{"id":"RHSA-2020:1577","summary":"Red Hat Security Advisory: exiv2 security, bug fix, and enhancement update","modified":"2026-05-13T10:09:05Z","published":"2024-09-16T02:58:35Z","upstream":["CVE-2017-18005","CVE-2018-10772","CVE-2018-11037","CVE-2018-14338","CVE-2018-17229","CVE-2018-17230","CVE-2018-17282","CVE-2018-17581","CVE-2018-18915","CVE-2018-19107","CVE-2018-19108","CVE-2018-19535","CVE-2018-19607","CVE-2018-20096","CVE-2018-20097","CVE-2018-20098","CVE-2018-20099","CVE-2018-4868","CVE-2018-9303","CVE-2018-9304","CVE-2018-9305","CVE-2018-9306","CVE-2019-13109","CVE-2019-13111","CVE-2019-13112","CVE-2019-13113","CVE-2019-13114","CVE-2019-20421","CVE-2019-9143"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:1577"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1531171"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1531724"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1566725"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1566731"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1566735"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1566737"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1579544"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1594627"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1609396"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1632481"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1632484"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1632490"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1635045"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646555"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1649094"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1649101"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1651917"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1656187"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1656195"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1660423"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1660424"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1660425"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1660426"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1684381"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1728484"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1728488"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1728490"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1728492"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1728494"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1757444"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1757445"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1767748"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1800472"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_1577.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-18005"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-18005"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18005"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-4868"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-4868"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-4868"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-9303"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-9303"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-9303"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-9304"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-9304"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-9304"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-9305"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-9305"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-9305"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-9306"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-9306"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-9306"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-10772"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-10772"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10772"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-11037"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-11037"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11037"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-14338"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-14338"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14338"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-17229"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-17229"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-17229"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-17230"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-17230"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-17230"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-17282"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-17282"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-17282"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-17581"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-17581"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-17581"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-18915"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-18915"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-18915"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-19107"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-19107"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-19107"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-19108"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-19108"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-19108"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-19535"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-19535"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-19535"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-19607"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-19607"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-19607"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-20096"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-20096"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20096"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-20097"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-20097"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20097"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-20098"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-20098"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20098"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-20099"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-20099"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20099"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-9143"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-9143"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9143"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13109"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-13109"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13109"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13111"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-13111"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13111"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13112"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-13112"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13112"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13113"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-13113"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13113"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-13114"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-13114"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13114"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-20421"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-20421"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20421"}],"affected":[{"package":{"name":"exiv2","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/exiv2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.27.2-5.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"exiv2-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/exiv2-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.27.2-5.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"exiv2-debugsource","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/exiv2-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.27.2-5.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"exiv2-devel","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/exiv2-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.27.2-5.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"exiv2-doc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/exiv2-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.27.2-5.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"exiv2-libs","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/exiv2-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.27.2-5.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"exiv2-libs-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/exiv2-libs-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.27.2-5.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"gegl","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/gegl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.2.0-39.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"gegl-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/gegl-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.2.0-39.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"gegl-debugsource","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/gegl-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.2.0-39.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"gnome-color-manager","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/gnome-color-manager"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.28.0-3.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"gnome-color-manager-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/gnome-color-manager-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.28.0-3.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"gnome-color-manager-debugsource","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/gnome-color-manager-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.28.0-3.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"libgexiv2","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/libgexiv2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.10.8-4.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"libgexiv2-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/libgexiv2-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.10.8-4.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"libgexiv2-debugsource","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/libgexiv2-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.10.8-4.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"libgexiv2-devel","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/libgexiv2-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.10.8-4.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"exiv2","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/exiv2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.27.2-5.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"exiv2-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/exiv2-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.27.2-5.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"exiv2-debugsource","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/exiv2-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.27.2-5.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"exiv2-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/exiv2-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.27.2-5.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"exiv2-doc","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/exiv2-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.27.2-5.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"exiv2-libs","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/exiv2-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.27.2-5.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"exiv2-libs-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/exiv2-libs-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.27.2-5.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"libgexiv2","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/libgexiv2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.10.8-4.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"libgexiv2-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/libgexiv2-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.10.8-4.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"libgexiv2-debugsource","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/libgexiv2-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.10.8-4.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}},{"package":{"name":"libgexiv2-devel","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/libgexiv2-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.10.8-4.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:1577.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}