devel-32bit-7.1.2.17-1.1">
      <FullProductName ProductID="ImageMagick-devel-32bit-7.1.2.17-1.1">ImageMagick-devel-32bit-7.1.2.17-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-doc-7.1.2.17-1.1">
      <FullProductName ProductID="ImageMagick-doc-7.1.2.17-1.1">ImageMagick-doc-7.1.2.17-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-extra-7.1.2.17-1.1">
      <FullProductName ProductID="ImageMagick-extra-7.1.2.17-1.1">ImageMagick-extra-7.1.2.17-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-7_Q16HDRI5-7.1.2.17-1.1">
      <FullProductName ProductID="libMagick++-7_Q16HDRI5-7.1.2.17-1.1">libMagick++-7_Q16HDRI5-7.1.2.17-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1">
      <FullProductName ProductID="libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1">libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-devel-7.1.2.17-1.1">
      <FullProductName ProductID="libMagick++-devel-7.1.2.17-1.1">libMagick++-devel-7.1.2.17-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-devel-32bit-7.1.2.17-1.1">
      <FullProductName ProductID="libMagick++-devel-32bit-7.1.2.17-1.1">libMagick++-devel-32bit-7.1.2.17-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore-7_Q16HDRI10-7.1.2.17-1.1">
      <FullProductName ProductID="libMagickCore-7_Q16HDRI10-7.1.2.17-1.1">libMagickCore-7_Q16HDRI10-7.1.2.17-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1">
      <FullProductName ProductID="libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1">libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickWand-7_Q16HDRI10-7.1.2.17-1.1">
      <FullProductName ProductID="libMagickWand-7_Q16HDRI10-7.1.2.17-1.1">libMagickWand-7_Q16HDRI10-7.1.2.17-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1">
      <FullProductName ProductID="libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1">libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="perl-PerlMagick-7.1.2.17-1.1">
      <FullProductName ProductID="perl-PerlMagick-7.1.2.17-1.1">perl-PerlMagick-7.1.2.17-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ImageMagick-7.1.2.17-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ImageMagick-7.1.2.17-1.1">ImageMagick-7.1.2.17-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-config-7-SUSE-7.1.2.17-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.17-1.1">ImageMagick-config-7-SUSE-7.1.2.17-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-7.1.2.17-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ImageMagick-devel-7.1.2.17-1.1">ImageMagick-devel-7.1.2.17-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-32bit-7.1.2.17-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.17-1.1">ImageMagick-devel-32bit-7.1.2.17-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-doc-7.1.2.17-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ImageMagick-doc-7.1.2.17-1.1">ImageMagick-doc-7.1.2.17-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-extra-7.1.2.17-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ImageMagick-extra-7.1.2.17-1.1">ImageMagick-extra-7.1.2.17-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-7_Q16HDRI5-7.1.2.17-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.17-1.1">libMagick++-7_Q16HDRI5-7.1.2.17-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1">libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-7.1.2.17-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libMagick++-devel-7.1.2.17-1.1">libMagick++-devel-7.1.2.17-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-32bit-7.1.2.17-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.17-1.1">libMagick++-devel-32bit-7.1.2.17-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore-7_Q16HDRI10-7.1.2.17-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.17-1.1">libMagickCore-7_Q16HDRI10-7.1.2.17-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1">libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand-7_Q16HDRI10-7.1.2.17-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.17-1.1">libMagickWand-7_Q16HDRI10-7.1.2.17-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1">libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="perl-PerlMagick-7.1.2.17-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:perl-PerlMagick-7.1.2.17-1.1">perl-PerlMagick-7.1.2.17-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, an integer overflow vulnerability exists in the SIXEL decoer. The vulnerability allows an attacker to perform an out of bounds via a specially crafted image. This vulnerability is fixed in 7.1.2-16.</Note>
    </Notes>
    <CVE>CVE-2026-28493</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.2.17-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-28493.html</URL>
        <Description>CVE-2026-28493</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259446</URL>
        <Description>SUSE Bug 1259446</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow exists in ImageMagick's morphology kernel parsing functions. User-controlled kernel strings exceeding a buffer are copied into fixed-size stack buffers via memcpy without bounds checking, resulting in stack corruption. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.</Note>
    </Notes>
    <CVE>CVE-2026-28494</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.2.17-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-28494.html</URL>
        <Description>CVE-2026-28494</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259447</URL>
        <Description>SUSE Bug 1259447</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, A heap-buffer-overflow vulnerability exists in the PCL encode due to an undersized output buffer allocation. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.</Note>
    </Notes>
    <CVE>CVE-2026-28686</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.2.17-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-28686.html</URL>
        <Description>CVE-2026-28686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259448</URL>
        <Description>SUSE Bug 1259448</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap use-after-free vulnerability in ImageMagick's MSL decoder allows an attacker to trigger access to freed memory by crafting an MSL file. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.</Note>
    </Notes>
    <CVE>CVE-2026-28687</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.2.17-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-28687.html</URL>
        <Description>CVE-2026-28687</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259450</URL>
        <Description>SUSE Bug 1259450</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap-use-after-free vulnerability exists in the MSL encoder, where a cloned image is destroyed twice. The MSL coder does not support writing MSL so the write capability has been removed. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.</Note>
    </Notes>
    <CVE>CVE-2026-28688</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.2.17-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-28688.html</URL>
        <Description>CVE-2026-28688</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259451</URL>
        <Description>SUSE Bug 1259451</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, domain="path" authorization is checked before final file open/use. A symlink swap between check-time and use-time bypasses policy-denied read/write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.</Note>
    </Notes>
    <CVE>CVE-2026-28689</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.2.17-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-28689.html</URL>
        <Description>CVE-2026-28689</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259452</URL>
        <Description>SUSE Bug 1259452</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow vulnerability exists in the MNG encoder. There is a bounds checks missing that could corrupting the stack with attacker-controlled data. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.</Note>
    </Notes>
    <CVE>CVE-2026-28690</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.2.17-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-28690.html</URL>
        <Description>CVE-2026-28690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259456</URL>
        <Description>SUSE Bug 1259456</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an uninitialized pointer dereference vulnerability exists in the JBIG decoder due to a missing check. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.</Note>
    </Notes>
    <CVE>CVE-2026-28691</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.2.17-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-28691.html</URL>
        <Description>CVE-2026-28691</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259455</URL>
        <Description>SUSE Bug 1259455</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MAT decoder uses 32-bit arithmetic due to incorrect parenthesization resulting in a heap over-read. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.</Note>
    </Notes>
    <CVE>CVE-2026-28692</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.2.17-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-28692.html</URL>
        <Description>CVE-2026-28692</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259457</URL>
        <Description>SUSE Bug 1259457</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an integer overflow in DIB coder can result in out of bounds read or write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.</Note>
    </Notes>
    <CVE>CVE-2026-28693</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.2.17-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-28693.html</URL>
        <Description>CVE-2026-28693</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259466</URL>
        <Description>SUSE Bug 1259466</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an extremely large image profile could result in a heap overflow when encoding a PNG image. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.</Note>
    </Notes>
    <CVE>CVE-2026-30883</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.2.17-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-30883.html</URL>
        <Description>CVE-2026-30883</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259467</URL>
        <Description>SUSE Bug 1259467</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffer and corrupt the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.</Note>
    </Notes>
    <CVE>CVE-2026-30929</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.2.17-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-30929.html</URL>
        <Description>CVE-2026-30929</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259468</URL>
        <Description>SUSE Bug 1259468</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, a heap-based buffer overflow in the UHDR encoder can happen due to truncation of a value and it would allow an out of bounds write. This vulnerability is fixed in 7.1.2-16.</Note>
    </Notes>
    <CVE>CVE-2026-30931</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.2.17-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-30931.html</URL>
        <Description>CVE-2026-30931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259469</URL>
        <Description>SUSE Bug 1259469</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, BilateralBlurImage contains a heap buffer over-read caused by an incorrect conversion. When processing a crafted image with the -bilateral-blur operation an out of bounds read can occur. This vulnerability is fixed in 7.1.2-16.</Note>
    </Notes>
    <CVE>CVE-2026-30935</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.2.17-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-30935.html</URL>
        <Description>CVE-2026-30935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259497</URL>
        <Description>SUSE Bug 1259497</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a crafted image could cause an out of bounds heap write inside the WaveletDenoiseImage method. When processing a crafted image with the -wavelet-denoise operation an out of bounds write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.</Note>
    </Notes>
    <CVE>CVE-2026-30936</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.2.17-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-30936.html</URL>
        <Description>CVE-2026-30936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259464</URL>
        <Description>SUSE Bug 1259464</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a 32-bit unsigned integer overflow in the XWD (X Windows) encoder can cause an undersized heap buffer allocation. When writing a extremely large image an out of bounds heap write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.</Note>
    </Notes>
    <CVE>CVE-2026-30937</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.2.17-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-30937.html</URL>
        <Description>CVE-2026-30937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259463</URL>
        <Description>SUSE Bug 1259463</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-16 and 6.9.13-41, an overflow on 32-bit systems can cause a crash in the SFW decoder when processing extremely large images. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.</Note>
    </Notes>
    <CVE>CVE-2026-31853</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.2.17-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-31853.html</URL>
        <Description>CVE-2026-31853</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259528</URL>
        <Description>SUSE Bug 1259528</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-16 and 6.9.13-41, when a memory allocation fails in the sixel encoder it would be possible to write past the end of a buffer on the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.</Note>
    </Notes>
    <CVE>CVE-2026-32259</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ImageMagick-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-doc-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ImageMagick-extra-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagick++-devel-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.17-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:perl-PerlMagick-7.1.2.17-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-32259.html</URL>
        <Description>CVE-2026-32259</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1259612</URL>
        <Description>SUSE Bug 1259612</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
