suse-su-2021:14598-1
Vulnerability from csaf_suse
Published
2021-01-15 15:30
Modified
2021-01-15 15:30
Summary
Security update for ImageMagick

Notes

Title of the patch
Security update for ImageMagick
Description of the patch
This update for ImageMagick fixes the following issues: - CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103). - CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202). - CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212). - CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269). - CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346). - CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397). - CVE-2020-27754: Fixed an outside the range of representable values of type 'long' and signed integer overflow at MagickCore/quantize.c (bsc#1179336). - CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345). - CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268). - CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313). - CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281). - CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315). - CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312). - CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311). - CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322). - CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339). - CVE-2020-27769: Fixed an outside the range of representable values of type 'float' at MagickCore/quantize.c (bsc#1179321). - CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327). - CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347). - CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
Patchnames
sleposp3-ImageMagick-14598,slessp4-ImageMagick-14598
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for ImageMagick",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for ImageMagick fixes the following issues:\n\t  \n- CVE-2020-19667: Fixed a stack buffer overflow in XPM coder could result in a crash (bsc#1179103).\n- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).\n- CVE-2020-25666: Fixed an outside the range of representable values of type \u0027int\u0027 and signed integer overflow (bsc#1179212).\n- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).\n- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).\n- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).\n- CVE-2020-27754: Fixed an outside the range of representable values of type \u0027long\u0027 and signed integer overflow at MagickCore/quantize.c (bsc#1179336).\n- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).\n- CVE-2020-27757: Fixed an outside the range of representable values of type \u0027unsigned long long\u0027 at MagickCore/quantum-private.h (bsc#1179268).\n- CVE-2020-27759: Fixed an outside the range of representable values of type \u0027int\u0027 at MagickCore/quantize.c (bsc#1179313).\n- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).\n- CVE-2020-27761: Fixed an outside the range of representable values of type \u0027unsigned long\u0027 at coders/palm.c (bsc#1179315).\n- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).\n- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).\n- CVE-2020-27767: Fixed an outside the range of representable values of type \u0027float\u0027 at MagickCore/quantum.h (bsc#1179322).\n- CVE-2020-27768: Fixed an outside the range of representable values of type \u0027unsigned int\u0027 at MagickCore/quantum-private.h (bsc#1179339).\n- CVE-2020-27769: Fixed an outside the range of representable values of type \u0027float\u0027 at MagickCore/quantize.c (bsc#1179321).\n- CVE-2020-27771: Fixed an outside the range of representable values of type \u0027unsigned char\u0027 at coders/pdf.c (bsc#1179327).\n- CVE-2020-27772: Fixed an outside the range of representable values of type \u0027unsigned int\u0027 at coders/bmp.c (bsc#1179347).\n- CVE-2020-27775: Fixed an outside the range of representable values of type \u0027unsigned char\u0027 at MagickCore/quantum.h (bsc#1179338).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "sleposp3-ImageMagick-14598,slessp4-ImageMagick-14598",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_14598-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2021:14598-1",
        "url": "https://www.suse.com/support/update/announcement/2021/suse-su-202114598-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2021:14598-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179103",
        "url": "https://bugzilla.suse.com/1179103"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179202",
        "url": "https://bugzilla.suse.com/1179202"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179212",
        "url": "https://bugzilla.suse.com/1179212"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179269",
        "url": "https://bugzilla.suse.com/1179269"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179281",
        "url": "https://bugzilla.suse.com/1179281"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179311",
        "url": "https://bugzilla.suse.com/1179311"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179312",
        "url": "https://bugzilla.suse.com/1179312"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179313",
        "url": "https://bugzilla.suse.com/1179313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179315",
        "url": "https://bugzilla.suse.com/1179315"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179321",
        "url": "https://bugzilla.suse.com/1179321"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179322",
        "url": "https://bugzilla.suse.com/1179322"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179327",
        "url": "https://bugzilla.suse.com/1179327"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179336",
        "url": "https://bugzilla.suse.com/1179336"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179338",
        "url": "https://bugzilla.suse.com/1179338"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179339",
        "url": "https://bugzilla.suse.com/1179339"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179345",
        "url": "https://bugzilla.suse.com/1179345"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179346",
        "url": "https://bugzilla.suse.com/1179346"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179347",
        "url": "https://bugzilla.suse.com/1179347"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179397",
        "url": "https://bugzilla.suse.com/1179397"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-19667 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-19667/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25664 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25664/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25666 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25666/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27751 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27751/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27752 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27752/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27753 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27753/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27754 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27754/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27755 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27755/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27759 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27759/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27760 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27760/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27761 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27761/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27763 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27763/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27765 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27765/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27767 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27767/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27768 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27768/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27769 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27769/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27771 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27771/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27772 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27772/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27775 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27775/"
      }
    ],
    "title": "Security update for ImageMagick",
    "tracking": {
      "current_release_date": "2021-01-15T15:30:02Z",
      "generator": {
        "date": "2021-01-15T15:30:02Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2021:14598-1",
      "initial_release_date": "2021-01-15T15:30:02Z",
      "revision_history": [
        {
          "date": "2021-01-15T15:30:02Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libMagickCore1-6.4.3.6-78.135.1.i586",
                "product": {
                  "name": "libMagickCore1-6.4.3.6-78.135.1.i586",
                  "product_id": "libMagickCore1-6.4.3.6-78.135.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libMagickCore1-6.4.3.6-78.135.1.ppc64",
                "product": {
                  "name": "libMagickCore1-6.4.3.6-78.135.1.ppc64",
                  "product_id": "libMagickCore1-6.4.3.6-78.135.1.ppc64"
                }
              },
              {
                "category": "product_version",
                "name": "libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
                "product": {
                  "name": "libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
                  "product_id": "libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libMagickCore1-6.4.3.6-78.135.1.s390x",
                "product": {
                  "name": "libMagickCore1-6.4.3.6-78.135.1.s390x",
                  "product_id": "libMagickCore1-6.4.3.6-78.135.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
                "product": {
                  "name": "libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
                  "product_id": "libMagickCore1-32bit-6.4.3.6-78.135.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libMagickCore1-6.4.3.6-78.135.1.x86_64",
                "product": {
                  "name": "libMagickCore1-6.4.3.6-78.135.1.x86_64",
                  "product_id": "libMagickCore1-6.4.3.6-78.135.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
                "product": {
                  "name": "libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
                  "product_id": "libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Point of Sale 11 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Point of Sale 11 SP3",
                  "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-pos:11:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 11 SP4-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 11 SP4-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_sles:11:sp4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libMagickCore1-6.4.3.6-78.135.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
          "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586"
        },
        "product_reference": "libMagickCore1-6.4.3.6-78.135.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libMagickCore1-6.4.3.6-78.135.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586"
        },
        "product_reference": "libMagickCore1-6.4.3.6-78.135.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libMagickCore1-6.4.3.6-78.135.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64"
        },
        "product_reference": "libMagickCore1-6.4.3.6-78.135.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libMagickCore1-6.4.3.6-78.135.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x"
        },
        "product_reference": "libMagickCore1-6.4.3.6-78.135.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libMagickCore1-6.4.3.6-78.135.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
        },
        "product_reference": "libMagickCore1-6.4.3.6-78.135.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64"
        },
        "product_reference": "libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libMagickCore1-32bit-6.4.3.6-78.135.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x"
        },
        "product_reference": "libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64"
        },
        "product_reference": "libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-19667",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-19667"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Stack-based buffer overflow and unconditional jump in ReadXPMImage in coders/xpm.c in ImageMagick 7.0.10-7.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-19667",
          "url": "https://www.suse.com/security/cve/CVE-2020-19667"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179103 for CVE-2020-19667",
          "url": "https://bugzilla.suse.com/1179103"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-15T15:30:02Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-19667"
    },
    {
      "cve": "CVE-2020-25664",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25664"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In WriteOnePNGImage() of the PNG coder at coders/png.c, an improper call to AcquireVirtualMemory() and memset() allows for an out-of-bounds write later when PopShortPixel() from MagickCore/quantum-private.h is called. The patch fixes the calls by adding 256 to rowbytes. An attacker who is able to supply a specially crafted image could affect availability with a low impact to data integrity. This flaw affects ImageMagick versions prior to 6.9.10-68 and 7.0.8-68.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25664",
          "url": "https://www.suse.com/security/cve/CVE-2020-25664"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179202 for CVE-2020-25664",
          "url": "https://bugzilla.suse.com/1179202"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179346 for CVE-2020-25664",
          "url": "https://bugzilla.suse.com/1179346"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-15T15:30:02Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-25664"
    },
    {
      "cve": "CVE-2020-25666",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25666"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There are 4 places in HistogramCompare() in MagickCore/histogram.c where an integer overflow is possible during simple math calculations. This occurs in the rgb values and `count` value for a color. The patch uses casts to `ssize_t` type for these calculations, instead of `int`. This flaw could impact application reliability in the event that ImageMagick processes a crafted input file. This flaw affects ImageMagick versions prior to 7.0.9-0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25666",
          "url": "https://www.suse.com/security/cve/CVE-2020-25666"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179212 for CVE-2020-25666",
          "url": "https://bugzilla.suse.com/1179212"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-15T15:30:02Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-25666"
    },
    {
      "cve": "CVE-2020-27751",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27751"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27751",
          "url": "https://www.suse.com/security/cve/CVE-2020-27751"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179269 for CVE-2020-27751",
          "url": "https://bugzilla.suse.com/1179269"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-15T15:30:02Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-27751"
    },
    {
      "cve": "CVE-2020-27752",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27752"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in ImageMagick in MagickCore/quantum-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger a heap buffer overflow. This would most likely lead to an impact to application availability, but could potentially lead to an impact to data integrity as well. This flaw affects ImageMagick versions prior to 7.0.9-0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27752",
          "url": "https://www.suse.com/security/cve/CVE-2020-27752"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179202 for CVE-2020-27752",
          "url": "https://bugzilla.suse.com/1179202"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179346 for CVE-2020-27752",
          "url": "https://bugzilla.suse.com/1179346"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-15T15:30:02Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-27752"
    },
    {
      "cve": "CVE-2020-27753",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27753"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There are several memory leaks in the MIFF coder in /coders/miff.c due to improper image depth values, which can be triggered by a specially crafted input file. These leaks could potentially lead to an impact to application availability or cause a denial of service. It was originally reported that the issues were in `AcquireMagickMemory()` because that is where LeakSanitizer detected the leaks, but the patch resolves issues in the MIFF coder, which incorrectly handles data being passed to `AcquireMagickMemory()`. This flaw affects ImageMagick versions prior to 7.0.9-0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27753",
          "url": "https://www.suse.com/security/cve/CVE-2020-27753"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179397 for CVE-2020-27753",
          "url": "https://bugzilla.suse.com/1179397"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-15T15:30:02Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-27753"
    },
    {
      "cve": "CVE-2020-27754",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27754"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27754",
          "url": "https://www.suse.com/security/cve/CVE-2020-27754"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179313 for CVE-2020-27754",
          "url": "https://bugzilla.suse.com/1179313"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179336 for CVE-2020-27754",
          "url": "https://bugzilla.suse.com/1179336"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-15T15:30:02Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-27754"
    },
    {
      "cve": "CVE-2020-27755",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27755"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "in SetImageExtent() of /MagickCore/image.c, an incorrect image depth size can cause a memory leak because the code which checks for the proper image depth size does not reset the size in the event there is an invalid size. The patch resets the depth to a proper size before throwing an exception. The memory leak can be triggered by a crafted input file that is processed by ImageMagick and could cause an impact to application reliability, such as denial of service. This flaw affects ImageMagick versions prior to 7.0.9-0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27755",
          "url": "https://www.suse.com/security/cve/CVE-2020-27755"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179345 for CVE-2020-27755",
          "url": "https://bugzilla.suse.com/1179345"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-15T15:30:02Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-27755"
    },
    {
      "cve": "CVE-2020-27759",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27759"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In IntensityCompare() of /MagickCore/quantize.c, a double value was being casted to int and returned, which in some cases caused a value outside the range of type `int` to be returned. The flaw could be triggered by a crafted input file under certain conditions when processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27759",
          "url": "https://www.suse.com/security/cve/CVE-2020-27759"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179313 for CVE-2020-27759",
          "url": "https://bugzilla.suse.com/1179313"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179321 for CVE-2020-27759",
          "url": "https://bugzilla.suse.com/1179321"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179336 for CVE-2020-27759",
          "url": "https://bugzilla.suse.com/1179336"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-15T15:30:02Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-27759"
    },
    {
      "cve": "CVE-2020-27760",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27760"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In `GammaImage()` of /MagickCore/enhance.c, depending on the `gamma` value, it\u0027s possible to trigger a divide-by-zero condition when a crafted input file is processed by ImageMagick. This could lead to an impact to application availability. The patch uses the `PerceptibleReciprocal()` to prevent the divide-by-zero from occurring. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27760",
          "url": "https://www.suse.com/security/cve/CVE-2020-27760"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179281 for CVE-2020-27760",
          "url": "https://bugzilla.suse.com/1179281"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-15T15:30:02Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-27760"
    },
    {
      "cve": "CVE-2020-27761",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27761"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "WritePALMImage() in /coders/palm.c used size_t casts in several areas of a calculation which could lead to values outside the range of representable type `unsigned long` undefined behavior when a crafted input file was processed by ImageMagick. The patch casts to `ssize_t` instead to avoid this issue. Red Hat Product Security marked the Severity as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to ImageMagick 7.0.9-0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27761",
          "url": "https://www.suse.com/security/cve/CVE-2020-27761"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179315 for CVE-2020-27761",
          "url": "https://bugzilla.suse.com/1179315"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-15T15:30:02Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-27761"
    },
    {
      "cve": "CVE-2020-27763",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27763"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27763",
          "url": "https://www.suse.com/security/cve/CVE-2020-27763"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179312 for CVE-2020-27763",
          "url": "https://bugzilla.suse.com/1179312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-15T15:30:02Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-27763"
    },
    {
      "cve": "CVE-2020-27765",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27765"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27765",
          "url": "https://www.suse.com/security/cve/CVE-2020-27765"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179311 for CVE-2020-27765",
          "url": "https://bugzilla.suse.com/1179311"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-15T15:30:02Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-27765"
    },
    {
      "cve": "CVE-2020-27767",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27767"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of types `float` and `unsigned char`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27767",
          "url": "https://www.suse.com/security/cve/CVE-2020-27767"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179268 for CVE-2020-27767",
          "url": "https://bugzilla.suse.com/1179268"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179269 for CVE-2020-27767",
          "url": "https://bugzilla.suse.com/1179269"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179322 for CVE-2020-27767",
          "url": "https://bugzilla.suse.com/1179322"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179346 for CVE-2020-27767",
          "url": "https://bugzilla.suse.com/1179346"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-15T15:30:02Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-27767"
    },
    {
      "cve": "CVE-2020-27768",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27768"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In ImageMagick, there is an outside the range of representable values of type \u0027unsigned int\u0027 at MagickCore/quantum-private.h. This flaw affects ImageMagick versions prior to 7.0.9-0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27768",
          "url": "https://www.suse.com/security/cve/CVE-2020-27768"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179339 for CVE-2020-27768",
          "url": "https://bugzilla.suse.com/1179339"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-15T15:30:02Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-27768"
    },
    {
      "cve": "CVE-2020-27769",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27769"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In ImageMagick versions before 7.0.9-0, there are outside the range of representable values of type \u0027float\u0027 at MagickCore/quantize.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27769",
          "url": "https://www.suse.com/security/cve/CVE-2020-27769"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179321 for CVE-2020-27769",
          "url": "https://bugzilla.suse.com/1179321"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-15T15:30:02Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-27769"
    },
    {
      "cve": "CVE-2020-27771",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27771"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could result in values outside the range of representable for the unsigned char type. The patch casts the return value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered when ImageMagick processes a crafted pdf file. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was demonstrated in this case. This flaw affects ImageMagick versions prior to 7.0.9-0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27771",
          "url": "https://www.suse.com/security/cve/CVE-2020-27771"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179327 for CVE-2020-27771",
          "url": "https://bugzilla.suse.com/1179327"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-15T15:30:02Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-27771"
    },
    {
      "cve": "CVE-2020-27772",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27772"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27772",
          "url": "https://www.suse.com/security/cve/CVE-2020-27772"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179347 for CVE-2020-27772",
          "url": "https://bugzilla.suse.com/1179347"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-15T15:30:02Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-27772"
    },
    {
      "cve": "CVE-2020-27775",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27775"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27775",
          "url": "https://www.suse.com/security/cve/CVE-2020-27775"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179338 for CVE-2020-27775",
          "url": "https://bugzilla.suse.com/1179338"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-32bit-6.4.3.6-78.135.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:libMagickCore1-6.4.3.6-78.135.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-01-15T15:30:02Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-27775"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…