[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-SUSE-SU-2019:0133-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-08T14:11:31.067Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":28,"duplicates":29,"related":30,"reserved_at":9,"published_at":38,"modified_at":39,"state":9,"summary":40,"references_raw":42,"kevs":107,"epss":9,"epss_history":108,"metrics":109,"affected":110},"SUSE-SU-2019:0133-1","Security update for libraw\n\nThis update for libraw fixes the following issues:\n\nSecurity issues fixed:                                                                     \n                                                                                                            \n- CVE-2018-20337: Fixed a stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (bsc#1120519)\n- CVE-2018-20365: Fixed a heap-based buffer overflow in the raw2image function of libraw_cxx.cpp (bsc#1120500)\n- CVE-2018-20364: Fixed a NULL pointer dereference in the copy_bayer function of libraw_cxx.cpp (bsc#1120499)\n- CVE-2018-20363: Fixed a NULL pointer dereference in the raw2image function of libraw_cxx.cpp (bsc#1120498)          \n- CVE-2018-5817: Fixed an infinite loop in the unpacked_load_raw function of dcraw_common.cpp (bsc#1120515)\n- CVE-2018-5818: Fixed an infinite loop in the parse_rollei function of dcraw_common.cpp (bsc#1120516)    \n- CVE-2018-5819: Fixed a denial of service in the parse_sinar_ia function of dcraw_common.cpp (bsc#1120517)\n",null,[],[],[],[14,16,18,20,22,24,26],{"_key":15},"CVE-2018-20337",{"_key":17},"CVE-2018-20363",{"_key":19},"CVE-2018-20364",{"_key":21},"CVE-2018-20365",{"_key":23},"CVE-2018-5817",{"_key":25},"CVE-2018-5818",{"_key":27},"CVE-2018-5819",[],[],[31,32,33,34,35,36,37],{"_key":15},{"_key":17},{"_key":19},{"_key":21},{"_key":23},{"_key":25},{"_key":27},"2019-01-21T08:35:56Z","2026-02-04T04:36:47.424131Z",{"cisa_kev":41,"cisa_ransomware":41,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[43,49,54,58,62,66,70,74,78,83,87,91,95,99,103],{"url":44,"sources":45,"tags":47},"https://www.suse.com/support/update/announcement/2019/suse-su-20190133-1/",[46],"osv_suse",[48],"Advisory",{"url":50,"sources":51,"tags":52},"https://bugzilla.suse.com/1120498",[46],[53],"REPORT",{"url":55,"sources":56,"tags":57},"https://bugzilla.suse.com/1120499",[46],[53],{"url":59,"sources":60,"tags":61},"https://bugzilla.suse.com/1120500",[46],[53],{"url":63,"sources":64,"tags":65},"https://bugzilla.suse.com/1120515",[46],[53],{"url":67,"sources":68,"tags":69},"https://bugzilla.suse.com/1120516",[46],[53],{"url":71,"sources":72,"tags":73},"https://bugzilla.suse.com/1120517",[46],[53],{"url":75,"sources":76,"tags":77},"https://bugzilla.suse.com/1120519",[46],[53],{"url":79,"sources":80,"tags":81},"https://www.suse.com/security/cve/CVE-2018-20337",[46],[82],"WEB",{"url":84,"sources":85,"tags":86},"https://www.suse.com/security/cve/CVE-2018-20363",[46],[82],{"url":88,"sources":89,"tags":90},"https://www.suse.com/security/cve/CVE-2018-20364",[46],[82],{"url":92,"sources":93,"tags":94},"https://www.suse.com/security/cve/CVE-2018-20365",[46],[82],{"url":96,"sources":97,"tags":98},"https://www.suse.com/security/cve/CVE-2018-5817",[46],[82],{"url":100,"sources":101,"tags":102},"https://www.suse.com/security/cve/CVE-2018-5818",[46],[82],{"url":104,"sources":105,"tags":106},"https://www.suse.com/security/cve/CVE-2018-5819",[46],[82],[],[],[],[111],{"ecosystem":112,"name":113,"vendor":114,"product":115,"cpe_part":9,"purl_type":116,"purl_namespace":114,"purl_name":115,"source":9,"versions":117},"SUSE Linux Enterprise","libraw","suse","libraw&distro=SUSE Linux Enterprise Workstation Extension 15","rpm",[118],{"version":119,"is_range":120,"range_type":121,"version_start":9,"version_start_type":9,"version_end":122,"version_end_type":123,"fixed_in":9},"lt0_18_9_3_8_1",true,"ecosystem","0.18.9-3.8.1","excluding"]