| Risk | High |
| Patch available | YES |
| Number of vulnerabilities | 2 |
| CVE-ID | CVE-2024-57822 CVE-2024-57823 |
| CWE-ID | CWE-125 CWE-191 |
| Exploitation vector | Network |
| Public exploit | N/A |
| Vulnerable software |
Desktop Applications Module Operating systems & Components / Operating system SUSE Linux Enterprise Real Time 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise Desktop 15 Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system libraptor2-0-32bit Operating systems & Components / Operating system package or component libraptor2-0-32bit-debuginfo Operating systems & Components / Operating system package or component libraptor2-0-debuginfo Operating systems & Components / Operating system package or component raptor-debugsource Operating systems & Components / Operating system package or component raptor-debuginfo Operating systems & Components / Operating system package or component libraptor2-0 Operating systems & Components / Operating system package or component libraptor-devel Operating systems & Components / Operating system package or component raptor Operating systems & Components / Operating system package or component |
| Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU118386
Risk: Low
CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57822
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to heap-based buffer over-read when parsing triples with the nquads parser in raptor_ntriples_parse_term_internal(). A remote attacker can perform a denial of service attack.
MitigationUpdate the affected package raptor to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP6 - 15-SP7
SUSE Linux Enterprise Real Time 15: SP6 - SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP6 - SP7
SUSE Linux Enterprise Server 15: SP6 - SP7
SUSE Linux Enterprise Desktop 15: SP6 - SP7
openSUSE Leap: 15.6
libraptor2-0-32bit: before 2.0.15-150200.9.18.1
libraptor2-0-32bit-debuginfo: before 2.0.15-150200.9.18.1
libraptor2-0-debuginfo: before 2.0.15-150200.9.18.1
raptor-debugsource: before 2.0.15-150200.9.18.1
raptor-debuginfo: before 2.0.15-150200.9.18.1
libraptor2-0: before 2.0.15-150200.9.18.1
libraptor-devel: before 2.0.15-150200.9.18.1
raptor: before 2.0.15-150200.9.18.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503244-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102758
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-57823
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer underflow when handling URIs in PDF files. A remote attacker can pass specially crafted data to the application, trigger an integer underflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package raptor to the latest version.
Vulnerable software versionsDesktop Applications Module: 15-SP6 - 15-SP7
SUSE Linux Enterprise Real Time 15: SP6 - SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP6 - SP7
SUSE Linux Enterprise Server 15: SP6 - SP7
SUSE Linux Enterprise Desktop 15: SP6 - SP7
openSUSE Leap: 15.6
libraptor2-0-32bit: before 2.0.15-150200.9.18.1
libraptor2-0-32bit-debuginfo: before 2.0.15-150200.9.18.1
libraptor2-0-debuginfo: before 2.0.15-150200.9.18.1
raptor-debugsource: before 2.0.15-150200.9.18.1
raptor-debuginfo: before 2.0.15-150200.9.18.1
libraptor2-0: before 2.0.15-150200.9.18.1
libraptor-devel: before 2.0.15-150200.9.18.1
raptor: before 2.0.15-150200.9.18.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503244-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.