{"id":"RHSA-2020:1180","summary":"Red Hat Security Advisory: ImageMagick security, bug fix, and enhancement update","modified":"2026-03-11T07:16:34.902072Z","published":"2024-09-16T03:13:45Z","upstream":["CVE-2017-1000476","CVE-2017-11166","CVE-2017-12805","CVE-2017-12806","CVE-2017-18251","CVE-2017-18252","CVE-2017-18254","CVE-2017-18271","CVE-2017-18273","CVE-2018-10177","CVE-2018-10804","CVE-2018-10805","CVE-2018-11656","CVE-2018-12599","CVE-2018-12600","CVE-2018-13153","CVE-2018-14434","CVE-2018-14435","CVE-2018-14436","CVE-2018-14437","CVE-2018-15607","CVE-2018-16328","CVE-2018-16640","CVE-2018-16642","CVE-2018-16643","CVE-2018-16644","CVE-2018-16645","CVE-2018-16749","CVE-2018-16750","CVE-2018-17966","CVE-2018-17967","CVE-2018-18016","CVE-2018-18024","CVE-2018-18544","CVE-2018-20467","CVE-2018-8804","CVE-2018-9133","CVE-2019-10131","CVE-2019-10650","CVE-2019-11470","CVE-2019-11472","CVE-2019-11597","CVE-2019-11598","CVE-2019-12974","CVE-2019-12975","CVE-2019-12976","CVE-2019-12978","CVE-2019-12979","CVE-2019-13133","CVE-2019-13134","CVE-2019-13135","CVE-2019-13295","CVE-2019-13297","CVE-2019-13300","CVE-2019-13301","CVE-2019-13304","CVE-2019-13305","CVE-2019-13306","CVE-2019-13307","CVE-2019-13309","CVE-2019-13310","CVE-2019-13311","CVE-2019-13454","CVE-2019-14980","CVE-2019-14981","CVE-2019-15139","CVE-2019-15140","CVE-2019-15141","CVE-2019-16708","CVE-2019-16709","CVE-2019-16710","CVE-2019-16711","CVE-2019-16712","CVE-2019-16713","CVE-2019-17540","CVE-2019-17541","CVE-2019-19948","CVE-2019-19949","CVE-2019-7175","CVE-2019-7397","CVE-2019-7398","CVE-2019-9956"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:1180"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.8_release_notes/index"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1532845"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1559892"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1561741"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1561742"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1561744"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1563875"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1572044"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1577398"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1577399"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1581486"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1581489"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1588170"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1594338"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1594339"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1598471"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1609933"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1609936"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1609939"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1609942"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1622738"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1624955"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1627916"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1627917"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1642614"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1664845"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1672560"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1672564"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1687436"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1692300"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1700755"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1704762"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1705406"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1705414"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1707768"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1707770"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1708517"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1708521"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1726078"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1726081"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1726104"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1728474"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730329"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730333"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730337"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730351"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730357"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730361"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730364"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730575"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730580"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730596"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730604"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1732278"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1732282"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1732284"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1732292"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1732294"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1743658"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1757779"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1757911"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1764595"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1765205"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1765208"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1765211"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1765330"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1767087"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1767802"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1767812"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1767828"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1772643"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1792480"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1793177"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801661"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801665"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801667"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801673"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801674"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801681"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_1180.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-11166"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-11166"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-11166"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-12805"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-12805"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12805"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-12806"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-12806"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12806"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-18251"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-18251"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18251"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-18252"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-18252"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18252"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-18254"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-18254"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18254"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-18271"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-18271"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18271"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-18273"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-18273"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18273"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-1000476"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-1000476"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000476"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-8804"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-8804"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8804"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-9133"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-9133"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-9133"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-10177"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-10177"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10177"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-10804"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-10804"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10804"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-10805"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-10805"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10805"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-11656"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-11656"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11656"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-12599"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-12599"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12599"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-12600"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-12600"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12600"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-13153"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-13153"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-13153"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-14434"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-14434"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14434"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-14435"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-14435"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14435"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-14436"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-14436"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14436"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-14437"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-14437"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14437"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-15607"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-15607"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-15607"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-16328"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-16328"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16328"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-16640"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1626570"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-16640"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16640"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-16642"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1626591"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-16642"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16642"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-16643"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1626599"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-16643"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16643"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-16644"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1626606"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-16644"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16644"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-16645"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1626611"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-16645"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16645"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-16749"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-16749"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16749"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-16750"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-16750"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16750"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-17966"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1636587"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-17966"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-17966"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-17967"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1636590"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-17967"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-17967"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-18016"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1636579"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-18016"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-18016"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-18024"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1637189"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-18024"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-18024"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-18544"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-18544"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-18544"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-20467"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-20467"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20467"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-7175"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-7175"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-7175"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-7397"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-7397"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-7397"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-7398"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-7398"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-7398"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-9956"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-9956"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9956"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-10131"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-10131"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10131"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-10650"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-10650"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10650"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-11470"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-11470"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-11470"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-11472"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-11472"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-11472"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-11597"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-11597"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-11597"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-11598"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-11598"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-11598"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-12974"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-12974"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12974"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-12975"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-12975"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12975"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-12976"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-12976"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12976"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-12978"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-12978"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12978"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-12979"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-12979"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12979"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13133"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-13133"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13133"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13134"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-13134"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13134"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13135"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-13135"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13135"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13295"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-13295"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13295"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13297"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-13297"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13297"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13300"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-13300"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13300"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13301"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-13301"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13301"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13304"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-13304"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13304"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13305"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-13305"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13305"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13306"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-13306"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13306"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13307"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-13307"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13307"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13309"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-13309"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13309"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13310"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-13310"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13310"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13311"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-13311"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13311"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13454"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-13454"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13454"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-14980"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-14980"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14980"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-14981"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-14981"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14981"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-15139"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-15139"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15139"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-15140"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-15140"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15140"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-15141"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-15141"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15141"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-16708"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-16708"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16708"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-16709"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-16709"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16709"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-16710"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-16710"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16710"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-16711"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-16711"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16711"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-16712"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-16712"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16712"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-16713"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-16713"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16713"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-17540"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-17540"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17540"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-17541"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-17541"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17541"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19948"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19948"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19948"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-19949"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-19949"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19949"}],"affected":[{"package":{"name":"ImageMagick","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/ImageMagick"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-c++","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/ImageMagick-c%2B%2B"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-c++-devel","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/ImageMagick-c%2B%2B-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/ImageMagick-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-devel","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/ImageMagick-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-doc","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/ImageMagick-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-perl","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/ImageMagick-perl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/emacs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-common","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/emacs-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/emacs-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-el","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/emacs-el"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-filesystem","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/emacs-filesystem"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-nox","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/emacs-nox"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-terminal","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/emacs-terminal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"inkscape","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/inkscape"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.92.2-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"inkscape-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/inkscape-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.92.2-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"inkscape-docs","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/inkscape-docs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.92.2-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"inkscape-view","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/inkscape-view"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.92.2-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"autotrace","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/autotrace"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.31.1-38.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"autotrace-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/autotrace-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.31.1-38.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"autotrace-devel","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/autotrace-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.31.1-38.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/emacs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-common","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/emacs-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/emacs-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-el","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/emacs-el"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-filesystem","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/emacs-filesystem"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-nox","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/emacs-nox"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-terminal","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/emacs-terminal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/ImageMagick"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-c++","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/ImageMagick-c%2B%2B"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-c++-devel","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/ImageMagick-c%2B%2B-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/ImageMagick-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-devel","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/ImageMagick-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-doc","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/ImageMagick-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-perl","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/ImageMagick-perl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"autotrace","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/autotrace"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.31.1-38.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"autotrace-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/autotrace-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.31.1-38.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"autotrace-devel","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/autotrace-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.31.1-38.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"inkscape","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/inkscape"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.92.2-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"inkscape-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/inkscape-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.92.2-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"inkscape-docs","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/inkscape-docs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.92.2-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"inkscape-view","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/inkscape-view"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.92.2-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/ImageMagick"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-c++","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/ImageMagick-c%2B%2B"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-c++-devel","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/ImageMagick-c%2B%2B-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/ImageMagick-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-devel","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/ImageMagick-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-doc","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/ImageMagick-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-perl","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/ImageMagick-perl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/emacs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-common","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/emacs-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/emacs-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-el","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/emacs-el"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-filesystem","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/emacs-filesystem"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-nox","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/emacs-nox"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-terminal","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/emacs-terminal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"inkscape","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/inkscape"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.92.2-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"inkscape-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/inkscape-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.92.2-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"inkscape-docs","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/inkscape-docs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.92.2-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"inkscape-view","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/inkscape-view"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.92.2-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"autotrace","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/autotrace"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.31.1-38.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"autotrace-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/autotrace-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.31.1-38.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"autotrace-devel","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/autotrace-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.31.1-38.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/ImageMagick"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-c++","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/ImageMagick-c%2B%2B"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-c++-devel","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/ImageMagick-c%2B%2B-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/ImageMagick-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-devel","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/ImageMagick-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-doc","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/ImageMagick-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"ImageMagick-perl","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/ImageMagick-perl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.9.10.68-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/emacs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-common","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/emacs-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/emacs-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-el","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/emacs-el"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-filesystem","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/emacs-filesystem"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-nox","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/emacs-nox"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"emacs-terminal","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/emacs-terminal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:24.3-23.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"inkscape","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/inkscape"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.92.2-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"inkscape-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/inkscape-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.92.2-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"inkscape-docs","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/inkscape-docs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.92.2-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"inkscape-view","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/inkscape-view"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.92.2-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"autotrace","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/autotrace"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.31.1-38.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"autotrace-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/autotrace-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.31.1-38.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}},{"package":{"name":"autotrace-devel","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/autotrace-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.31.1-38.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1180.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}