<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ImageMagick</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2021:14598-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-01-15T15:30:02Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-01-15T15:30:02Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-01-15T15:30:02Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ImageMagick</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for ImageMagick fixes the following issues:
	  
- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103).
- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).
- CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).
- CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
- CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).
- CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321).
- CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">sleposp3-ImageMagick-14598,slessp4-ImageMagick-14598</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1/</URL>
      <Description>Link for SUSE-SU-2021:14598-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html</URL>
      <Description>E-Mail link for SUSE-SU-2021:14598-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179103</URL>
      <Description>SUSE Bug 1179103</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179202</URL>
      <Description>SUSE Bug 1179202</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179212</URL>
      <Description>SUSE Bug 1179212</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179269</URL>
      <Description>SUSE Bug 1179269</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179281</URL>
      <Description>SUSE Bug 1179281</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179311</URL>
      <Description>SUSE Bug 1179311</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179312</URL>
      <Description>SUSE Bug 1179312</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179313</URL>
      <Description>SUSE Bug 1179313</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179315</URL>
      <Description>SUSE Bug 1179315</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179321</URL>
      <Description>SUSE Bug 1179321</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179322</URL>
      <Description>SUSE Bug 1179322</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179327</URL>
      <Description>SUSE Bug 1179327</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179336</URL>
      <Description>SUSE Bug 1179336</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179338</URL>
      <Description>SUSE Bug 1179338</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179339</URL>
      <Description>SUSE Bug 1179339</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179345</URL>
      <Description>SUSE Bug 1179345</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179346</URL>
      <Description>SUSE Bug 1179346</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179347</URL>
      <Description>SUSE Bug 1179347</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179397</URL>
      <Description>SUSE Bug 1179397</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-19667/</URL>
      <Description>SUSE CVE CVE-2020-19667 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25664/</URL>
      <Description>SUSE CVE CVE-2020-25664 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25666/</URL>
      <Description>SUSE CVE CVE-2020-25666 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27751/</URL>
      <Description>SUSE CVE CVE-2020-27751 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27752/</URL>
      <Description>SUSE CVE CVE-2020-27752 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27753/</URL>
      <Description>SUSE CVE CVE-2020-27753 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27754/</URL>
      <Description>SUSE CVE CVE-2020-27754 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27755/</URL>
      <Description>SUSE CVE CVE-2020-27755 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27759/</URL>
      <Description>SUSE CVE CVE-2020-27759 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27760/</URL>
      <Description>SUSE CVE CVE-2020-27760 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27761/</URL>
      <Description>SUSE CVE CVE-2020-27761 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27763/</URL>
      <Description>SUSE CVE CVE-2020-27763 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27765/</URL>
      <Description>SUSE CVE CVE-2020-27765 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27767/</URL>
      <Description>SUSE CVE CVE-2020-27767 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27768/</URL>
      <Description>SUSE CVE CVE-2020-27768 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27769/</URL>
      <Description>SUSE CVE CVE-2020-27769 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27771/</URL>
      <Description>SUSE CVE CVE-2020-27771 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27772/</URL>
      <Description>SUSE CVE CVE-2020-27772 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27775/</URL>
      <Description>SUSE CVE CVE-2020-27775 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Point of Sale 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Point of Sale 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3" CPE="cpe:/o:suse:sle-pos:11:sp3">SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP4-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS" CPE="cpe:/o:suse:suse_sles:11:sp4">SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore1-6.4.3.6-78.135.1">
      <FullProductName ProductID="libMagickCore1-6.4.3.6-78.135.1">libMagickCore1-6.4.3.6-78.135.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libMagickCore1-32bit-6.4.3.6-78.135.1">
      <FullProductName ProductID="libMagickCore1-32bit-6.4.3.6-78.135.1">libMagickCore1-32bit-6.4.3.6-78.135.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libMagickCore1-6.4.3.6-78.135.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1">libMagickCore1-6.4.3.6-78.135.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore1-6.4.3.6-78.135.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1">libMagickCore1-6.4.3.6-78.135.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libMagickCore1-32bit-6.4.3.6-78.135.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1">libMagickCore1-32bit-6.4.3.6-78.135.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow and unconditional jump in ReadXPMImage in coders/xpm.c in ImageMagick 7.0.10-7.</Note>
    </Notes>
    <CVE>CVE-2020-19667</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-19667.html</URL>
        <Description>CVE-2020-19667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179103</URL>
        <Description>SUSE Bug 1179103</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In WriteOnePNGImage() of the PNG coder at coders/png.c, an improper call to AcquireVirtualMemory() and memset() allows for an out-of-bounds write later when PopShortPixel() from MagickCore/quantum-private.h is called. The patch fixes the calls by adding 256 to rowbytes. An attacker who is able to supply a specially crafted image could affect availability with a low impact to data integrity. This flaw affects ImageMagick versions prior to 6.9.10-68 and 7.0.8-68.</Note>
    </Notes>
    <CVE>CVE-2020-25664</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25664.html</URL>
        <Description>CVE-2020-25664</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179202</URL>
        <Description>SUSE Bug 1179202</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179346</URL>
        <Description>SUSE Bug 1179346</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There are 4 places in HistogramCompare() in MagickCore/histogram.c where an integer overflow is possible during simple math calculations. This occurs in the rgb values and `count` value for a color. The patch uses casts to `ssize_t` type for these calculations, instead of `int`. This flaw could impact application reliability in the event that ImageMagick processes a crafted input file. This flaw affects ImageMagick versions prior to 7.0.9-0.</Note>
    </Notes>
    <CVE>CVE-2020-25666</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25666.html</URL>
        <Description>CVE-2020-25666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179212</URL>
        <Description>SUSE Bug 1179212</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.</Note>
    </Notes>
    <CVE>CVE-2020-27751</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27751.html</URL>
        <Description>CVE-2020-27751</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179269</URL>
        <Description>SUSE Bug 1179269</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in ImageMagick in MagickCore/quantum-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger a heap buffer overflow. This would most likely lead to an impact to application availability, but could potentially lead to an impact to data integrity as well. This flaw affects ImageMagick versions prior to 7.0.9-0.</Note>
    </Notes>
    <CVE>CVE-2020-27752</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27752.html</URL>
        <Description>CVE-2020-27752</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179202</URL>
        <Description>SUSE Bug 1179202</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179346</URL>
        <Description>SUSE Bug 1179346</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There are several memory leaks in the MIFF coder in /coders/miff.c due to improper image depth values, which can be triggered by a specially crafted input file. These leaks could potentially lead to an impact to application availability or cause a denial of service. It was originally reported that the issues were in `AcquireMagickMemory()` because that is where LeakSanitizer detected the leaks, but the patch resolves issues in the MIFF coder, which incorrectly handles data being passed to `AcquireMagickMemory()`. This flaw affects ImageMagick versions prior to 7.0.9-0.</Note>
    </Notes>
    <CVE>CVE-2020-27753</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27753.html</URL>
        <Description>CVE-2020-27753</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179397</URL>
        <Description>SUSE Bug 1179397</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69.</Note>
    </Notes>
    <CVE>CVE-2020-27754</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27754.html</URL>
        <Description>CVE-2020-27754</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179313</URL>
        <Description>SUSE Bug 1179313</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179336</URL>
        <Description>SUSE Bug 1179336</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">in SetImageExtent() of /MagickCore/image.c, an incorrect image depth size can cause a memory leak because the code which checks for the proper image depth size does not reset the size in the event there is an invalid size. The patch resets the depth to a proper size before throwing an exception. The memory leak can be triggered by a crafted input file that is processed by ImageMagick and could cause an impact to application reliability, such as denial of service. This flaw affects ImageMagick versions prior to 7.0.9-0.</Note>
    </Notes>
    <CVE>CVE-2020-27755</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27755.html</URL>
        <Description>CVE-2020-27755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179345</URL>
        <Description>SUSE Bug 1179345</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In IntensityCompare() of /MagickCore/quantize.c, a double value was being casted to int and returned, which in some cases caused a value outside the range of type `int` to be returned. The flaw could be triggered by a crafted input file under certain conditions when processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68.</Note>
    </Notes>
    <CVE>CVE-2020-27759</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27759.html</URL>
        <Description>CVE-2020-27759</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179313</URL>
        <Description>SUSE Bug 1179313</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179321</URL>
        <Description>SUSE Bug 1179321</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179336</URL>
        <Description>SUSE Bug 1179336</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In `GammaImage()` of /MagickCore/enhance.c, depending on the `gamma` value, it's possible to trigger a divide-by-zero condition when a crafted input file is processed by ImageMagick. This could lead to an impact to application availability. The patch uses the `PerceptibleReciprocal()` to prevent the divide-by-zero from occurring. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.</Note>
    </Notes>
    <CVE>CVE-2020-27760</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27760.html</URL>
        <Description>CVE-2020-27760</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179281</URL>
        <Description>SUSE Bug 1179281</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WritePALMImage() in /coders/palm.c used size_t casts in several areas of a calculation which could lead to values outside the range of representable type `unsigned long` undefined behavior when a crafted input file was processed by ImageMagick. The patch casts to `ssize_t` instead to avoid this issue. Red Hat Product Security marked the Severity as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to ImageMagick 7.0.9-0.</Note>
    </Notes>
    <CVE>CVE-2020-27761</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27761.html</URL>
        <Description>CVE-2020-27761</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179315</URL>
        <Description>SUSE Bug 1179315</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.</Note>
    </Notes>
    <CVE>CVE-2020-27763</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27763.html</URL>
        <Description>CVE-2020-27763</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179312</URL>
        <Description>SUSE Bug 1179312</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.</Note>
    </Notes>
    <CVE>CVE-2020-27765</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27765.html</URL>
        <Description>CVE-2020-27765</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179311</URL>
        <Description>SUSE Bug 1179311</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of types `float` and `unsigned char`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.</Note>
    </Notes>
    <CVE>CVE-2020-27767</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27767.html</URL>
        <Description>CVE-2020-27767</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179268</URL>
        <Description>SUSE Bug 1179268</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179269</URL>
        <Description>SUSE Bug 1179269</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179322</URL>
        <Description>SUSE Bug 1179322</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179346</URL>
        <Description>SUSE Bug 1179346</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick, there is an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h. This flaw affects ImageMagick versions prior to 7.0.9-0.</Note>
    </Notes>
    <CVE>CVE-2020-27768</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27768.html</URL>
        <Description>CVE-2020-27768</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179339</URL>
        <Description>SUSE Bug 1179339</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ImageMagick versions before 7.0.9-0, there are outside the range of representable values of type 'float' at MagickCore/quantize.c.</Note>
    </Notes>
    <CVE>CVE-2020-27769</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27769.html</URL>
        <Description>CVE-2020-27769</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179321</URL>
        <Description>SUSE Bug 1179321</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could result in values outside the range of representable for the unsigned char type. The patch casts the return value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered when ImageMagick processes a crafted pdf file. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was demonstrated in this case. This flaw affects ImageMagick versions prior to 7.0.9-0.</Note>
    </Notes>
    <CVE>CVE-2020-27771</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27771.html</URL>
        <Description>CVE-2020-27771</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179327</URL>
        <Description>SUSE Bug 1179327</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.</Note>
    </Notes>
    <CVE>CVE-2020-27772</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27772.html</URL>
        <Description>CVE-2020-27772</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179347</URL>
        <Description>SUSE Bug 1179347</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.</Note>
    </Notes>
    <CVE>CVE-2020-27775</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27775.html</URL>
        <Description>CVE-2020-27775</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179338</URL>
        <Description>SUSE Bug 1179338</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
