[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-SUSE-SU-2022:1749-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-08T20:11:31.826Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":36,"duplicates":37,"related":38,"reserved_at":9,"published_at":50,"modified_at":51,"state":9,"summary":52,"references_raw":54,"kevs":151,"epss":9,"epss_history":152,"metrics":153,"affected":154},"SUSE-SU-2022:1749-1","Security update for dcraw\n\nThis update for dcraw fixes the following issues:\n\n- CVE-2017-13735: Fixed a denial of service issue due to a floating point\n  exception (bsc#1056170).\n- CVE-2017-14608: Fixed an invalid memory access that could lead to information\n  disclosure or denial of service (bsc#1063798).\n- CVE-2018-19655: Fixed a buffer overflow that could lead to an application\n  crash (bsc#1117896).\n- CVE-2018-5801: Fixed an invalid memory access that could lead to denial of\n  service (bsc#1084690).\n- CVE-2018-5805: Fixed a buffer overflow that could lead to an application crash\n  (bsc#1097973).\n- CVE-2018-5806: Fixed an invalid memory access that could lead to denial of\n  service (bsc#1097974).\n- CVE-2018-19565: Fixed an invalid memory access that could lead to information\n  disclosure or denial of service (bsc#1117622).\n- CVE-2018-19566: Fixed an invalid memory access that could lead to information\n  disclosure or denial of service (bsc#1117517).\n- CVE-2018-19567: Fixed a denial of service issue due to a floating point\n  exception (bsc#1117512).\n- CVE-2018-19568: Fixed a denial of service issue due to a floating point\n  exception (bsc#1117436).\n- CVE-2021-3624: Fixed a buffer overflow that could lead to code execution or\n  denial of service (bsc#1189642).\n\nNon-security fixes:\n\n- Updated to version 9.28.0.\n",null,[],[],[],[14,16,18,20,22,24,26,28,30,32,34],{"_key":15},"CVE-2017-13735",{"_key":17},"CVE-2017-14608",{"_key":19},"CVE-2018-19565",{"_key":21},"CVE-2018-19566",{"_key":23},"CVE-2018-19567",{"_key":25},"CVE-2018-19568",{"_key":27},"CVE-2018-19655",{"_key":29},"CVE-2018-5801",{"_key":31},"CVE-2018-5805",{"_key":33},"CVE-2018-5806",{"_key":35},"CVE-2021-3624",[],[],[39,40,41,42,43,44,45,46,47,48,49],{"_key":15},{"_key":17},{"_key":19},{"_key":21},{"_key":23},{"_key":25},{"_key":27},{"_key":29},{"_key":31},{"_key":33},{"_key":35},"2022-05-19T13:24:56Z","2026-02-04T03:48:46.791697Z",{"cisa_kev":53,"cisa_ransomware":53,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[55,61,66,70,74,78,82,86,90,94,98,102,106,111,115,119,123,127,131,135,139,143,147],{"url":56,"sources":57,"tags":59},"https://www.suse.com/support/update/announcement/2022/suse-su-20221749-1/",[58],"osv_suse",[60],"Advisory",{"url":62,"sources":63,"tags":64},"https://bugzilla.suse.com/1056170",[58],[65],"REPORT",{"url":67,"sources":68,"tags":69},"https://bugzilla.suse.com/1063798",[58],[65],{"url":71,"sources":72,"tags":73},"https://bugzilla.suse.com/1084690",[58],[65],{"url":75,"sources":76,"tags":77},"https://bugzilla.suse.com/1097973",[58],[65],{"url":79,"sources":80,"tags":81},"https://bugzilla.suse.com/1097974",[58],[65],{"url":83,"sources":84,"tags":85},"https://bugzilla.suse.com/1117436",[58],[65],{"url":87,"sources":88,"tags":89},"https://bugzilla.suse.com/1117512",[58],[65],{"url":91,"sources":92,"tags":93},"https://bugzilla.suse.com/1117517",[58],[65],{"url":95,"sources":96,"tags":97},"https://bugzilla.suse.com/1117622",[58],[65],{"url":99,"sources":100,"tags":101},"https://bugzilla.suse.com/1117896",[58],[65],{"url":103,"sources":104,"tags":105},"https://bugzilla.suse.com/1189642",[58],[65],{"url":107,"sources":108,"tags":109},"https://www.suse.com/security/cve/CVE-2017-13735",[58],[110],"WEB",{"url":112,"sources":113,"tags":114},"https://www.suse.com/security/cve/CVE-2017-14608",[58],[110],{"url":116,"sources":117,"tags":118},"https://www.suse.com/security/cve/CVE-2018-19565",[58],[110],{"url":120,"sources":121,"tags":122},"https://www.suse.com/security/cve/CVE-2018-19566",[58],[110],{"url":124,"sources":125,"tags":126},"https://www.suse.com/security/cve/CVE-2018-19567",[58],[110],{"url":128,"sources":129,"tags":130},"https://www.suse.com/security/cve/CVE-2018-19568",[58],[110],{"url":132,"sources":133,"tags":134},"https://www.suse.com/security/cve/CVE-2018-19655",[58],[110],{"url":136,"sources":137,"tags":138},"https://www.suse.com/security/cve/CVE-2018-5801",[58],[110],{"url":140,"sources":141,"tags":142},"https://www.suse.com/security/cve/CVE-2018-5805",[58],[110],{"url":144,"sources":145,"tags":146},"https://www.suse.com/security/cve/CVE-2018-5806",[58],[110],{"url":148,"sources":149,"tags":150},"https://www.suse.com/security/cve/CVE-2021-3624",[58],[110],[],[],[],[155,168],{"ecosystem":156,"name":157,"vendor":158,"product":159,"cpe_part":9,"purl_type":160,"purl_namespace":158,"purl_name":159,"source":9,"versions":161},"SUSE Linux Enterprise","dcraw","suse","dcraw&distro=SUSE Linux Enterprise Software Development Kit 12 SP5","rpm",[162],{"version":163,"is_range":164,"range_type":165,"version_start":9,"version_start_type":9,"version_end":166,"version_end_type":167,"fixed_in":9},"lt9_28_0_3_3_1",true,"ecosystem","9.28.0-3.3.1","excluding",{"ecosystem":156,"name":157,"vendor":158,"product":169,"cpe_part":9,"purl_type":160,"purl_namespace":158,"purl_name":169,"source":9,"versions":170},"dcraw&distro=SUSE Linux Enterprise Workstation Extension 12 SP5",[171],{"version":163,"is_range":164,"range_type":165,"version_start":9,"version_start_type":9,"version_end":166,"version_end_type":167,"fixed_in":9}]