<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ImageMagick</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:1833-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-07-20T06:58:32Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-07-20T06:58:32Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-07-20T06:58:32Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ImageMagick</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">ImageMagick was updated to fix 66 security issues.

These security issues were fixed:
- CVE-2014-9810: SEGV in dpx file handler. (bsc#983803).
- CVE-2014-9811: Crash in xwd file handler (bsc#984032).
- CVE-2014-9812: NULL pointer dereference in ps file handling (bsc#984137).
- CVE-2014-9813: Crash on corrupted viff file (bsc#984035).
- CVE-2014-9814: NULL pointer dereference in wpg file handling (bsc#984193).
- CVE-2014-9815: Crash on corrupted wpg file (bsc#984372).
- CVE-2014-9816: Out of bound access in viff image (bsc#984398).
- CVE-2014-9817: Heap buffer overflow in pdb file handling (bsc#984400).
- CVE-2014-9818: Out of bound access on malformed sun file (bsc#984181).
- CVE-2014-9819: Heap overflow in palm files (bsc#984142).
- CVE-2014-9830: Handling of corrupted sun file (bsc#984135).
- CVE-2014-9831: Handling of corrupted wpg file (bsc#984375).
- CVE-2014-9850: Incorrect thread limit logic (bsc#984149).
- CVE-2014-9851: Crash when parsing resource block (bsc#984160).
- CVE-2014-9852: Incorrect usage of object after it has been destroyed (bsc#984191).
- CVE-2014-9853: Memory leak in rle file handling (bsc#984408).
- CVE-2015-8902: PDB file DoS (CPU consumption) (bsc#983253).
- CVE-2015-8903: Denial of service (cpu) in vicar (bsc#983259).
- CVE-2015-8900: HDR file DoS (endless loop) (bsc#983232).
- CVE-2015-8901: MIFF file DoS (endless loop) (bsc#983234).
- CVE-2016-5688: Various invalid memory reads in ImageMagick WPG (bsc#985442).
- CVE-2014-9834: Heap overflow in pict file (bsc#984436).
- CVE-2014-9806: Prevent leak of file descriptor due to corrupted file. (bsc#983774).
- CVE-2016-5687: Out of bounds read in DDS coder (bsc#985448).
- CVE-2014-9838: Out of memory crash in magick/cache.c (bsc#984370).
- CVE-2014-9854: Filling memory during identification of TIFF image (bsc#984184).
- CVE-2015-8898: Prevent null pointer access in magick/constitute.c (bsc#983746).
- CVE-2014-9833: Heap overflow in psd file (bsc#984406).
- CVE-2015-8894: Double free in coders/tga.c:221 (bsc#983523).
- CVE-2015-8895: Integer and Buffer overflow in coders/icon.c (bsc#983527).
- CVE-2015-8896: Double free / integer truncation issue in coders/pict.c:2000 (bsc#983533).
- CVE-2015-8897: Out of bounds error in SpliceImage (bsc#983739).
- CVE-2016-5690: Bad foor loop in  DCM coder (bsc#985451).
- CVE-2016-5691: Checks for pixel.red/green/blue in dcm coder (bsc#985456).
- CVE-2014-9836: Crash in xpm file handling (bsc#984023).
- CVE-2014-9808: SEGV due to corrupted dpc images. (bsc#983796).
- CVE-2014-9821: Avoid heap overflow in pnm files. (bsc#984014).
- CVE-2014-9820: Heap overflow in xpm files (bsc#984150).
- CVE-2014-9823: Heap overflow in palm file (bsc#984401).
- CVE-2014-9822: Heap overflow in quantum file (bsc#984187).
- CVE-2014-9825: Heap overflow in corrupted psd file (bsc#984427).
- CVE-2014-9824: Heap overflow in psd file (bsc#984185).
- CVE-2014-9809: SEGV due to corrupted xwd images. (bsc#983799).
- CVE-2014-9826: Incorrect error handling in sun files (bsc#984186).
- CVE-2014-9843: Incorrect boundary checks in DecodePSDPixels (bsc#984179).
- CVE-2014-9842: Memory leak in psd handling (bsc#984374).
- CVE-2014-9841: Throwing of exceptions in psd handling (bsc#984172).
- CVE-2014-9840: Out of bound access in palm file (bsc#984433).
- CVE-2014-9847: Incorrect handling of 'previous' image in the JNG decoder (bsc#984144).
- CVE-2014-9846: Added checks to prevent overflow in rle file. (bsc#983521).
- CVE-2014-9845: Crash due to corrupted dib file (bsc#984394).
- CVE-2014-9844: Out of bound issue in rle file (bsc#984373).
- CVE-2014-9849: Crash in png coder (bsc#984018).
- CVE-2014-9848: Memory leak in quantum management (bsc#984404).
- CVE-2014-9807: Double free in pdb coder. (bsc#983794).
- CVE-2014-9829: Out of bound access in sun file (bsc#984409).
- CVE-2014-9832: Heap overflow in pcx file (bsc#984183).
- CVE-2014-9805: SEGV due to a corrupted pnm file. (bsc#983752).
- CVE-2016-4564: The DrawImage function in MagickCore/draw.c in ImageMagick made an incorrect function call in attempting to locate the next token, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983308).
- CVE-2016-4563: The TraceStrokePolygon function in MagickCore/draw.c in ImageMagick mishandled the relationship between the BezierQuantum value and certain strokes data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983305).
- CVE-2016-4562: The DrawDashPolygon function in MagickCore/draw.c in ImageMagick mishandled calculations of certain vertices integer data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983292).
- CVE-2014-9839: Theoretical out of bound access in magick/colormap-private.h (bsc#984379).
- CVE-2016-5689: NULL ptr dereference in dcm coder (bsc#985460).
- CVE-2014-9837: Additional PNM sanity checks (bsc#984166).
- CVE-2014-9835: Heap overflow in wpf file (bsc#984145).
- CVE-2014-9828: Corrupted (too many colors) psd file (bsc#984028).
- CVE-2016-5841: Integer overflow could have read to RCE (bnc#986609).
- CVE-2016-5842: Out-of-bounds read in MagickCore/property.c:1396 could have lead to memory leak (bnc#986608).

This update was imported from the SUSE:SLE-12:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:1833-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-6.8.8.1-15.1">
      <FullProductName ProductID="ImageMagick-6.8.8.1-15.1">ImageMagick-6.8.8.1-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-devel-6.8.8.1-15.1">
      <FullProductName ProductID="ImageMagick-devel-6.8.8.1-15.1">ImageMagick-devel-6.8.8.1-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-devel-32bit-6.8.8.1-15.1">
      <FullProductName ProductID="ImageMagick-devel-32bit-6.8.8.1-15.1">ImageMagick-devel-32bit-6.8.8.1-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-doc-6.8.8.1-15.1">
      <FullProductName ProductID="ImageMagick-doc-6.8.8.1-15.1">ImageMagick-doc-6.8.8.1-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ImageMagick-extra-6.8.8.1-15.1">
      <FullProductName ProductID="ImageMagick-extra-6.8.8.1-15.1">ImageMagick-extra-6.8.8.1-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-6_Q16-3-6.8.8.1-15.1">
      <FullProductName ProductID="libMagick++-6_Q16-3-6.8.8.1-15.1">libMagick++-6_Q16-3-6.8.8.1-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1">
      <FullProductName ProductID="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1">libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-devel-6.8.8.1-15.1">
      <FullProductName ProductID="libMagick++-devel-6.8.8.1-15.1">libMagick++-devel-6.8.8.1-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagick++-devel-32bit-6.8.8.1-15.1">
      <FullProductName ProductID="libMagick++-devel-32bit-6.8.8.1-15.1">libMagick++-devel-32bit-6.8.8.1-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore-6_Q16-1-6.8.8.1-15.1">
      <FullProductName ProductID="libMagickCore-6_Q16-1-6.8.8.1-15.1">libMagickCore-6_Q16-1-6.8.8.1-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1">
      <FullProductName ProductID="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1">libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickWand-6_Q16-1-6.8.8.1-15.1">
      <FullProductName ProductID="libMagickWand-6_Q16-1-6.8.8.1-15.1">libMagickWand-6_Q16-1-6.8.8.1-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1">
      <FullProductName ProductID="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1">libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="perl-PerlMagick-6.8.8.1-15.1">
      <FullProductName ProductID="perl-PerlMagick-6.8.8.1-15.1">perl-PerlMagick-6.8.8.1-15.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ImageMagick-6.8.8.1-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1">ImageMagick-6.8.8.1-15.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-6.8.8.1-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1">ImageMagick-devel-6.8.8.1-15.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-devel-32bit-6.8.8.1-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1">ImageMagick-devel-32bit-6.8.8.1-15.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-doc-6.8.8.1-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1">ImageMagick-doc-6.8.8.1-15.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ImageMagick-extra-6.8.8.1-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1">ImageMagick-extra-6.8.8.1-15.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-6_Q16-3-6.8.8.1-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1">libMagick++-6_Q16-3-6.8.8.1-15.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-6_Q16-3-32bit-6.8.8.1-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1">libMagick++-6_Q16-3-32bit-6.8.8.1-15.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-6.8.8.1-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1">libMagick++-devel-6.8.8.1-15.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagick++-devel-32bit-6.8.8.1-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1">libMagick++-devel-32bit-6.8.8.1-15.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore-6_Q16-1-6.8.8.1-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1">libMagickCore-6_Q16-1-6.8.8.1-15.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1">libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand-6_Q16-1-6.8.8.1-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1">libMagickWand-6_Q16-1-6.8.8.1-15.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1">libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="perl-PerlMagick-6.8.8.1-15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1">perl-PerlMagick-6.8.8.1-15.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted pnm file.</Note>
    </Notes>
    <CVE>CVE-2014-9805</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9805.html</URL>
        <Description>CVE-2014-9805</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983752</URL>
        <Description>SUSE Bug 983752</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick allows remote attackers to cause a denial of service (file descriptor consumption) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2014-9806</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9806.html</URL>
        <Description>CVE-2014-9806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983774</URL>
        <Description>SUSE Bug 983774</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pdb coder in ImageMagick allows remote attackers to cause a denial of service (double free) via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2014-9807</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9807.html</URL>
        <Description>CVE-2014-9807</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983794</URL>
        <Description>SUSE Bug 983794</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted dpc image.</Note>
    </Notes>
    <CVE>CVE-2014-9808</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9808.html</URL>
        <Description>CVE-2014-9808</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983796</URL>
        <Description>SUSE Bug 983796</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted xwd image.</Note>
    </Notes>
    <CVE>CVE-2014-9809</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9809.html</URL>
        <Description>CVE-2014-9809</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983799</URL>
        <Description>SUSE Bug 983799</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dpx file handler in ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a malformed dpx file.</Note>
    </Notes>
    <CVE>CVE-2014-9810</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9810.html</URL>
        <Description>CVE-2014-9810</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983803</URL>
        <Description>SUSE Bug 983803</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xwd file handler in ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a malformed xwd file.</Note>
    </Notes>
    <CVE>CVE-2014-9811</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9811.html</URL>
        <Description>CVE-2014-9811</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984032</URL>
        <Description>SUSE Bug 984032</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted ps file.</Note>
    </Notes>
    <CVE>CVE-2014-9812</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9812.html</URL>
        <Description>CVE-2014-9812</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984137</URL>
        <Description>SUSE Bug 984137</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick allows remote attackers to cause a denial of service (application crash) via a crafted viff file.</Note>
    </Notes>
    <CVE>CVE-2014-9813</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9813.html</URL>
        <Description>CVE-2014-9813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984035</URL>
        <Description>SUSE Bug 984035</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984398</URL>
        <Description>SUSE Bug 984398</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted wpg file.</Note>
    </Notes>
    <CVE>CVE-2014-9814</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9814.html</URL>
        <Description>CVE-2014-9814</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984193</URL>
        <Description>SUSE Bug 984193</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984372</URL>
        <Description>SUSE Bug 984372</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick allows remote attackers to cause a denial of service (application crash) via a crafted wpg file.</Note>
    </Notes>
    <CVE>CVE-2014-9815</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9815.html</URL>
        <Description>CVE-2014-9815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984372</URL>
        <Description>SUSE Bug 984372</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted viff file.</Note>
    </Notes>
    <CVE>CVE-2014-9816</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9816.html</URL>
        <Description>CVE-2014-9816</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984035</URL>
        <Description>SUSE Bug 984035</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984398</URL>
        <Description>SUSE Bug 984398</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted pdb file.</Note>
    </Notes>
    <CVE>CVE-2014-9817</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9817.html</URL>
        <Description>CVE-2014-9817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984400</URL>
        <Description>SUSE Bug 984400</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a malformed sun file.</Note>
    </Notes>
    <CVE>CVE-2014-9818</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9818.html</URL>
        <Description>CVE-2014-9818</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1000690</URL>
        <Description>SUSE Bug 1000690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984181</URL>
        <Description>SUSE Bug 984181</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984186</URL>
        <Description>SUSE Bug 984186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984409</URL>
        <Description>SUSE Bug 984409</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted palm file, a different vulnerability than CVE-2014-9823.</Note>
    </Notes>
    <CVE>CVE-2014-9819</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9819.html</URL>
        <Description>CVE-2014-9819</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984142</URL>
        <Description>SUSE Bug 984142</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted pnm file.</Note>
    </Notes>
    <CVE>CVE-2014-9820</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9820.html</URL>
        <Description>CVE-2014-9820</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984150</URL>
        <Description>SUSE Bug 984150</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted xpm file.</Note>
    </Notes>
    <CVE>CVE-2014-9821</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9821.html</URL>
        <Description>CVE-2014-9821</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984014</URL>
        <Description>SUSE Bug 984014</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted quantum file.</Note>
    </Notes>
    <CVE>CVE-2014-9822</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9822.html</URL>
        <Description>CVE-2014-9822</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984187</URL>
        <Description>SUSE Bug 984187</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted palm file, a different vulnerability than CVE-2014-9819.</Note>
    </Notes>
    <CVE>CVE-2014-9823</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9823.html</URL>
        <Description>CVE-2014-9823</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984401</URL>
        <Description>SUSE Bug 984401</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted psd file, a different vulnerability than CVE-2014-9825.</Note>
    </Notes>
    <CVE>CVE-2014-9824</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9824.html</URL>
        <Description>CVE-2014-9824</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984185</URL>
        <Description>SUSE Bug 984185</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted psd file, a different vulnerability than CVE-2014-9824.</Note>
    </Notes>
    <CVE>CVE-2014-9825</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9825.html</URL>
        <Description>CVE-2014-9825</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984427</URL>
        <Description>SUSE Bug 984427</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick allows remote attackers to have unspecified impact via vectors related to error handling in sun files.</Note>
    </Notes>
    <CVE>CVE-2014-9826</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>0</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9826.html</URL>
        <Description>CVE-2014-9826</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984186</URL>
        <Description>SUSE Bug 984186</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">coders/psd.c in ImageMagick allows remote attackers to have unspecified impact via a crafted psd file.</Note>
    </Notes>
    <CVE>CVE-2014-9828</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9828.html</URL>
        <Description>CVE-2014-9828</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984028</URL>
        <Description>SUSE Bug 984028</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">coders/sun.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted sun file.</Note>
    </Notes>
    <CVE>CVE-2014-9829</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9829.html</URL>
        <Description>CVE-2014-9829</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984409</URL>
        <Description>SUSE Bug 984409</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">coders/sun.c in ImageMagick allows remote attackers to have unspecified impact via a corrupted sun file.</Note>
    </Notes>
    <CVE>CVE-2014-9830</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9830.html</URL>
        <Description>CVE-2014-9830</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1000690</URL>
        <Description>SUSE Bug 1000690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984135</URL>
        <Description>SUSE Bug 984135</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">coders/wpg.c in ImageMagick allows remote attackers to have unspecified impact via a corrupted wpg file.</Note>
    </Notes>
    <CVE>CVE-2014-9831</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9831.html</URL>
        <Description>CVE-2014-9831</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984375</URL>
        <Description>SUSE Bug 984375</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap overflow in ImageMagick 6.8.9-9 via a crafted pcx file.</Note>
    </Notes>
    <CVE>CVE-2014-9832</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9832.html</URL>
        <Description>CVE-2014-9832</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984183</URL>
        <Description>SUSE Bug 984183</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap overflow in ImageMagick 6.8.9-9 via a crafted psd file.</Note>
    </Notes>
    <CVE>CVE-2014-9833</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9833.html</URL>
        <Description>CVE-2014-9833</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984406</URL>
        <Description>SUSE Bug 984406</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984427</URL>
        <Description>SUSE Bug 984427</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap overflow in ImageMagick 6.8.9-9 via a crafted pict file.</Note>
    </Notes>
    <CVE>CVE-2014-9834</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9834.html</URL>
        <Description>CVE-2014-9834</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984436</URL>
        <Description>SUSE Bug 984436</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap overflow in ImageMagick 6.8.9-9 via a crafted wpf file.</Note>
    </Notes>
    <CVE>CVE-2014-9835</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9835.html</URL>
        <Description>CVE-2014-9835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984145</URL>
        <Description>SUSE Bug 984145</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984375</URL>
        <Description>SUSE Bug 984375</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service via a crafted xpm file.</Note>
    </Notes>
    <CVE>CVE-2014-9836</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9836.html</URL>
        <Description>CVE-2014-9836</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984023</URL>
        <Description>SUSE Bug 984023</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">coders/pnm.c in ImageMagick 6.9.0-1 Beta and earlier allows remote attackers to cause a denial of service (crash) via a crafted png file.</Note>
    </Notes>
    <CVE>CVE-2014-9837</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9837.html</URL>
        <Description>CVE-2014-9837</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984166</URL>
        <Description>SUSE Bug 984166</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">magick/cache.c in ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service (crash).</Note>
    </Notes>
    <CVE>CVE-2014-9838</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9838.html</URL>
        <Description>CVE-2014-9838</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984370</URL>
        <Description>SUSE Bug 984370</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">magick/colormap-private.h in ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds access).</Note>
    </Notes>
    <CVE>CVE-2014-9839</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9839.html</URL>
        <Description>CVE-2014-9839</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984379</URL>
        <Description>SUSE Bug 984379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted palm file.</Note>
    </Notes>
    <CVE>CVE-2014-9840</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9840.html</URL>
        <Description>CVE-2014-9840</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984433</URL>
        <Description>SUSE Bug 984433</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadPSDLayers function in coders/psd.c in ImageMagick 6.8.9.9 allows remote attackers to have unspecified impact via unknown vectors, related to "throwing of exceptions."</Note>
    </Notes>
    <CVE>CVE-2014-9841</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9841.html</URL>
        <Description>CVE-2014-9841</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984172</URL>
        <Description>SUSE Bug 984172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984186</URL>
        <Description>SUSE Bug 984186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984374</URL>
        <Description>SUSE Bug 984374</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the ReadPSDLayers function in coders/psd.c in ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2014-9842</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9842.html</URL>
        <Description>CVE-2014-9842</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984172</URL>
        <Description>SUSE Bug 984172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984374</URL>
        <Description>SUSE Bug 984374</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DecodePSDPixels function in coders/psd.c in ImageMagick 6.8.9.9 allows remote attackers to have unspecified impact via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2014-9843</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9843.html</URL>
        <Description>CVE-2014-9843</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1000697</URL>
        <Description>SUSE Bug 1000697</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984179</URL>
        <Description>SUSE Bug 984179</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadRLEImage function in coders/rle.c in ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted image file.</Note>
    </Notes>
    <CVE>CVE-2014-9844</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9844.html</URL>
        <Description>CVE-2014-9844</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984373</URL>
        <Description>SUSE Bug 984373</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984408</URL>
        <Description>SUSE Bug 984408</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadDIBImage function in coders/dib.c in ImageMagick allows remote attackers to cause a denial of service (crash) via a corrupted dib file.</Note>
    </Notes>
    <CVE>CVE-2014-9845</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9845.html</URL>
        <Description>CVE-2014-9845</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984394</URL>
        <Description>SUSE Bug 984394</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.8.9.9 allows remote attackers to have unspecified impact.</Note>
    </Notes>
    <CVE>CVE-2014-9846</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9846.html</URL>
        <Description>CVE-2014-9846</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983521</URL>
        <Description>SUSE Bug 983521</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984408</URL>
        <Description>SUSE Bug 984408</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The jng decoder in ImageMagick 6.8.9.9 allows remote attackers to have an unspecified impact.</Note>
    </Notes>
    <CVE>CVE-2014-9847</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9847.html</URL>
        <Description>CVE-2014-9847</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1040304</URL>
        <Description>SUSE Bug 1040304</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984144</URL>
        <Description>SUSE Bug 984144</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in ImageMagick allows remote attackers to cause a denial of service (memory consumption).</Note>
    </Notes>
    <CVE>CVE-2014-9848</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9848.html</URL>
        <Description>CVE-2014-9848</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984404</URL>
        <Description>SUSE Bug 984404</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The png coder in ImageMagick allows remote attackers to cause a denial of service (crash).</Note>
    </Notes>
    <CVE>CVE-2014-9849</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9849.html</URL>
        <Description>CVE-2014-9849</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984018</URL>
        <Description>SUSE Bug 984018</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Logic error in ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (resource consumption).</Note>
    </Notes>
    <CVE>CVE-2014-9850</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9850.html</URL>
        <Description>CVE-2014-9850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984149</URL>
        <Description>SUSE Bug 984149</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (application crash).</Note>
    </Notes>
    <CVE>CVE-2014-9851</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9851.html</URL>
        <Description>CVE-2014-9851</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106989</URL>
        <Description>SUSE Bug 1106989</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106996</URL>
        <Description>SUSE Bug 1106996</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984160</URL>
        <Description>SUSE Bug 984160</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">distribute-cache.c in ImageMagick re-uses objects after they have been destroyed, which allows remote attackers to have unspecified impact via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2014-9852</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9852.html</URL>
        <Description>CVE-2014-9852</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984191</URL>
        <Description>SUSE Bug 984191</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in coders/rle.c in ImageMagick allows remote attackers to cause a denial of service (memory consumption) via a crafted rle file.</Note>
    </Notes>
    <CVE>CVE-2014-9853</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9853.html</URL>
        <Description>CVE-2014-9853</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984408</URL>
        <Description>SUSE Bug 984408</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">coders/tiff.c in ImageMagick allows remote attackers to cause a denial of service (application crash) via vectors related to the "identification of image."</Note>
    </Notes>
    <CVE>CVE-2014-9854</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9854.html</URL>
        <Description>CVE-2014-9854</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984184</URL>
        <Description>SUSE Bug 984184</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in coders/tga.c in ImageMagick 7.0.0 and later allows remote attackers to cause a denial of service (application crash) via a crafted tga file.</Note>
    </Notes>
    <CVE>CVE-2015-8894</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8894.html</URL>
        <Description>CVE-2015-8894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983523</URL>
        <Description>SUSE Bug 983523</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983533</URL>
        <Description>SUSE Bug 983533</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in coders/icon.c in ImageMagick 6.9.1-3 and later allows remote attackers to cause a denial of service (application crash) via a crafted length value, which triggers a buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2015-8895</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8895.html</URL>
        <Description>CVE-2015-8895</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983527</URL>
        <Description>SUSE Bug 983527</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer truncation issue in coders/pict.c in ImageMagick before 7.0.5-0 allows remote attackers to cause a denial of service (application crash) via a crafted .pict file.</Note>
    </Notes>
    <CVE>CVE-2015-8896</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8896.html</URL>
        <Description>CVE-2015-8896</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983533</URL>
        <Description>SUSE Bug 983533</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SpliceImage function in MagickCore/transform.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (application crash) via a crafted png file.</Note>
    </Notes>
    <CVE>CVE-2015-8897</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8897.html</URL>
        <Description>CVE-2015-8897</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983739</URL>
        <Description>SUSE Bug 983739</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983746</URL>
        <Description>SUSE Bug 983746</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The WriteImages function in magick/constitute.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image file.</Note>
    </Notes>
    <CVE>CVE-2015-8898</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8898.html</URL>
        <Description>CVE-2015-8898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982969</URL>
        <Description>SUSE Bug 982969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983739</URL>
        <Description>SUSE Bug 983739</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983746</URL>
        <Description>SUSE Bug 983746</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadHDRImage function in coders/hdr.c in ImageMagick 6.x and 7.x allows remote attackers to cause a denial of service (infinite loop) via a crafted HDR file.</Note>
    </Notes>
    <CVE>CVE-2015-8900</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8900.html</URL>
        <Description>CVE-2015-8900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983232</URL>
        <Description>SUSE Bug 983232</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a denial of service (infinite loop) via a crafted MIFF file.</Note>
    </Notes>
    <CVE>CVE-2015-8901</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8901.html</URL>
        <Description>CVE-2015-8901</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983234</URL>
        <Description>SUSE Bug 983234</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadBlobByte function in coders/pdb.c in ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a denial of service (infinite loop) via a crafted PDB file.</Note>
    </Notes>
    <CVE>CVE-2015-8902</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8902.html</URL>
        <Description>CVE-2015-8902</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052711</URL>
        <Description>SUSE Bug 1052711</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983253</URL>
        <Description>SUSE Bug 983253</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadVICARImage function in coders/vicar.c in ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a denial of service (infinite loop) via a crafted VICAR file.</Note>
    </Notes>
    <CVE>CVE-2015-8903</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8903.html</URL>
        <Description>CVE-2015-8903</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983259</URL>
        <Description>SUSE Bug 983259</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DrawDashPolygon function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 mishandles calculations of certain vertices integer data, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2016-4562</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4562.html</URL>
        <Description>CVE-2016-4562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983292</URL>
        <Description>SUSE Bug 983292</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983305</URL>
        <Description>SUSE Bug 983305</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983308</URL>
        <Description>SUSE Bug 983308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983309</URL>
        <Description>SUSE Bug 983309</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TraceStrokePolygon function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 mishandles the relationship between the BezierQuantum value and certain strokes data, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2016-4563</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4563.html</URL>
        <Description>CVE-2016-4563</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983305</URL>
        <Description>SUSE Bug 983305</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DrawImage function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 makes an incorrect function call in attempting to locate the next token, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2016-4564</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4564.html</URL>
        <Description>CVE-2016-4564</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983308</URL>
        <Description>SUSE Bug 983308</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The VerticalFilter function in the DDS coder in ImageMagick before 6.9.4-3 and 7.x before 7.0.1-4 allows remote attackers to have unspecified impact via a crafted DDS file, which triggers an out-of-bounds read.</Note>
    </Notes>
    <CVE>CVE-2016-5687</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5687.html</URL>
        <Description>CVE-2016-5687</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1000713</URL>
        <Description>SUSE Bug 1000713</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1000714</URL>
        <Description>SUSE Bug 1000714</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074610</URL>
        <Description>SUSE Bug 1074610</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/985448</URL>
        <Description>SUSE Bug 985448</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The WPG parser in ImageMagick before 6.9.4-4 and 7.x before 7.0.1-5, when a memory limit is set, allows remote attackers to have unspecified impact via vectors related to the SetImageExtent return-value check, which trigger (1) a heap-based buffer overflow in the SetPixelIndex function or an invalid write operation in the (2) ScaleCharToQuantum or (3) SetPixelIndex functions.</Note>
    </Notes>
    <CVE>CVE-2016-5688</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5688.html</URL>
        <Description>CVE-2016-5688</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/985442</URL>
        <Description>SUSE Bug 985442</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DCM reader in ImageMagick before 6.9.4-5 and 7.x before 7.0.1-7 allows remote attackers to have unspecified impact by leveraging lack of NULL pointer checks.</Note>
    </Notes>
    <CVE>CVE-2016-5689</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5689.html</URL>
        <Description>CVE-2016-5689</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/985460</URL>
        <Description>SUSE Bug 985460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadDCMImage function in DCM reader in ImageMagick before 6.9.4-5 and 7.x before 7.0.1-7 allows remote attackers to have unspecified impact via vectors involving the for statement in computing the pixel scaling table.</Note>
    </Notes>
    <CVE>CVE-2016-5690</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5690.html</URL>
        <Description>CVE-2016-5690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/985451</URL>
        <Description>SUSE Bug 985451</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/985460</URL>
        <Description>SUSE Bug 985460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DCM reader in ImageMagick before 6.9.4-5 and 7.x before 7.0.1-7 allows remote attackers to have unspecified impact by leveraging lack of validation of (1) pixel.red, (2) pixel.green, and (3) pixel.blue.</Note>
    </Notes>
    <CVE>CVE-2016-5691</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5691.html</URL>
        <Description>CVE-2016-5691</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/985456</URL>
        <Description>SUSE Bug 985456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/985460</URL>
        <Description>SUSE Bug 985460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in MagickCore/profile.c in ImageMagick before 7.0.2-1 allows remote attackers to cause a denial of service (segmentation fault) or possibly execute arbitrary code via vectors involving the offset variable.</Note>
    </Notes>
    <CVE>CVE-2016-5841</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5841.html</URL>
        <Description>CVE-2016-5841</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986609</URL>
        <Description>SUSE Bug 986609</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">MagickCore/property.c in ImageMagick before 7.0.2-1 allows remote attackers to obtain sensitive memory information via vectors involving the q variable, which triggers an out-of-bounds read.</Note>
    </Notes>
    <CVE>CVE-2016-5842</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:ImageMagick-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-doc-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:ImageMagick-extra-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-6_Q16-3-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagick++-devel-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickCore-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-32bit-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libMagickWand-6_Q16-1-6.8.8.1-15.1</ProductID>
        <ProductID>openSUSE Leap 42.1:perl-PerlMagick-6.8.8.1-15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5842.html</URL>
        <Description>CVE-2016-5842</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986608</URL>
        <Description>SUSE Bug 986608</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
