SUSE update for raptor



Risk High
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2024-57822
CVE-2024-57823
CWE-ID CWE-125
CWE-191
Exploitation vector Network
Public exploit N/A
Vulnerable software
Desktop Applications Module
Operating systems & Components / Operating system

SUSE Linux Enterprise Real Time 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Desktop 15
Operating systems & Components / Operating system

openSUSE Leap
Operating systems & Components / Operating system

libraptor2-0-32bit
Operating systems & Components / Operating system package or component

libraptor2-0-32bit-debuginfo
Operating systems & Components / Operating system package or component

libraptor2-0-debuginfo
Operating systems & Components / Operating system package or component

raptor-debugsource
Operating systems & Components / Operating system package or component

raptor-debuginfo
Operating systems & Components / Operating system package or component

libraptor2-0
Operating systems & Components / Operating system package or component

libraptor-devel
Operating systems & Components / Operating system package or component

raptor
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Out-of-bounds read

EUVDB-ID: #VU118386

Risk: Low

CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57822

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to heap-based buffer over-read when parsing triples with the nquads parser in raptor_ntriples_parse_term_internal(). A remote attacker can perform a denial of service attack.

Mitigation

Update the affected package raptor to the latest version.

Vulnerable software versions

Desktop Applications Module: 15-SP6 - 15-SP7

SUSE Linux Enterprise Real Time 15: SP6 - SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP6 - SP7

SUSE Linux Enterprise Server 15: SP6 - SP7

SUSE Linux Enterprise Desktop 15: SP6 - SP7

openSUSE Leap: 15.6

libraptor2-0-32bit: before 2.0.15-150200.9.18.1

libraptor2-0-32bit-debuginfo: before 2.0.15-150200.9.18.1

libraptor2-0-debuginfo: before 2.0.15-150200.9.18.1

raptor-debugsource: before 2.0.15-150200.9.18.1

raptor-debuginfo: before 2.0.15-150200.9.18.1

libraptor2-0: before 2.0.15-150200.9.18.1

libraptor-devel: before 2.0.15-150200.9.18.1

raptor: before 2.0.15-150200.9.18.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503244-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Integer underflow

EUVDB-ID: #VU102758

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-57823

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer underflow when handling URIs in PDF files. A remote attacker can pass specially crafted data to the application, trigger an integer underflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package raptor to the latest version.

Vulnerable software versions

Desktop Applications Module: 15-SP6 - 15-SP7

SUSE Linux Enterprise Real Time 15: SP6 - SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP6 - SP7

SUSE Linux Enterprise Server 15: SP6 - SP7

SUSE Linux Enterprise Desktop 15: SP6 - SP7

openSUSE Leap: 15.6

libraptor2-0-32bit: before 2.0.15-150200.9.18.1

libraptor2-0-32bit-debuginfo: before 2.0.15-150200.9.18.1

libraptor2-0-debuginfo: before 2.0.15-150200.9.18.1

raptor-debugsource: before 2.0.15-150200.9.18.1

raptor-debuginfo: before 2.0.15-150200.9.18.1

libraptor2-0: before 2.0.15-150200.9.18.1

libraptor-devel: before 2.0.15-150200.9.18.1

raptor: before 2.0.15-150200.9.18.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503244-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###