[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-SUSE-SU-2019:0127-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-08T14:11:31.067Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":26,"duplicates":27,"related":28,"reserved_at":9,"published_at":35,"modified_at":36,"state":9,"summary":37,"references_raw":39,"kevs":96,"epss":9,"epss_history":97,"metrics":98,"affected":99},"SUSE-SU-2019:0127-1","Security update for libraw\n\nThis update for libraw fixes the following issues:\n\nSecurity issues fixed:                                                                                                                               \n                                                                                                            \n- CVE-2018-20365: Fixed a heap-based buffer overflow in the raw2image function of libraw_cxx.cpp (bsc#1120500)     \n- CVE-2018-20364: Fixed a NULL pointer dereference in the copy_bayer function of libraw_cxx.cpp (bsc#1120499)          \n- CVE-2018-20363: Fixed a NULL pointer dereference in the raw2image function of libraw_cxx.cpp (bsc#1120498)       \n- CVE-2018-5817: Fixed an infinite loop in the unpacked_load_raw function of dcraw_common.cpp (bsc#1120515)\n- CVE-2018-5818: Fixed an infinite loop in the parse_rollei function of dcraw_common.cpp (bsc#1120516)\n- CVE-2018-5819: Fixed a denial of service in the parse_sinar_ia function of dcraw_common.cpp (bsc#1120517)\n",null,[],[],[],[14,16,18,20,22,24],{"_key":15},"CVE-2018-20363",{"_key":17},"CVE-2018-20364",{"_key":19},"CVE-2018-20365",{"_key":21},"CVE-2018-5817",{"_key":23},"CVE-2018-5818",{"_key":25},"CVE-2018-5819",[],[],[29,30,31,32,33,34],{"_key":15},{"_key":17},{"_key":19},{"_key":21},{"_key":23},{"_key":25},"2019-01-18T13:20:35Z","2026-02-04T04:21:39.533144Z",{"cisa_kev":38,"cisa_ransomware":38,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[40,46,51,55,59,63,67,71,76,80,84,88,92],{"url":41,"sources":42,"tags":44},"https://www.suse.com/support/update/announcement/2019/suse-su-20190127-1/",[43],"osv_suse",[45],"Advisory",{"url":47,"sources":48,"tags":49},"https://bugzilla.suse.com/1120498",[43],[50],"REPORT",{"url":52,"sources":53,"tags":54},"https://bugzilla.suse.com/1120499",[43],[50],{"url":56,"sources":57,"tags":58},"https://bugzilla.suse.com/1120500",[43],[50],{"url":60,"sources":61,"tags":62},"https://bugzilla.suse.com/1120515",[43],[50],{"url":64,"sources":65,"tags":66},"https://bugzilla.suse.com/1120516",[43],[50],{"url":68,"sources":69,"tags":70},"https://bugzilla.suse.com/1120517",[43],[50],{"url":72,"sources":73,"tags":74},"https://www.suse.com/security/cve/CVE-2018-20363",[43],[75],"WEB",{"url":77,"sources":78,"tags":79},"https://www.suse.com/security/cve/CVE-2018-20364",[43],[75],{"url":81,"sources":82,"tags":83},"https://www.suse.com/security/cve/CVE-2018-20365",[43],[75],{"url":85,"sources":86,"tags":87},"https://www.suse.com/security/cve/CVE-2018-5817",[43],[75],{"url":89,"sources":90,"tags":91},"https://www.suse.com/security/cve/CVE-2018-5818",[43],[75],{"url":93,"sources":94,"tags":95},"https://www.suse.com/security/cve/CVE-2018-5819",[43],[75],[],[],[],[100,113,117,121,125,129],{"ecosystem":101,"name":102,"vendor":103,"product":104,"cpe_part":9,"purl_type":105,"purl_namespace":103,"purl_name":104,"source":9,"versions":106},"SUSE Linux Enterprise","libraw","suse","libraw&distro=SUSE Linux Enterprise Desktop 12 SP3","rpm",[107],{"version":108,"is_range":109,"range_type":110,"version_start":9,"version_start_type":9,"version_end":111,"version_end_type":112,"fixed_in":9},"lt0_15_4_30_1",true,"ecosystem","0.15.4-30.1","excluding",{"ecosystem":101,"name":102,"vendor":103,"product":114,"cpe_part":9,"purl_type":105,"purl_namespace":103,"purl_name":114,"source":9,"versions":115},"libraw&distro=SUSE Linux Enterprise Desktop 12 SP4",[116],{"version":108,"is_range":109,"range_type":110,"version_start":9,"version_start_type":9,"version_end":111,"version_end_type":112,"fixed_in":9},{"ecosystem":101,"name":102,"vendor":103,"product":118,"cpe_part":9,"purl_type":105,"purl_namespace":103,"purl_name":118,"source":9,"versions":119},"libraw&distro=SUSE Linux Enterprise Software Development Kit 12 SP3",[120],{"version":108,"is_range":109,"range_type":110,"version_start":9,"version_start_type":9,"version_end":111,"version_end_type":112,"fixed_in":9},{"ecosystem":101,"name":102,"vendor":103,"product":122,"cpe_part":9,"purl_type":105,"purl_namespace":103,"purl_name":122,"source":9,"versions":123},"libraw&distro=SUSE Linux Enterprise Software Development Kit 12 SP4",[124],{"version":108,"is_range":109,"range_type":110,"version_start":9,"version_start_type":9,"version_end":111,"version_end_type":112,"fixed_in":9},{"ecosystem":101,"name":102,"vendor":103,"product":126,"cpe_part":9,"purl_type":105,"purl_namespace":103,"purl_name":126,"source":9,"versions":127},"libraw&distro=SUSE Linux Enterprise Workstation Extension 12 SP3",[128],{"version":108,"is_range":109,"range_type":110,"version_start":9,"version_start_type":9,"version_end":111,"version_end_type":112,"fixed_in":9},{"ecosystem":101,"name":102,"vendor":103,"product":130,"cpe_part":9,"purl_type":105,"purl_namespace":103,"purl_name":130,"source":9,"versions":131},"libraw&distro=SUSE Linux Enterprise Workstation Extension 12 SP4",[132],{"version":108,"is_range":109,"range_type":110,"version_start":9,"version_start_type":9,"version_end":111,"version_end_type":112,"fixed_in":9}]