[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-SUSE-SU-2025:1569-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-09T02:11:32.352Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":22,"duplicates":23,"related":24,"reserved_at":9,"published_at":29,"modified_at":30,"state":9,"summary":31,"references_raw":33,"kevs":74,"epss":9,"epss_history":75,"metrics":76,"affected":77},"SUSE-SU-2025:1569-1","Security update for libraw\n\nThis update for libraw fixes the following issues:\n\n- CVE-2025-43961: Fixed out-of-bounds read in the Fujifilm 0xf00c tag parser in metadata/tiff.cpp (bsc#1241643)\n- CVE-2025-43962: Fixed out-of-bounds read when tag 0x412 processing in phase_one_correct function (bsc#1241585)\n- CVE-2025-43963: Fixed out-of-buffer access during phase_one_correct in decoders/load_mfbacks.cpp (bsc#1241642)\n- CVE-2025-43964: Fixed tag 0x412 processing in phase_one_correct  does not enforce minimum w0 and w1 values (bsc#1241584)\n",null,[],[],[],[14,16,18,20],{"_key":15},"CVE-2025-43961",{"_key":17},"CVE-2025-43962",{"_key":19},"CVE-2025-43963",{"_key":21},"CVE-2025-43964",[],[],[25,26,27,28],{"_key":15},{"_key":17},{"_key":19},{"_key":21},"2025-05-16T13:43:41Z","2026-02-04T04:40:22.137099Z",{"cisa_kev":32,"cisa_ransomware":32,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[34,40,45,49,53,57,62,66,70],{"url":35,"sources":36,"tags":38},"https://www.suse.com/support/update/announcement/2025/suse-su-20251569-1/",[37],"osv_suse",[39],"Advisory",{"url":41,"sources":42,"tags":43},"https://bugzilla.suse.com/1241584",[37],[44],"REPORT",{"url":46,"sources":47,"tags":48},"https://bugzilla.suse.com/1241585",[37],[44],{"url":50,"sources":51,"tags":52},"https://bugzilla.suse.com/1241642",[37],[44],{"url":54,"sources":55,"tags":56},"https://bugzilla.suse.com/1241643",[37],[44],{"url":58,"sources":59,"tags":60},"https://www.suse.com/security/cve/CVE-2025-43961",[37],[61],"WEB",{"url":63,"sources":64,"tags":65},"https://www.suse.com/security/cve/CVE-2025-43962",[37],[61],{"url":67,"sources":68,"tags":69},"https://www.suse.com/security/cve/CVE-2025-43963",[37],[61],{"url":71,"sources":72,"tags":73},"https://www.suse.com/security/cve/CVE-2025-43964",[37],[61],[],[],[],[78],{"ecosystem":79,"name":80,"vendor":81,"product":82,"cpe_part":9,"purl_type":83,"purl_namespace":81,"purl_name":82,"source":9,"versions":84},"SUSE Linux Enterprise","libraw","suse","libraw&distro=SUSE Linux Enterprise Workstation Extension 15 SP6","rpm",[85],{"version":86,"is_range":87,"range_type":88,"version_start":9,"version_start_type":9,"version_end":89,"version_end_type":90,"fixed_in":9},"lt0_18_9_150000_3_30_1",true,"ecosystem","0.18.9-150000.3.30.1","excluding"]