In Raptor RDF Syntax Library through 2.0.16, there is an integer underflow when normalizing a URI with the turtle parser in raptor_uri_normalize_path().
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 01:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux Redhat rhel Aus Redhat rhel E4s Redhat rhel Els Redhat rhel Eus Redhat rhel Tus |
|
CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:rhel_aus:8.2 cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_e4s:9.0 cpe:/a:redhat:rhel_eus:8.8 cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_eus:9.4 cpe:/a:redhat:rhel_tus:8.4 cpe:/a:redhat:rhel_tus:8.6 cpe:/o:redhat:rhel_els:7 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux Redhat rhel Aus Redhat rhel E4s Redhat rhel Els Redhat rhel Eus Redhat rhel Tus |
Sat, 11 Jan 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | raptor: integer underflow when normalizing a URI with the turtle parser | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Fri, 10 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 10 Jan 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-191 | |
Metrics |
cvssV3_1
|
Fri, 10 Jan 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Raptor RDF Syntax Library through 2.0.16, there is an integer underflow when normalizing a URI with the turtle parser in raptor_uri_normalize_path(). | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-10T14:44:18.609Z
Reserved: 2025-01-10T00:00:00
Link: CVE-2024-57823

Updated: 2025-01-10T14:44:13.289Z

Status : Received
Published: 2025-01-10T13:15:10.113
Modified: 2025-01-10T14:15:29.583
Link: CVE-2024-57823
