[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-SUSE-SU-2017:2300-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-08T14:11:31.067Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":28,"duplicates":29,"related":30,"reserved_at":9,"published_at":38,"modified_at":39,"state":9,"summary":40,"references_raw":42,"kevs":103,"epss":9,"epss_history":104,"metrics":105,"affected":106},"SUSE-SU-2017:2300-1","Security update for libraw\n\nThis update for libraw fixes the following issues:\n\n- CVE-2015-3885: A specially crafted raw image file could have caused a Denial of Service\n  through an integer overflow. (bsc#930683)\n\n- CVE-2015-8367: The function phase_one_correct() did not handle memory object initialization\n  correctly, which may have caused some other problems. (bsc#957517)\n\n- CVE-2017-6886: memory corruption in parse_tiff_ifd() func (internal/dcraw_common.cpp) could lead to Denial of service (bsc#1039380)\n\n- CVE-2017-6889: integer overflow error within the 'foveon_load_camf()' function (dcraw_foveon.c) could lead to Denial of service (bsc#1039210)\n\n- CVE-2017-6890: boundary error within the 'foveon_load_camf()' function (dcraw_foveon.c) (bsc#1039209)\n\n",null,[],[],[],[14,16,18,20,22,24,26],{"_key":15},"CVE-2015-3885",{"_key":17},"CVE-2015-8367",{"_key":19},"CVE-2017-6886",{"_key":21},"CVE-2017-6887",{"_key":23},"CVE-2017-6889",{"_key":25},"CVE-2017-6890",{"_key":27},"CVE-2017-6899",[],[],[31,32,33,34,35,36,37],{"_key":15},{"_key":17},{"_key":19},{"_key":21},{"_key":23},{"_key":25},{"_key":27},"2017-08-30T13:16:37Z","2026-02-04T03:35:58.613781Z",{"cisa_kev":41,"cisa_ransomware":41,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[43,49,54,58,62,66,70,74,79,83,87,91,95,99],{"url":44,"sources":45,"tags":47},"https://www.suse.com/support/update/announcement/2017/suse-su-20172300-1/",[46],"osv_suse",[48],"Advisory",{"url":50,"sources":51,"tags":52},"https://bugzilla.suse.com/1039209",[46],[53],"REPORT",{"url":55,"sources":56,"tags":57},"https://bugzilla.suse.com/1039210",[46],[53],{"url":59,"sources":60,"tags":61},"https://bugzilla.suse.com/1039379",[46],[53],{"url":63,"sources":64,"tags":65},"https://bugzilla.suse.com/1039380",[46],[53],{"url":67,"sources":68,"tags":69},"https://bugzilla.suse.com/930683",[46],[53],{"url":71,"sources":72,"tags":73},"https://bugzilla.suse.com/957517",[46],[53],{"url":75,"sources":76,"tags":77},"https://www.suse.com/security/cve/CVE-2015-3885",[46],[78],"WEB",{"url":80,"sources":81,"tags":82},"https://www.suse.com/security/cve/CVE-2015-8367",[46],[78],{"url":84,"sources":85,"tags":86},"https://www.suse.com/security/cve/CVE-2017-6886",[46],[78],{"url":88,"sources":89,"tags":90},"https://www.suse.com/security/cve/CVE-2017-6887",[46],[78],{"url":92,"sources":93,"tags":94},"https://www.suse.com/security/cve/CVE-2017-6889",[46],[78],{"url":96,"sources":97,"tags":98},"https://www.suse.com/security/cve/CVE-2017-6890",[46],[78],{"url":100,"sources":101,"tags":102},"https://www.suse.com/security/cve/CVE-2017-6899",[46],[78],[],[],[],[107,120,124,128,132,136],{"ecosystem":108,"name":109,"vendor":110,"product":111,"cpe_part":9,"purl_type":112,"purl_namespace":110,"purl_name":111,"source":9,"versions":113},"SUSE Linux Enterprise","libraw","suse","libraw&distro=SUSE Linux Enterprise Desktop 12 SP2","rpm",[114],{"version":115,"is_range":116,"range_type":117,"version_start":9,"version_start_type":9,"version_end":118,"version_end_type":119,"fixed_in":9},"lt0_15_4_9_2",true,"ecosystem","0.15.4-9.2","excluding",{"ecosystem":108,"name":109,"vendor":110,"product":121,"cpe_part":9,"purl_type":112,"purl_namespace":110,"purl_name":121,"source":9,"versions":122},"libraw&distro=SUSE Linux Enterprise Desktop 12 SP3",[123],{"version":115,"is_range":116,"range_type":117,"version_start":9,"version_start_type":9,"version_end":118,"version_end_type":119,"fixed_in":9},{"ecosystem":108,"name":109,"vendor":110,"product":125,"cpe_part":9,"purl_type":112,"purl_namespace":110,"purl_name":125,"source":9,"versions":126},"libraw&distro=SUSE Linux Enterprise Software Development Kit 12 SP2",[127],{"version":115,"is_range":116,"range_type":117,"version_start":9,"version_start_type":9,"version_end":118,"version_end_type":119,"fixed_in":9},{"ecosystem":108,"name":109,"vendor":110,"product":129,"cpe_part":9,"purl_type":112,"purl_namespace":110,"purl_name":129,"source":9,"versions":130},"libraw&distro=SUSE Linux Enterprise Software Development Kit 12 SP3",[131],{"version":115,"is_range":116,"range_type":117,"version_start":9,"version_start_type":9,"version_end":118,"version_end_type":119,"fixed_in":9},{"ecosystem":108,"name":109,"vendor":110,"product":133,"cpe_part":9,"purl_type":112,"purl_namespace":110,"purl_name":133,"source":9,"versions":134},"libraw&distro=SUSE Linux Enterprise Workstation Extension 12 SP2",[135],{"version":115,"is_range":116,"range_type":117,"version_start":9,"version_start_type":9,"version_end":118,"version_end_type":119,"fixed_in":9},{"ecosystem":108,"name":109,"vendor":110,"product":137,"cpe_part":9,"purl_type":112,"purl_namespace":110,"purl_name":137,"source":9,"versions":138},"libraw&distro=SUSE Linux Enterprise Workstation Extension 12 SP3",[139],{"version":115,"is_range":116,"range_type":117,"version_start":9,"version_start_type":9,"version_end":118,"version_end_type":119,"fixed_in":9}]