[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-SUSE-SU-2018:3343-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-08T20:11:31.826Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":24,"duplicates":25,"related":26,"reserved_at":9,"published_at":32,"modified_at":33,"state":9,"summary":34,"references_raw":36,"kevs":85,"epss":9,"epss_history":86,"metrics":87,"affected":88},"SUSE-SU-2018:3343-1","Security update for libraw\n\nThis update for libraw fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-5800: Fixed heap-based buffer overflow in LibRaw::kodak_ycbcr_load_raw function (bsc#1084691).\n- CVE-2018-5801: Fixed NULL pointer dereference in LibRaw::unpack function (bsc#1084690).\n- CVE-2018-5802: Fixed out-of-bounds read in kodak_radc_load_raw function (bsc#1084688).\n- CVE-2018-5813: Fixed infinite loop in the parse_minolta function (bsc#1103200)\n- CVE-2018-5810: Fixed a heap-based buffer overflow in rollei_load_raw (bsc#1103353)\n\n",null,[],[],[],[14,16,18,20,22],{"_key":15},"CVE-2018-5800",{"_key":17},"CVE-2018-5801",{"_key":19},"CVE-2018-5802",{"_key":21},"CVE-2018-5810",{"_key":23},"CVE-2018-5813",[],[],[27,28,29,30,31],{"_key":15},{"_key":17},{"_key":19},{"_key":21},{"_key":23},"2018-10-23T14:43:27Z","2026-02-04T03:28:48.206746Z",{"cisa_kev":35,"cisa_ransomware":35,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[37,43,48,52,56,60,64,69,73,77,81],{"url":38,"sources":39,"tags":41},"https://www.suse.com/support/update/announcement/2018/suse-su-20183343-1/",[40],"osv_suse",[42],"Advisory",{"url":44,"sources":45,"tags":46},"https://bugzilla.suse.com/1084688",[40],[47],"REPORT",{"url":49,"sources":50,"tags":51},"https://bugzilla.suse.com/1084690",[40],[47],{"url":53,"sources":54,"tags":55},"https://bugzilla.suse.com/1084691",[40],[47],{"url":57,"sources":58,"tags":59},"https://bugzilla.suse.com/1103200",[40],[47],{"url":61,"sources":62,"tags":63},"https://bugzilla.suse.com/1103353",[40],[47],{"url":65,"sources":66,"tags":67},"https://www.suse.com/security/cve/CVE-2018-5800",[40],[68],"WEB",{"url":70,"sources":71,"tags":72},"https://www.suse.com/security/cve/CVE-2018-5801",[40],[68],{"url":74,"sources":75,"tags":76},"https://www.suse.com/security/cve/CVE-2018-5802",[40],[68],{"url":78,"sources":79,"tags":80},"https://www.suse.com/security/cve/CVE-2018-5810",[40],[68],{"url":82,"sources":83,"tags":84},"https://www.suse.com/security/cve/CVE-2018-5813",[40],[68],[],[],[],[89,102,106],{"ecosystem":90,"name":91,"vendor":92,"product":93,"cpe_part":9,"purl_type":94,"purl_namespace":92,"purl_name":93,"source":9,"versions":95},"SUSE Linux Enterprise","libraw","suse","libraw&distro=SUSE Linux Enterprise Desktop 12 SP3","rpm",[96],{"version":97,"is_range":98,"range_type":99,"version_start":9,"version_start_type":9,"version_end":100,"version_end_type":101,"fixed_in":9},"lt0_15_4_21_1",true,"ecosystem","0.15.4-21.1","excluding",{"ecosystem":90,"name":91,"vendor":92,"product":103,"cpe_part":9,"purl_type":94,"purl_namespace":92,"purl_name":103,"source":9,"versions":104},"libraw&distro=SUSE Linux Enterprise Software Development Kit 12 SP3",[105],{"version":97,"is_range":98,"range_type":99,"version_start":9,"version_start_type":9,"version_end":100,"version_end_type":101,"fixed_in":9},{"ecosystem":90,"name":91,"vendor":92,"product":107,"cpe_part":9,"purl_type":94,"purl_namespace":92,"purl_name":107,"source":9,"versions":108},"libraw&distro=SUSE Linux Enterprise Workstation Extension 12 SP3",[109],{"version":97,"is_range":98,"range_type":99,"version_start":9,"version_start_type":9,"version_end":100,"version_end_type":101,"fixed_in":9}]