<div class="container">
<h1>Security update for ImageMagick</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2023:4634-1</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1153866">bsc#1153866</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1181836">bsc#1181836</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1182325">bsc#1182325</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1182335">bsc#1182335</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1182336">bsc#1182336</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1182337">bsc#1182337</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1184624">bsc#1184624</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1184626">bsc#1184626</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1184627">bsc#1184627</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1184628">bsc#1184628</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195563">bsc#1195563</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1197147">bsc#1197147</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1199350">bsc#1199350</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1200387">bsc#1200387</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1200388">bsc#1200388</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1200389">bsc#1200389</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1202250">bsc#1202250</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1202800">bsc#1202800</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207982">bsc#1207982</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207983">bsc#1207983</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209141">bsc#1209141</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211791">bsc#1211791</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213624">bsc#1213624</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214578">bsc#1214578</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215939">bsc#1215939</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2019-17540.html">CVE-2019-17540</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2020-21679.html">CVE-2020-21679</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-20176.html">CVE-2021-20176</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-20224.html">CVE-2021-20224</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-20241.html">CVE-2021-20241</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-20243.html">CVE-2021-20243</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-20244.html">CVE-2021-20244</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-20246.html">CVE-2021-20246</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-20309.html">CVE-2021-20309</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-20311.html">CVE-2021-20311</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-20312.html">CVE-2021-20312</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-20313.html">CVE-2021-20313</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-0284.html">CVE-2022-0284</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-2719.html">CVE-2022-2719</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-28463.html">CVE-2022-28463</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-32545.html">CVE-2022-32545</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-32546.html">CVE-2022-32546</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-32547.html">CVE-2022-32547</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-44267.html">CVE-2022-44267</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-44268.html">CVE-2022-44268</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-1289.html">CVE-2023-1289</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-34151.html">CVE-2023-34151</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-3745.html">CVE-2023-3745</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-5341.html">CVE-2023-5341</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2019-17540</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.1</span>
<span class="cvss-vector">CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2020-21679</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-20176</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-20176</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-20224</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-20224</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-20241</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-20241</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-20243</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-20243</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-20244</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-20244</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-20246</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-20246</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-20309</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-20309</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-20311</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-20311</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-20312</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-20312</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-20313</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-20313</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-0284</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-0284</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-2719</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-2719</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-28463</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-28463</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-32545</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-32545</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-32546</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-32546</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-32547</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-32547</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-44267</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-44267</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-44268</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-44268</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-1289</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-1289</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-34151</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-34151</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-3745</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-3745</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-5341</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-5341</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">SUSE CaaS Platform 4.0</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP1</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP1</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP1</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves 24 vulnerabilities and has one security fix can now be installed.</p>
<h2>Description:</h2>
<p>This update for ImageMagick fixes the following issues:</p>
<p>Security issues:</p>
<ul>
<li>CVE-2023-5341: Fixed a heap use-after-free in coders/bmp.c. (bsc#1215939)</li>
<li>CVE-2020-21679: Fixed a buffer overflow in WritePCXImage function in pcx.c which may allow a remote attackers to cause a denial of service. (bsc#1214578)</li>
<li>CVE-2023-3745: Fixed heap out of bounds read in PushCharPixel() in quantum-private.h (bsc#1213624).</li>
<li>CVE-2023-34151: Fixed an undefined behavior issue due to floating point truncation (bsc#1211791).</li>
<li>CVE-2023-1289: Fixed segmentation fault and possible DoS via specially crafted SVG. (bsc#1209141)</li>
<li>CVE-2022-44268: Fixed arbitrary file disclosure when parsing a PNG image (bsc#1207983).</li>
<li>CVE-2022-44267: Fixed a denial of service when parsing a PNG image (bsc#1207982).</li>
<li>CVE-2022-32547: Fixed a load of misaligned address at MagickCore/property.c. (bsc#1200387)</li>
<li>CVE-2022-32546: Fixed an outside the range of representable values of type. (bsc#1200389)</li>
<li>CVE-2022-32545: Fixed an outside the range of representable values of type. (bsc#1200388)</li>
<li>CVE-2022-28463: Fixed buffer overflow in coders/cin.c (bsc#1199350).</li>
<li>CVE-2022-2719: Fixed a reachable assertion that could lead to denial of service via a crafted file (bsc#1202250).</li>
<li>CVE-2022-0284: Fixed heap buffer overread in GetPixelAlpha() in MagickCore/pixel-accessor.h (bsc#1195563).</li>
<li>CVE-2021-3574: Fixed memory leaks with convert command (bsc#1203212).</li>
<li>CVE-2021-20313: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c (bsc#1184628)</li>
<li>CVE-2021-20312: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c (bsc#1184627)</li>
<li>CVE-2021-20311: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c (bsc#1184626)</li>
<li>CVE-2021-20309: Division by zero in WaveImage() of MagickCore/visual-effects. (bsc#1184624)</li>
<li>CVE-2021-20246: Division by zero in ScaleResampleFilter in MagickCore/resample.c (bsc#1182337).</li>
<li>CVE-2021-20244: Division by zero in ImplodeImage in MagickCore/visual-effects.c (bsc#1182325).</li>
<li>CVE-2021-20243: Division by zero in GetResizeFilterWeight in MagickCore/resize.c (bsc#1182336).</li>
<li>CVE-2021-20241: Division by zero in WriteJP2Image() in coders/jp2.c (bsc#1182335).</li>
<li>CVE-2021-20224: Fixed an integer overflow that could be triggered via a crafted file (bsc#1202800).</li>
<li>CVE-2021-20176: Fixed an issue where processing a crafted file could lead to division by zero (bsc#1181836).</li>
<li>CVE-2019-17540: Fixed heap-based buffer overflow in ReadPSInfo in coders/ps.c. (bsc#1153866)</li>
</ul>
<p>Bugfixes:</p>
<ul>
<li>Use png_get_eXIf_1 when available (bsc#1197147).</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
SUSE CaaS Platform 4.0
<br/>
<span>
To install this update, use the SUSE CaaS Platform 'skuba' tool. It will
inform you if it detects new updates and let you then trigger updating of
the complete cluster in a controlled way.
</span>
</li>
<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
<br/>
<code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-4634=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
<br/>
<code>zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-4634=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Server for SAP Applications 15 SP1
<br/>
<code>zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-4634=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
SUSE CaaS Platform 4.0 (x86_64)
<ul>
<li>libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-config-7-SUSE-7.0.7.34-150000.3.123.1</li>
<li>libMagick++-devel-7.0.7.34-150000.3.123.1</li>
<li>libMagickWand-7_Q16HDRI6-7.0.7.34-150000.3.123.1</li>
<li>libMagick++-7_Q16HDRI4-7.0.7.34-150000.3.123.1</li>
<li>libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-150000.3.123.1</li>
<li>perl-PerlMagick-debuginfo-7.0.7.34-150000.3.123.1</li>
<li>perl-PerlMagick-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-config-7-upstream-7.0.7.34-150000.3.123.1</li>
<li>libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-debugsource-7.0.7.34-150000.3.123.1</li>
<li>libMagickCore-7_Q16HDRI6-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-devel-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-debuginfo-7.0.7.34-150000.3.123.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64)
<ul>
<li>libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-config-7-SUSE-7.0.7.34-150000.3.123.1</li>
<li>libMagick++-devel-7.0.7.34-150000.3.123.1</li>
<li>libMagickWand-7_Q16HDRI6-7.0.7.34-150000.3.123.1</li>
<li>libMagick++-7_Q16HDRI4-7.0.7.34-150000.3.123.1</li>
<li>libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-150000.3.123.1</li>
<li>perl-PerlMagick-debuginfo-7.0.7.34-150000.3.123.1</li>
<li>perl-PerlMagick-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-config-7-upstream-7.0.7.34-150000.3.123.1</li>
<li>libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-debugsource-7.0.7.34-150000.3.123.1</li>
<li>libMagickCore-7_Q16HDRI6-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-devel-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-debuginfo-7.0.7.34-150000.3.123.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64)
<ul>
<li>libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-config-7-SUSE-7.0.7.34-150000.3.123.1</li>
<li>libMagick++-devel-7.0.7.34-150000.3.123.1</li>
<li>libMagickWand-7_Q16HDRI6-7.0.7.34-150000.3.123.1</li>
<li>libMagick++-7_Q16HDRI4-7.0.7.34-150000.3.123.1</li>
<li>libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-150000.3.123.1</li>
<li>perl-PerlMagick-debuginfo-7.0.7.34-150000.3.123.1</li>
<li>perl-PerlMagick-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-config-7-upstream-7.0.7.34-150000.3.123.1</li>
<li>libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-debugsource-7.0.7.34-150000.3.123.1</li>
<li>libMagickCore-7_Q16HDRI6-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-devel-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-debuginfo-7.0.7.34-150000.3.123.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64)
<ul>
<li>libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-config-7-SUSE-7.0.7.34-150000.3.123.1</li>
<li>libMagick++-devel-7.0.7.34-150000.3.123.1</li>
<li>libMagickWand-7_Q16HDRI6-7.0.7.34-150000.3.123.1</li>
<li>libMagick++-7_Q16HDRI4-7.0.7.34-150000.3.123.1</li>
<li>libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-150000.3.123.1</li>
<li>perl-PerlMagick-debuginfo-7.0.7.34-150000.3.123.1</li>
<li>perl-PerlMagick-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-config-7-upstream-7.0.7.34-150000.3.123.1</li>
<li>libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-debugsource-7.0.7.34-150000.3.123.1</li>
<li>libMagickCore-7_Q16HDRI6-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-devel-7.0.7.34-150000.3.123.1</li>
<li>ImageMagick-debuginfo-7.0.7.34-150000.3.123.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2019-17540.html">https://www.suse.com/security/cve/CVE-2019-17540.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2020-21679.html">https://www.suse.com/security/cve/CVE-2020-21679.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-20176.html">https://www.suse.com/security/cve/CVE-2021-20176.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-20224.html">https://www.suse.com/security/cve/CVE-2021-20224.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-20241.html">https://www.suse.com/security/cve/CVE-2021-20241.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-20243.html">https://www.suse.com/security/cve/CVE-2021-20243.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-20244.html">https://www.suse.com/security/cve/CVE-2021-20244.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-20246.html">https://www.suse.com/security/cve/CVE-2021-20246.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-20309.html">https://www.suse.com/security/cve/CVE-2021-20309.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-20311.html">https://www.suse.com/security/cve/CVE-2021-20311.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-20312.html">https://www.suse.com/security/cve/CVE-2021-20312.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-20313.html">https://www.suse.com/security/cve/CVE-2021-20313.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-0284.html">https://www.suse.com/security/cve/CVE-2022-0284.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-2719.html">https://www.suse.com/security/cve/CVE-2022-2719.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-28463.html">https://www.suse.com/security/cve/CVE-2022-28463.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-32545.html">https://www.suse.com/security/cve/CVE-2022-32545.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-32546.html">https://www.suse.com/security/cve/CVE-2022-32546.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-32547.html">https://www.suse.com/security/cve/CVE-2022-32547.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-44267.html">https://www.suse.com/security/cve/CVE-2022-44267.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-44268.html">https://www.suse.com/security/cve/CVE-2022-44268.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-1289.html">https://www.suse.com/security/cve/CVE-2023-1289.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-34151.html">https://www.suse.com/security/cve/CVE-2023-34151.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-3745.html">https://www.suse.com/security/cve/CVE-2023-3745.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-5341.html">https://www.suse.com/security/cve/CVE-2023-5341.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1153866">https://bugzilla.suse.com/show_bug.cgi?id=1153866</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1181836">https://bugzilla.suse.com/show_bug.cgi?id=1181836</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1182325">https://bugzilla.suse.com/show_bug.cgi?id=1182325</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1182335">https://bugzilla.suse.com/show_bug.cgi?id=1182335</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1182336">https://bugzilla.suse.com/show_bug.cgi?id=1182336</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1182337">https://bugzilla.suse.com/show_bug.cgi?id=1182337</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1184624">https://bugzilla.suse.com/show_bug.cgi?id=1184624</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1184626">https://bugzilla.suse.com/show_bug.cgi?id=1184626</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1184627">https://bugzilla.suse.com/show_bug.cgi?id=1184627</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1184628">https://bugzilla.suse.com/show_bug.cgi?id=1184628</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1195563">https://bugzilla.suse.com/show_bug.cgi?id=1195563</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1197147">https://bugzilla.suse.com/show_bug.cgi?id=1197147</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1199350">https://bugzilla.suse.com/show_bug.cgi?id=1199350</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1200387">https://bugzilla.suse.com/show_bug.cgi?id=1200387</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1200388">https://bugzilla.suse.com/show_bug.cgi?id=1200388</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1200389">https://bugzilla.suse.com/show_bug.cgi?id=1200389</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1202250">https://bugzilla.suse.com/show_bug.cgi?id=1202250</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1202800">https://bugzilla.suse.com/show_bug.cgi?id=1202800</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207982">https://bugzilla.suse.com/show_bug.cgi?id=1207982</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207983">https://bugzilla.suse.com/show_bug.cgi?id=1207983</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209141">https://bugzilla.suse.com/show_bug.cgi?id=1209141</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211791">https://bugzilla.suse.com/show_bug.cgi?id=1211791</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213624">https://bugzilla.suse.com/show_bug.cgi?id=1213624</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214578">https://bugzilla.suse.com/show_bug.cgi?id=1214578</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215939">https://bugzilla.suse.com/show_bug.cgi?id=1215939</a>
</li>
</ul>
</div>