Show plain JSON{"affected_release": [{"advisory": "RHSA-2020:1577", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "exiv2-0:0.27.2-5.el8", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2020-04-28T00:00:00Z"}, {"advisory": "RHSA-2020:1577", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "gegl-0:0.2.0-39.el8", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2020-04-28T00:00:00Z"}, {"advisory": "RHSA-2020:1577", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "gnome-color-manager-0:3.28.0-3.el8", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2020-04-28T00:00:00Z"}, {"advisory": "RHSA-2020:1577", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "libgexiv2-0:0.10.8-4.el8", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2020-04-28T00:00:00Z"}], "bugzilla": {"description": "exiv2: out of bounds read in IptcData::printStructure in iptc.c", "id": "1566737", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566737"}, "csaw": false, "cvss3": {"cvss3_base_score": "4.4", "cvss3_scoring_vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "status": "verified"}, "cwe": "CWE-125", "details": ["[REJECTED CVE] An integer underflow, leading to heap-based out-of-bound read, was found in the way Exiv2 library prints IPTC Photo Metadata embedded in an image. By persuading a victim to open a crafted image, a remote attacker could crash the application or possibly retrieve a portion of memory."], "name": "CVE-2018-9306", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Not affected", "package_name": "exiv2", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Not affected", "package_name": "exiv2", "product_name": "Red Hat Enterprise Linux 7"}], "public_date": "2018-04-04T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2018-9306\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-9306"], "statement": "This flaw was found to be a duplicate of CVE-2017-17724. Please see https://access.redhat.com/security/cve/CVE-2017-17724 for information about affected products and security errata.", "threat_severity": "Low"}