<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for GraphicsMagick</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:1123-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-05-02T06:23:41Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-05-02T06:23:41Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-05-02T06:23:41Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for GraphicsMagick</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for GraphicsMagick fixes the following issues:

- security update (core)
  * CVE-2018-6799: The AcquireCacheNexus function in magick/pixel_cache.c in GraphicsMagick before 
  1.3.28 allows remote attackers to cause a denial of service (heap overwrite) or possibly have 
  unspecified other impact via a crafted image file, because a pixel staging area is not used. [boo#1080522]

- security update (png.c)
  * CVE-2018-9018: In GraphicsMagick 1.3.28, there is a divide-by-zero in the ReadMNGImage 
  function of coders/png.c. Remote attackers could leverage this vulnerability to cause a 
  crash and denial of service via a crafted mng file. [boo#1086773]

- security update (gif.c)
  * CVE-2017-18254: An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability 
  was found in the function WriteGIFImage in coders/gif.c, which allow remote attackers to 
  cause a denial of service via a crafted file. [boo#1087027]

- security update (pcd.c)
  * CVE-2017-18251: An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability 
  was found in the function ReadPCDImage in coders/pcd.c, which allow remote attackers to cause 
  a denial of service via a crafted file. [boo#1087037]

  * CVE-2017-18229: An issue was discovered in GraphicsMagick 1.3.26. An allocation failure vulnerability 
  was found in the function ReadTIFFImage in coders/tiff.c, which allows attackers to cause a denial of 
  service via a crafted file, because file size is not properly used to restrict scanline, 
  strip, and tile allocations. [boo#1085236]

  * CVE-2017-11641: GraphicsMagick 1.3.26 has a Memory Leak in the PersistCache function in magick/pixel_cache.c 
  during writing of Magick Persistent Cache (MPC) files.[boo#1050623]

  * CVE-2017-13066: GraphicsMagick 1.3.26 has a memory leak vulnerability in the function CloneImage in 
    magick/image.c. [boo#1055010]
  
  * CVE-2018-10177: Specially crafted PNG images may have triggered an infinite loop [bsc#1089781]

  </Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:1123-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="GraphicsMagick-1.3.25-87.1">
      <FullProductName ProductID="GraphicsMagick-1.3.25-87.1">GraphicsMagick-1.3.25-87.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="GraphicsMagick-devel-1.3.25-87.1">
      <FullProductName ProductID="GraphicsMagick-devel-1.3.25-87.1">GraphicsMagick-devel-1.3.25-87.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libGraphicsMagick++-Q16-12-1.3.25-87.1">
      <FullProductName ProductID="libGraphicsMagick++-Q16-12-1.3.25-87.1">libGraphicsMagick++-Q16-12-1.3.25-87.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libGraphicsMagick++-devel-1.3.25-87.1">
      <FullProductName ProductID="libGraphicsMagick++-devel-1.3.25-87.1">libGraphicsMagick++-devel-1.3.25-87.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libGraphicsMagick-Q16-3-1.3.25-87.1">
      <FullProductName ProductID="libGraphicsMagick-Q16-3-1.3.25-87.1">libGraphicsMagick-Q16-3-1.3.25-87.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libGraphicsMagick3-config-1.3.25-87.1">
      <FullProductName ProductID="libGraphicsMagick3-config-1.3.25-87.1">libGraphicsMagick3-config-1.3.25-87.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libGraphicsMagickWand-Q16-2-1.3.25-87.1">
      <FullProductName ProductID="libGraphicsMagickWand-Q16-2-1.3.25-87.1">libGraphicsMagickWand-Q16-2-1.3.25-87.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="perl-GraphicsMagick-1.3.25-87.1">
      <FullProductName ProductID="perl-GraphicsMagick-1.3.25-87.1">perl-GraphicsMagick-1.3.25-87.1</FullProductName>
    </Branch>
    <Relationship ProductReference="GraphicsMagick-1.3.25-87.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:GraphicsMagick-1.3.25-87.1">GraphicsMagick-1.3.25-87.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="GraphicsMagick-devel-1.3.25-87.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:GraphicsMagick-devel-1.3.25-87.1">GraphicsMagick-devel-1.3.25-87.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libGraphicsMagick++-Q16-12-1.3.25-87.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libGraphicsMagick++-Q16-12-1.3.25-87.1">libGraphicsMagick++-Q16-12-1.3.25-87.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libGraphicsMagick++-devel-1.3.25-87.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libGraphicsMagick++-devel-1.3.25-87.1">libGraphicsMagick++-devel-1.3.25-87.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libGraphicsMagick-Q16-3-1.3.25-87.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libGraphicsMagick-Q16-3-1.3.25-87.1">libGraphicsMagick-Q16-3-1.3.25-87.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libGraphicsMagick3-config-1.3.25-87.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libGraphicsMagick3-config-1.3.25-87.1">libGraphicsMagick3-config-1.3.25-87.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libGraphicsMagickWand-Q16-2-1.3.25-87.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libGraphicsMagickWand-Q16-2-1.3.25-87.1">libGraphicsMagickWand-Q16-2-1.3.25-87.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="perl-GraphicsMagick-1.3.25-87.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:perl-GraphicsMagick-1.3.25-87.1">perl-GraphicsMagick-1.3.25-87.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GraphicsMagick 1.3.26 has a Memory Leak in the PersistCache function in magick/pixel_cache.c during writing of Magick Persistent Cache (MPC) files.</Note>
    </Notes>
    <CVE>CVE-2017-11641</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:GraphicsMagick-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:GraphicsMagick-devel-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick++-Q16-12-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick++-devel-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick-Q16-3-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick3-config-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagickWand-Q16-2-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-GraphicsMagick-1.3.25-87.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11641.html</URL>
        <Description>CVE-2017-11641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050129</URL>
        <Description>SUSE Bug 1050129</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050623</URL>
        <Description>SUSE Bug 1050623</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GraphicsMagick 1.3.26 has a memory leak vulnerability in the function CloneImage in magick/image.c.</Note>
    </Notes>
    <CVE>CVE-2017-13066</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:GraphicsMagick-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:GraphicsMagick-devel-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick++-Q16-12-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick++-devel-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick-Q16-3-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick3-config-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagickWand-Q16-2-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-GraphicsMagick-1.3.25-87.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13066.html</URL>
        <Description>CVE-2017-13066</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036988</URL>
        <Description>SUSE Bug 1036988</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1055010</URL>
        <Description>SUSE Bug 1055010</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in GraphicsMagick 1.3.26. An allocation failure vulnerability was found in the function ReadTIFFImage in coders/tiff.c, which allows attackers to cause a denial of service via a crafted file, because file size is not properly used to restrict scanline, strip, and tile allocations.</Note>
    </Notes>
    <CVE>CVE-2017-18229</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:GraphicsMagick-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:GraphicsMagick-devel-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick++-Q16-12-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick++-devel-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick-Q16-3-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick3-config-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagickWand-Q16-2-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-GraphicsMagick-1.3.25-87.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18229.html</URL>
        <Description>CVE-2017-18229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1076182</URL>
        <Description>SUSE Bug 1076182</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085236</URL>
        <Description>SUSE Bug 1085236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability was found in the function ReadPCDImage in coders/pcd.c, which allow remote attackers to cause a denial of service via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-18251</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:GraphicsMagick-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:GraphicsMagick-devel-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick++-Q16-12-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick++-devel-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick-Q16-3-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick3-config-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagickWand-Q16-2-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-GraphicsMagick-1.3.25-87.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18251.html</URL>
        <Description>CVE-2017-18251</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087037</URL>
        <Description>SUSE Bug 1087037</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, which allow remote attackers to cause a denial of service via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2017-18254</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:GraphicsMagick-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:GraphicsMagick-devel-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick++-Q16-12-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick++-devel-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick-Q16-3-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick3-config-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagickWand-Q16-2-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-GraphicsMagick-1.3.25-87.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18254.html</URL>
        <Description>CVE-2017-18254</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087027</URL>
        <Description>SUSE Bug 1087027</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick 7.0.7-28, there is an infinite loop in the ReadOneMNGImage function of the coders/png.c file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted mng file.</Note>
    </Notes>
    <CVE>CVE-2018-10177</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:GraphicsMagick-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:GraphicsMagick-devel-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick++-Q16-12-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick++-devel-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick-Q16-3-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick3-config-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagickWand-Q16-2-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-GraphicsMagick-1.3.25-87.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10177.html</URL>
        <Description>CVE-2018-10177</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089781</URL>
        <Description>SUSE Bug 1089781</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The AcquireCacheNexus function in magick/pixel_cache.c in GraphicsMagick before 1.3.28 allows remote attackers to cause a denial of service (heap overwrite) or possibly have unspecified other impact via a crafted image file, because a pixel staging area is not used.</Note>
    </Notes>
    <CVE>CVE-2018-6799</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:GraphicsMagick-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:GraphicsMagick-devel-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick++-Q16-12-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick++-devel-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick-Q16-3-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick3-config-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagickWand-Q16-2-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-GraphicsMagick-1.3.25-87.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6799.html</URL>
        <Description>CVE-2018-6799</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1080522</URL>
        <Description>SUSE Bug 1080522</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In GraphicsMagick 1.3.28, there is a divide-by-zero in the ReadMNGImage function of coders/png.c. Remote attackers could leverage this vulnerability to cause a crash and denial of service via a crafted mng file.</Note>
    </Notes>
    <CVE>CVE-2018-9018</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:GraphicsMagick-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:GraphicsMagick-devel-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick++-Q16-12-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick++-devel-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick-Q16-3-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagick3-config-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libGraphicsMagickWand-Q16-2-1.3.25-87.1</ProductID>
        <ProductID>openSUSE Leap 42.3:perl-GraphicsMagick-1.3.25-87.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-9018.html</URL>
        <Description>CVE-2018-9018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086773</URL>
        <Description>SUSE Bug 1086773</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
